Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1525389
MD5:1a7dbcfc4c8a85127db62a70e3a6635a
SHA1:fc7eb4ea4434971e13299eb018ac584457f8f77a
SHA256:3693f77573eeb4005fd0032086e7c3f79245dc04136fe430749ba0f92cf886af
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7152 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1A7DBCFC4C8A85127DB62A70E3A6635A)
    • taskkill.exe (PID: 6268 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 3400 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 5356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 2852 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 2692 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 5800 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chrome.exe (PID: 5480 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5856 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7928 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3188 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7940 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2935303809.0000000000B88000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    Process Memory Space: file.exe PID: 7152JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: file.exeVirustotal: Detection: 23%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.8% probability
      Source: file.exeJoe Sandbox ML: detected
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49743 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.4:49766 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.4:49784 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49785 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:50000 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A3DBBE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A468EE FindFirstFileW,FindClose,0_2_00A468EE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A4698F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A3D076
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A3D3A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A49642
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A4979D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A49B2B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A45C97
      Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00A4CE44
      Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: YSC=KNf6Bnwwh64
      Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
      Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=214798233&timestamp=1728012673477 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=B_zICH9liEG0_A5dcm8XXX4j1Vlqcq6hAH4B5UGBOtDJ95RxfvtQ8-jlSwf4qRzaLjKitcnMm9SYRPgSjOoQGfFAIOFnTCoL-D4AoiQlrQZClGTWL7aEgHF6BVCZHnyrwkw0gM0Q05h0ik7Dm29qu_OGbVzkespVPBZRNtQCZ-OeBtjfz-c
      Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=oKcpLspDuRys95K&MD=2AyAgdWU HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
      Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=oKcpLspDuRys95K&MD=2AyAgdWU HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
      Source: global trafficHTTP traffic detected: GET /rules/other-Win32-v19.bundle HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120402v21s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120608v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule224902v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120609v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120610v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120612v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120613v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120600v4s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120611v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120615v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120616v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120614v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120617v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120618v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120620v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120619v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120621v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120622v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120623v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120625v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120624v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120626v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120627v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120628v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120629v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120630v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120631v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120632v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120633v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120634v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120635v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120636v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120637v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120638v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120639v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120640v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120641v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120642v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120643v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120644v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120645v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120646v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120647v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120648v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120649v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120651v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120650v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120652v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120653v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120654v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120655v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120656v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120657v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120658v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120659v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120661v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120660v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120662v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120663v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120664v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120666v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120665v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120667v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120668v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120669v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120670v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120671v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120672v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120673v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120674v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120675v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120676v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120677v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120678v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120679v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120680v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120681v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120682v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120602v10s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120601v3s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701201v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule224901v11s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701200v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700201v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700200v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702350v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702351v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701251v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701250v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700051v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700050v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702951v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702950v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701151v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701150v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702201v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702200v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700401v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700400v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700351v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700350v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703901v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703900v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701501v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701500v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702801v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702800v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703351v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703350v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703501v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703500v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701801v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701800v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701051v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701050v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702751v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702750v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702301v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702300v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703401v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703400v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702501v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702500v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700501v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700500v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702551v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702550v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701351v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701350v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702151v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702150v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703001v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703000v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700751v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700750v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700151v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700150v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703451v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703450v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700901v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700900v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702251v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702250v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702651v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702650v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703101v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703100v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702901v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702900v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703601v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703600v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703851v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703850v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703801v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703800v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703701v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703751v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703700v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703750v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701301v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704050v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704051v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701701v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701300v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701700v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702050v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700701v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700700v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702051v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700551v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700550v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703651v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703650v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700601v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700600v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703150v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703151v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703950v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703951v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702851v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702850v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700001v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700000v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701401v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701400v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701951v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700851v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701950v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700850v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701851v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703051v3s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701850v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703050v3s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700101v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702101v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700951v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702100v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700100v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700950v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703551v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700451v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703550v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702701v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702700v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700450v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701901v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701900v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704001v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704000v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703251v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702401v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703250v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702400v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701551v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701550v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700301v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700300v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702000v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702601v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703201v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702600v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703200v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700251v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700250v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700651v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule700650v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703301v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702001v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule703300v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701751v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701750v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701651v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701650v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702451v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule702450v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701101v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule701100v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120128v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120603v8s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120607v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230104v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230157v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230158v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230162v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230164v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230165v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230166v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230167v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230168v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230169v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230170v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230171v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230172v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230173v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule230174v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule120119v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule224900v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704100v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704101v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704201v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704200v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704151v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule704150v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: global trafficHTTP traffic detected: GET /rules/rule226009v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.azureedge.net
      Source: chromecache_88.13.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: youtube.com
      Source: global trafficDNS traffic detected: DNS query: www.youtube.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
      Source: global trafficDNS traffic detected: DNS query: play.google.com
      Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: chromecache_88.13.drString found in binary or memory: https://accounts.google.com
      Source: chromecache_88.13.drString found in binary or memory: https://accounts.google.com/TOS?loc=
      Source: chromecache_79.13.drString found in binary or memory: https://apis.google.com/js/api.js
      Source: chromecache_88.13.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
      Source: chromecache_88.13.drString found in binary or memory: https://families.google.com/intl/
      Source: chromecache_79.13.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
      Source: chromecache_79.13.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
      Source: chromecache_79.13.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
      Source: chromecache_88.13.drString found in binary or memory: https://g.co/recover
      Source: chromecache_88.13.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
      Source: chromecache_88.13.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
      Source: chromecache_88.13.drString found in binary or memory: https://play.google/intl/
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/privacy
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/privacy/additional
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/privacy/google-partners
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/technologies/cookies
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/technologies/location-data
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/terms
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/terms/location
      Source: chromecache_88.13.drString found in binary or memory: https://policies.google.com/terms/service-specific
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
      Source: chromecache_79.13.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
      Source: chromecache_88.13.drString found in binary or memory: https://support.google.com/accounts?hl=
      Source: chromecache_88.13.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
      Source: chromecache_88.13.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
      Source: chromecache_79.13.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
      Source: chromecache_88.13.drString found in binary or memory: https://www.google.com
      Source: chromecache_88.13.drString found in binary or memory: https://www.google.com/intl/
      Source: chromecache_79.13.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
      Source: chromecache_79.13.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
      Source: chromecache_79.13.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
      Source: chromecache_79.13.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
      Source: chromecache_79.13.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
      Source: chromecache_79.13.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
      Source: chromecache_88.13.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
      Source: chromecache_88.13.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
      Source: file.exe, 00000000.00000003.1707428379.00000000008F4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2935303809.0000000000B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
      Source: chromecache_88.13.drString found in binary or memory: https://youtube.com/t/terms?gl=
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
      Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
      Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
      Source: unknownNetwork traffic detected: HTTP traffic on port 50039 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
      Source: unknownNetwork traffic detected: HTTP traffic on port 49967 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49969
      Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
      Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49967
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49963
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49962
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49960
      Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
      Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
      Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49951
      Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
      Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50051 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
      Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
      Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
      Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50049 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
      Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
      Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
      Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
      Source: unknownNetwork traffic detected: HTTP traffic on port 50038 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
      Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
      Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50050 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49996
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
      Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
      Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
      Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
      Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
      Source: unknownNetwork traffic detected: HTTP traffic on port 50037 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
      Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
      Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
      Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50001
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50000
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50003
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50002
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
      Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
      Source: unknownNetwork traffic detected: HTTP traffic on port 50048 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
      Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50003 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50035 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50046 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50047 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50002 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50054
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50053
      Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50056
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50055
      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50057
      Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49996 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50057 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49938 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50023 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
      Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
      Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
      Source: unknownNetwork traffic detected: HTTP traffic on port 50055 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
      Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50029
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50023
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50024
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
      Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50021 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50030
      Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50039
      Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50032
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50031
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50034
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50033
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50036
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50035
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50038
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50037
      Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50041
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50040
      Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50033 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50043
      Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50042
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50045
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50044
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50047
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50046
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50049
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50048
      Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50050
      Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50052
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50051
      Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50042 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50053 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50031 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50043 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49969 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50054 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
      Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
      Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
      Source: unknownNetwork traffic detected: HTTP traffic on port 50052 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49939
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49938
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
      Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
      Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49743 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.4:49766 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.4:49784 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49785 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:50000 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A4EAFF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A4ED6A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A4EAFF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00A3AA57
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A69576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A69576

      System Summary

      barindex
      Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
      Source: file.exe, 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8b88b103-9
      Source: file.exe, 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_713b5b05-2
      Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a5913dec-1
      Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_65c8946d-e
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00A3D5EB
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A31201
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A3E8F6
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A420460_2_00A42046
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D80600_2_009D8060
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A382980_2_00A38298
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0E4FF0_2_00A0E4FF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0676B0_2_00A0676B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A648730_2_00A64873
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FCAA00_2_009FCAA0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009DCAF00_2_009DCAF0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009ECC390_2_009ECC39
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A06DD90_2_00A06DD9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D91C00_2_009D91C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009EB1190_2_009EB119
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F13940_2_009F1394
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F17060_2_009F1706
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F781B0_2_009F781B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F19B00_2_009F19B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D79200_2_009D7920
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009E997D0_2_009E997D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F7A4A0_2_009F7A4A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F7CA70_2_009F7CA7
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F1C770_2_009F1C77
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A09EEE0_2_00A09EEE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A5BE440_2_00A5BE44
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F1F320_2_009F1F32
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 009F0A30 appears 46 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 009EF9F2 appears 31 times
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: classification engineClassification label: mal72.troj.evad.winEXE@46/30@12/7
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A437B5 GetLastError,FormatMessageW,0_2_00A437B5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A310BF AdjustTokenPrivileges,CloseHandle,0_2_00A310BF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A316C3
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A451CD
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A5A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A5A67C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00A4648E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_009D42A2
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5356:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6868:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:352:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5856:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6188:120:WilError_03
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: file.exeVirustotal: Detection: 23%
      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3188 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobarsJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3188 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8Jump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009D42DE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F0A76 push ecx; ret 0_2_009F0A89
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009EF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_009EF98E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A61C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A61C41
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95570
      Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 7164Jump to behavior
      Source: C:\Users\user\Desktop\file.exeWindow / User API: foregroundWindowGot 1774Jump to behavior
      Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.3 %
      Source: C:\Users\user\Desktop\file.exe TID: 6240Thread sleep time: -71640s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 7164 delay: -10Jump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A3DBBE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A468EE FindFirstFileW,FindClose,0_2_00A468EE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A4698F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A3D076
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A3D3A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A49642
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A4979D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A49B2B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A45C97
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009D42DE
      Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4EAA2 BlockInput,0_2_00A4EAA2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A02622
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009D42DE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F4CE8 mov eax, dword ptr fs:[00000030h]0_2_009F4CE8
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A30B62
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A02622
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009F083F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F09D5 SetUnhandledExceptionFilter,0_2_009F09D5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009F0C21
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A31201
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A12BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A12BA5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3B226 SendInput,keybd_event,0_2_00A3B226
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00A522DA
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A30B62
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A31663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A31663
      Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: file.exeBinary or memory string: Shell_TrayWnd
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009F0698 cpuid 0_2_009F0698
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A48195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00A48195
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A2D27A GetUserNameW,0_2_00A2D27A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00A0BB6F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009D42DE

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.2935303809.0000000000B88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 7152, type: MEMORYSTR
      Source: file.exeBinary or memory string: WIN_81
      Source: file.exeBinary or memory string: WIN_XP
      Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
      Source: file.exeBinary or memory string: WIN_XPe
      Source: file.exeBinary or memory string: WIN_VISTA
      Source: file.exeBinary or memory string: WIN_7
      Source: file.exeBinary or memory string: WIN_8

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2935303809.0000000000B88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 7152, type: MEMORYSTR
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A51204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00A51204
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A51806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00A51806
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      2
      Disable or Modify Tools
      21
      Input Capture
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      2
      Valid Accounts
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol21
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
      Valid Accounts
      2
      Obfuscated Files or Information
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin Shares3
      Clipboard Data
      3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
      Access Token Manipulation
      1
      DLL Side-Loading
      NTDS16
      System Information Discovery
      Distributed Component Object ModelInput Capture4
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
      Process Injection
      2
      Valid Accounts
      LSA Secrets12
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Virtualization/Sandbox Evasion
      Cached Domain Credentials12
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
      Access Token Manipulation
      DCSync3
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
      Process Injection
      Proc Filesystem11
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1525389 Sample: file.exe Startdate: 04/10/2024 Architecture: WINDOWS Score: 72 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected Credential Flusher 2->48 50 Binary is likely a compiled AutoIt script file 2->50 52 2 other signatures 2->52 7 file.exe 2->7         started        process3 signatures4 54 Binary is likely a compiled AutoIt script file 7->54 56 Found API chain indicative of sandbox detection 7->56 10 chrome.exe 1 7->10         started        13 taskkill.exe 1 7->13         started        15 taskkill.exe 1 7->15         started        17 3 other processes 7->17 process5 dnsIp6 42 192.168.2.4, 138, 443, 49190 unknown unknown 10->42 44 239.255.255.250 unknown Reserved 10->44 19 chrome.exe 10->19         started        22 chrome.exe 10->22         started        24 chrome.exe 6 10->24         started        26 conhost.exe 13->26         started        28 conhost.exe 15->28         started        30 conhost.exe 17->30         started        32 conhost.exe 17->32         started        34 conhost.exe 17->34         started        process7 dnsIp8 36 www3.l.google.com 142.250.184.238, 443, 49756, 49913 GOOGLEUS United States 19->36 38 www.google.com 142.250.186.164, 443, 49741, 49854 GOOGLEUS United States 19->38 40 5 other IPs or domains 19->40

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe24%VirustotalBrowse
      file.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      youtube-ui.l.google.com0%VirustotalBrowse
      www3.l.google.com0%VirustotalBrowse
      www.google.com0%VirustotalBrowse
      youtube.com0%VirustotalBrowse
      accounts.youtube.com0%VirustotalBrowse
      www.youtube.com0%VirustotalBrowse
      play.google.com0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://play.google/intl/0%URL Reputationsafe
      https://families.google.com/intl/0%URL Reputationsafe
      https://policies.google.com/technologies/location-data0%URL Reputationsafe
      https://apis.google.com/js/api.js0%URL Reputationsafe
      https://policies.google.com/privacy/google-partners0%URL Reputationsafe
      https://policies.google.com/terms/service-specific0%URL Reputationsafe
      https://g.co/recover0%URL Reputationsafe
      https://policies.google.com/privacy/additional0%URL Reputationsafe
      https://policies.google.com/privacy/additional0%URL Reputationsafe
      https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
      https://policies.google.com/technologies/cookies0%URL Reputationsafe
      https://policies.google.com/technologies/cookies0%URL Reputationsafe
      https://policies.google.com/terms0%URL Reputationsafe
      https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
      https://support.google.com/accounts?hl=0%URL Reputationsafe
      https://policies.google.com/terms/location0%URL Reputationsafe
      https://policies.google.com/privacy0%URL Reputationsafe
      https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
      https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
      https://www.google.com/intl/1%VirustotalBrowse
      https://youtube.com/t/terms?gl=0%VirustotalBrowse
      https://play.google.com/work/enroll?identifier=0%VirustotalBrowse
      https://www.google.com/favicon.ico0%VirustotalBrowse
      https://www.google.com0%VirustotalBrowse
      https://play.google.com/log?format=json&hasfast=true0%VirustotalBrowse
      https://play.google.com/log?format=json&hasfast=true&authuser=00%VirustotalBrowse
      https://www.youtube.com/t/terms?chromeless=1&hl=0%VirustotalBrowse
      https://play.google.com/log?hasfast=true&authuser=0&format=json0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      youtube-ui.l.google.com
      216.58.212.142
      truefalseunknown
      www3.l.google.com
      142.250.184.238
      truefalseunknown
      play.google.com
      216.58.206.78
      truefalseunknown
      www.google.com
      142.250.186.164
      truefalseunknown
      youtube.com
      142.250.186.174
      truefalseunknown
      accounts.youtube.com
      unknown
      unknownfalseunknown
      www.youtube.com
      unknown
      unknownfalseunknown
      NameMaliciousAntivirus DetectionReputation
      https://play.google.com/log?format=json&hasfast=true&authuser=0falseunknown
      https://www.google.com/favicon.icofalseunknown
      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalseunknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://play.google/intl/chromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://families.google.com/intl/chromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://youtube.com/t/terms?gl=chromecache_88.13.drfalseunknown
      https://policies.google.com/technologies/location-datachromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://www.google.com/intl/chromecache_88.13.drfalseunknown
      https://apis.google.com/js/api.jschromecache_79.13.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacy/google-partnerschromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://play.google.com/work/enroll?identifier=chromecache_88.13.drfalseunknown
      https://policies.google.com/terms/service-specificchromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://g.co/recoverchromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacy/additionalchromecache_88.13.drfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/technologies/cookieschromecache_88.13.drfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://policies.google.com/termschromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_79.13.drfalse
      • URL Reputation: safe
      unknown
      https://www.google.comchromecache_88.13.drfalseunknown
      https://play.google.com/log?format=json&hasfast=truechromecache_88.13.drfalseunknown
      https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_88.13.drfalseunknown
      https://support.google.com/accounts?hl=chromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/terms/locationchromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://policies.google.com/privacychromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://support.google.com/accounts?p=new-si-uichromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_88.13.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      216.58.212.142
      youtube-ui.l.google.comUnited States
      15169GOOGLEUSfalse
      142.250.186.174
      youtube.comUnited States
      15169GOOGLEUSfalse
      216.58.206.78
      play.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.186.164
      www.google.comUnited States
      15169GOOGLEUSfalse
      142.250.184.238
      www3.l.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.4
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1525389
      Start date and time:2024-10-04 05:30:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 25s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:20
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:file.exe
      Detection:MAL
      Classification:mal72.troj.evad.winEXE@46/30@12/7
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 96%
      • Number of executed functions: 38
      • Number of non-executed functions: 311
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.250.186.131, 172.217.18.110, 74.125.71.84, 34.104.35.123, 216.58.212.163, 142.250.185.227, 172.217.18.106, 142.250.185.106, 142.250.185.202, 142.250.186.106, 142.250.186.138, 142.250.185.170, 216.58.206.74, 142.250.186.74, 142.250.184.202, 142.250.184.234, 142.250.185.74, 172.217.16.202, 142.250.185.138, 142.250.185.234, 172.217.18.10, 142.250.186.42, 216.58.212.170, 172.217.16.138, 216.58.206.42, 142.250.186.170, 142.250.181.234, 142.250.74.202, 199.232.210.172, 192.229.221.95, 142.250.186.99, 64.233.166.84, 142.250.186.78
      • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, otelrules.azureedge.net, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
      • HTTPS sessions have been limited to 150. Please view the PCAPs for the complete data.
      • Not all processes where analyzed, report is missing behavior information
      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      239.255.255.250http://perweierscotish.onlineGet hashmaliciousHtmlDropperBrowse
        http://144.126.159.102Get hashmaliciousUnknownBrowse
          Refrence-Order#63729.pdfGet hashmaliciousAzorultBrowse
            http://144.126.159.102Get hashmaliciousUnknownBrowse
              http://1drv.ms/o/c/fdad16d5f2338a27/Eo8O_nGS-PdFnAhpolmsW1cBd-Jv5WSSl5AjZZuAQUSXNw?e=5%3aI9hXvq&sharingv2=true&fromShare=true&at=9Get hashmaliciousUnknownBrowse
                http://144.126.159.102:8080/loaderGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousCredential FlusherBrowse
                    2FA Updating-2226-YZW.pdfGet hashmaliciousUnknownBrowse
                      http://gruasphenbogota.comGet hashmaliciousUnknownBrowse
                        https://microsoftonlineworking.pages.dev/#?email=YW5kcmV3X2hvbHRAdGFjLnZpYy5nb3YuYXU=Get hashmaliciousReCaptcha PhishBrowse
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          28a2c9bd18a11de089ef85a160da29e4http://perweierscotish.onlineGet hashmaliciousHtmlDropperBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          http://144.126.159.102Get hashmaliciousUnknownBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          Refrence-Order#63729.pdfGet hashmaliciousAzorultBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          http://144.126.159.102Get hashmaliciousUnknownBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          file.exeGet hashmaliciousLummaC, VidarBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          http://1drv.ms/o/c/fdad16d5f2338a27/Eo8O_nGS-PdFnAhpolmsW1cBd-Jv5WSSl5AjZZuAQUSXNw?e=5%3aI9hXvq&sharingv2=true&fromShare=true&at=9Get hashmaliciousUnknownBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          http://144.126.159.102:8080/loaderGet hashmaliciousUnknownBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          file.exeGet hashmaliciousCredential FlusherBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          2FA Updating-2226-YZW.pdfGet hashmaliciousUnknownBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          https://microsoftonlineworking.pages.dev/#?email=YW5kcmV3X2hvbHRAdGFjLnZpYy5nb3YuYXU=Get hashmaliciousReCaptcha PhishBrowse
                          • 172.202.163.200
                          • 184.28.90.27
                          • 13.107.246.60
                          No context
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:HTML document, ASCII text, with very long lines (681)
                          Category:downloaded
                          Size (bytes):4066
                          Entropy (8bit):5.369564168658135
                          Encrypted:false
                          SSDEEP:96:G6mTOIiY1medWRQrf7VF6vtDgXJyA7oxcoT4w:3mTOImedWOVF6vtUJyA8xJt
                          MD5:4D3D9750CA5EB8A7D20993397BC5A6B8
                          SHA1:DDB05A2C8AB1FD4537EEB2433BDF507CEE8CB8D2
                          SHA-256:FCD1C642992A0BAF9038B3710DA080282AF0C80C113E1CE8F984F8143A2B2B32
                          SHA-512:482DD926971FACA341058B35D333CEF64EAC460FC29B0B17AF5CD515253BCE973BBCAABADE3C4D125E07DE3BC75DE52059D5B229C44C5F95A30B845651EF64CA
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                          Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.bqa);._.k("sOXFj");.var wu=function(a){_.W.call(this,a.Fa)};_.J(wu,_.W);wu.Ba=_.W.Ba;wu.prototype.aa=function(a){return a()};_.qu(_.aqa,wu);._.l();._.k("oGtAuc");._.Bya=new _.pf(_.bqa);._.l();._.k("q0xTif");.var vza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Lc=null,_.Gu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Su=function(a){_.nt.call(this,a.Fa);this.Qa=this.dom=null;if(this.rl()){var b=_.Cm(this.Wg(),[_.Hm,_.Gm]);b=_.pi([b[_.Hm],b[_.Gm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.ku(this,b)}this.Ra=a.lm.Dea};_.J(Su,_.nt);Su.Ba=function(){return{lm:{Dea:function(a){return _.Ue(a)}}}};Su.prototype.Bp=function(a){return this.Ra.Bp(a)};.Su.prototype.getData=function(a){return this.Ra.getData(a)};Su.prototype.uo=function(){_.Nt(this.d
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (1694)
                          Category:downloaded
                          Size (bytes):32500
                          Entropy (8bit):5.378121087555083
                          Encrypted:false
                          SSDEEP:768:OnTTScxIXeijt4aRZf4AEqTzQh2HIVVcYTVf79pew6cVEkAXtuWsmsL:iA4w4A4h2HIVVcMVf72QA9jOL
                          MD5:57D7B0A2CE36496F05AFA27B39C1F219
                          SHA1:418AD03C2E75AEAF188E2A00123B70E09D541656
                          SHA-256:E247A1F5E564A248C92E39C040A06B9B3BEA50A130CC98F2787FB5E2441E0707
                          SHA-512:78B135A69424F951AC7E3CCBDC4F496BCA0BE6A2312DC90DFA29032C7DB19455B7E35FEE57F470729EC5E86D52DC19037BB6404C27DF614A548DE409527866C2
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Cua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=Cua.prototype;_.h.Zc=null;_.h.rZ=1E4;_.h.jA=!1;_.h.sQ=0;_.h.JJ=null;_.h.gV=null;_.h.setTimeout=function(a){this.rZ=a};_.h.start=function(){if(this.jA)throw Error("dc");this.jA=!0;this.sQ=0;Dua(this)};_.h.stop=function(){Eua(this);this.jA=!1};.var Dua=function(a){a.sQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.bg)(a.hH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Kja,a),a.aa.onerror=(0,_.bg)(a.Jja,a),a.aa.onabort=(0,_.bg)(a.Ija,a),a.JJ=_.om(a.Lja,a.rZ,a),a.aa.src=String(a.ka))};_.h=Cua.prototype;_.h.Kja=function(){this.hH(!0)};_.h.Jja=function(){this.hH(!1)};_.h.Ija=function(){this.hH(!1)};_.h.Lja=function(){this.hH(!1)};._.h.hH=function(a){Eua(this);a?(this.jA=!1,this.da.call(this.ea,!0)):this.sQ<=0?Dua(this):(this.jA=!1,
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (570)
                          Category:downloaded
                          Size (bytes):3467
                          Entropy (8bit):5.508385764606741
                          Encrypted:false
                          SSDEEP:96:ogbsxK3SrI2Jrutmxy9FALtcP+EGYkxhclzV9xCw:Psc3OIpDj2ZYkxhATxX
                          MD5:231ABD6E6C360E709640B399EDF85476
                          SHA1:6CB98F38D9B6FDCF2E7D7C7682A219082F2E1E75
                          SHA-256:44B5D535663C65CD2E6228EF1F0C3DBA9C89EAE5C1BF079A6C4C64972DEE989D
                          SHA-512:D45455810B34493A05BA2DD7ADF24C0C009F4CF0898AE9C57978D38C8F2654CEEFC11D1C151BA72B902E0FA87537D43C37957DCAEC1792B5277B54C8E7BCCA3C
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var fya=function(){var a=_.He();return _.Nj(a,1)},au=function(a){this.Da=_.t(a,0,au.messageId)};_.J(au,_.v);au.prototype.Ha=function(){return _.Fj(this,1)};au.prototype.Ua=function(a){return _.Xj(this,1,a)};au.messageId="f.bo";var bu=function(){_.km.call(this)};_.J(bu,_.km);bu.prototype.xd=function(){this.NT=!1;gya(this);_.km.prototype.xd.call(this)};bu.prototype.aa=function(){hya(this);if(this.JC)return iya(this),!1;if(!this.UV)return cu(this),!0;this.dispatchEvent("p");if(!this.HP)return cu(this),!0;this.NM?(this.dispatchEvent("r"),cu(this)):iya(this);return!1};.var jya=function(a){var b=new _.gp(a.b5);a.vQ!=null&&_.Mn(b,"authuser",a.vQ);return b},iya=function(a){a.JC=!0;var b=jya(a),c="rt=r&f_uid="+_.rk(a.HP);_.fn(b,(0,_.bg)(a.ea,a),"POST",c)};.bu.prototype.ea=function(a){a=a.target;hya(this);if(_.jn(a)){this.iK=0;if(this.NM)this.JC=!1,this.dispatchEvent("r"
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (683)
                          Category:downloaded
                          Size (bytes):3131
                          Entropy (8bit):5.352056237104327
                          Encrypted:false
                          SSDEEP:48:o7hHD75byh9xqKP5jNQ8js63rAwrMNhYfmdpwoKLEy5aQW5Tx5v3MmFopMGIWO4x:oFD+95jOQr3AT7wRLDGD5flBb4Ew
                          MD5:ADEF03127F74F5E6742B8CFA7B863F28
                          SHA1:58D7C635582AF10E91EC047FD315FAF758AF51DA
                          SHA-256:5FDD639E222F58AEB6178EB02583086BCC50ED219DEAA953D0E7984DD0E1FEDC
                          SHA-512:3AC26E9569EE83298F386D551774F378D3E433A2C80C1D4BC7481C544605A2FA4943F6CBC8E97FBF8FE3C32C1EFB2A1CCAA01403819482FC7429538FDF2CA758
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var kA=function(a){_.W.call(this,a.Fa)};_.J(kA,_.W);kA.Ba=_.W.Ba;kA.prototype.jS=function(a){return _.Ye(this,{Xa:{lT:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.ni(function(e){window._wjdc=function(f){d(f);e(dKa(f,b,a))}}):dKa(c,b,a)})};var dKa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.lT.jS(c)};.kA.prototype.aa=function(a,b){var c=_.Dra(b).Tj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.qu(_.Lfa,kA);._.l();._.k("SNUn3");._.cKa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var eKa=function(a){var b=_.wq(a);return b?new _.ni(function(c,d){var e=function(){b=_.wq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (533)
                          Category:downloaded
                          Size (bytes):9210
                          Entropy (8bit):5.393248075042016
                          Encrypted:false
                          SSDEEP:192:t7mFYxV97I4Ia0U44rS3mt8IV7ydti6M5/1JlNg:t7vB7Il2t+dEF1JlNg
                          MD5:2ED5BC88509286438B682EFF23518005
                          SHA1:D5C8FD77BA3ED7F977A4AD0C85CF026D0F74F3E2
                          SHA-256:F878D44B5CAC6BC95D638C13D0814C10E7D6CC145351ABA7945F53D8CB167979
                          SHA-512:12F5415A482286C53631D09B5F50BA4AAA0957DB61904430E5B728777A15DC62428ED560847AB1DFEC459E302FB4D009D32CC1770EAD5425023CA48DF4640AA4
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vNa=_.z("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.A)b=_.Za(b.Ku()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Za(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Wf");};_.HX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.bMb=function(a){return a===null||typeof a==="string"&&_.Ji(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Va=a.controller.Va;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Va:{jsname:"n7vHCb",ctor:_.pv},header:{jsname:"tJHJj",ctor:_.pv},nav:{jsname:"DH6Rkf",ct
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (553)
                          Category:downloaded
                          Size (bytes):744316
                          Entropy (8bit):5.792609563905897
                          Encrypted:false
                          SSDEEP:6144:h5bdWK/20rOQKKQtvqUGSGDdPSxdZqmguaH:5OeKGSpguA
                          MD5:E5DFAA54FA9E49582769745439A0B809
                          SHA1:A5BA6F69DA4C2D684DF9A6E5EFAF91CDEDC9DFBA
                          SHA-256:FC7077701258AA0159E2A90714C0245E556F60F36F73574515C5E12B02CBDDD2
                          SHA-512:EF0BE7B81E43B2E899769204B107EBA503C46E27D57952238DD92A35F8871061302E1BB97398B7E58672B598642C85B2918DC881E63F2F85712E38601E76CF7F
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlGqbcbY7EPIbU9aEKq4q6omjn3kkA/m=_b,_tp"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x2860c1c4, 0x20469860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ta,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                          Category:downloaded
                          Size (bytes):5430
                          Entropy (8bit):3.6534652184263736
                          Encrypted:false
                          SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                          MD5:F3418A443E7D841097C714D69EC4BCB8
                          SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                          SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                          SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                          Malicious:false
                          URL:https://www.google.com/favicon.ico
                          Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                          Category:downloaded
                          Size (bytes):52280
                          Entropy (8bit):7.995413196679271
                          Encrypted:true
                          SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                          MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                          SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                          SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                          SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                          Malicious:false
                          URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                          Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (755)
                          Category:downloaded
                          Size (bytes):1460
                          Entropy (8bit):5.274624539239422
                          Encrypted:false
                          SSDEEP:24:kMYD7DUuXIqMSsN7UYgtx/mQ7hz1BU6TZ6BdXDMvUKGbWxlGb+jSFFV87Ofk8tp8:o7DhXI6PoXwsKGb2lGb+jS9Mwrw
                          MD5:481C149C4D3EE4A53C3E7CBA067371DF
                          SHA1:E0FED275636D3492C922C44F010157FAF0936733
                          SHA-256:9327A53F577C5FCEFDB162E02D8646CE5B70DF2201F4B3289384657B32BACE70
                          SHA-512:EC5C5A03ED4E1A27BEE7E1C488A238D79A9787D944E364CCE516FB28C22256919E49C99BFCFEA0F7815AB4232A350914E26D33D20F5A81ED19A39DFD40E30C79
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.b_a=new _.pf(_.Dm);._.l();._.k("P6sQOc");.var g_a=!!(_.Mh[1]&16);var i_a=function(a,b,c,d,e){this.ea=a;this.xa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=h_a(this)},j_a=function(a){var b={};_.Ma(a.HS(),function(e){b[e]=!0});var c=a.uS(),d=a.yS();return new i_a(a.wP(),c.aa()*1E3,a.bS(),d.aa()*1E3,b)},h_a=function(a){return Math.random()*Math.min(a.xa*Math.pow(a.ka,a.aa),a.Ca)},SG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var TG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.JV;this.ea=a.Ea.metadata;a=a.Ea.cha;this.fetch=a.fetch.bind(a)};_.J(TG,_.W);TG.Ba=function(){return{Ea:{JV:_.e_a,metadata:_.b_a,cha:_.VZa}}};TG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Vm(a);var c=this.da.jV;return(c=c?j_a(c):null)&&SG(c)?_.zya(a,k_a(this,a,b,c)):_.Vm(a)};.var k_a=function(a,b,c,d){return c.then(function(e){return e},function(e)
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (2907)
                          Category:downloaded
                          Size (bytes):23298
                          Entropy (8bit):5.429186219736739
                          Encrypted:false
                          SSDEEP:384:+BitNeB9HVPQmqySWyvbbb/XEm6k1JTM2qzhOF0bCjOgiQBH2f+wl9nyf0zHwx:+BiHeB9Hecebbb/PONOFnjOgPBHgSywx
                          MD5:A5C41D7BA22E9CF451810802AE5AC2E8
                          SHA1:858F35134A0BD7BAECB1B1A30EC3645642214554
                          SHA-256:D29364A1E9EDE91152F2CB84962B73644741817C9C6A615C1FB70A885DD1CB8D
                          SHA-512:DEA28AD362B51832D33CD9E936C0A255FA32C20DFFC6E806DA7AAF657D3490AF079C40FE21E10B2FDC971EB066E51ABDA182DEDC156759CCE06440E456FEB316
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.xu.prototype.da=_.ca(40,function(){return _.tj(this,3)});_.cz=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.cz.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.dz=function(){this.ka=!0;var a=_.xj(_.fk(_.Be("TSDtV",window),_.Cya),_.xu,1,_.sj())[0];if(a){var b={};for(var c=_.n(_.xj(a,_.Dya,2,_.sj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Lj(d,1).toString();switch(_.vj(d,_.yu)){case 3:b[e]=_.Jj(d,_.nj(d,_.yu,3));break;case 2:b[e]=_.Lj(d,_.nj(d,_.yu,2));break;case 4:b[e]=_.Mj(d,_.nj(d,_.yu,4));break;case 5:b[e]=_.Nj(d,_.nj(d,_.yu,5));break;case 6:b[e]=_.Rj(d,_.ff,6,_.yu);break;default:throw Error("jd`"+_.vj(d,_.yu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.dz.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Fya(a.flagName);if(b===null)a=a.de
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (468)
                          Category:downloaded
                          Size (bytes):1858
                          Entropy (8bit):5.297658905867848
                          Encrypted:false
                          SSDEEP:48:o7vjoGL3AeFkphnpiu7cOyBfO/3d/rYrv3Zrw:ofrLxFuLdyp2AVw
                          MD5:B42DB3D22B12B8E3BE1B82961FE2870E
                          SHA1:D9CFD11C1C2DE17A7E9301F11AD875B610B96576
                          SHA-256:75DC40A81CEACB57940F84D2B29E021974C3004B245CC7198362CA944E9C4058
                          SHA-512:EC0708797586F8F85EC8A0BBECA707D73778D93C12986B92965D1828B254D39485926354AEC4D73474BC5755E392B813D8045B19369FAE23B30BBD12E17F7053
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.tu,Mc:_.HE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.r3)||function(){}};_.VPb=function(a){return(a==null?void 0:a.Qp)||function(){}};._.WPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.XPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.qO=function(){return!0};_.qu(_.Dn,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (522)
                          Category:downloaded
                          Size (bytes):5050
                          Entropy (8bit):5.30005628600801
                          Encrypted:false
                          SSDEEP:96:o75BuBxJfma7bGZABddEgf8nI4zLm4KGo8Vh1EabPVTq8fv/xRw:WHMmaX9r8Igp7nBlHo
                          MD5:D9F15F1AEAF15673336FAA3507D1A2A7
                          SHA1:FC79D00AF2E2D44FEBA701F12ECD4AFCA327F464
                          SHA-256:AA3574ADCF3826390918BC2D5DCD88D7BC63238A6022DEF3487A67A731C30E7A
                          SHA-512:D756961B6BFC478274E390B94D613BD837DA011D680FC6D67779A8E12C7F082EF977FC15D02C076F92BC1D2CE7EFDE48F82B4EC1BD12CF38AEDDAB1917E36041
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.oNa=_.z("wg1P6b",[_.XA,_.Fn,_.Nn]);._.k("wg1P6b");.var f6a;f6a=_.mh(["aria-"]);._.yJ=function(a){_.X.call(this,a.Fa);this.Ka=this.xa=this.aa=this.viewportElement=this.Na=null;this.Jc=a.Ea.ef;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Qi();a=-1*parseInt(_.Fo(this.Qi().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Qi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.g6a(this,this.aa.el())));_.oF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.yJ,_.X);_.yJ.Ba=function(){return{Ea:{ef:_.cF,focus:_.OE,Fc:_.uu}}};_.yJ.prototype.IF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.qz)?(a=a.data.qz,this.Ca=a==="MOUS
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with no line terminators
                          Category:downloaded
                          Size (bytes):84
                          Entropy (8bit):4.875266466142591
                          Encrypted:false
                          SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                          MD5:87B6333E98B7620EA1FF98D1A837A39E
                          SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                          SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                          SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                          Malicious:false
                          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                          Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (395)
                          Category:downloaded
                          Size (bytes):1608
                          Entropy (8bit):5.271783084011668
                          Encrypted:false
                          SSDEEP:48:o726BiFP89yAxKz1TtMxII+eXww7D2bc+rw:oyMyAAz1WNd8vw
                          MD5:45EA91A811A594F81B7F760DD14BE237
                          SHA1:2C97782C6D5D0BCFB3676FF24AA1008251090DAE
                          SHA-256:7488FF4710E7592F66BE1FAC090F73CB8F1D2D0794B57DEAC1798C5B309EE76F
                          SHA-512:4F79A36857D5A8AF1E2F938EF92EA75C384DE4789972B068BE82EADAA442C538A65035CCE8665A7283137E2075B8FE4C1C9E7B2A36585491683B4869005B772A
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                          Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Ila);_.iA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.iA,_.W);_.iA.Ba=function(){return{Xa:{cache:_.gt}}};_.iA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.LG(c)},this);return{}};_.qu(_.Ola,_.iA);._.l();._.k("ZDZcre");.var jH=function(a){_.W.call(this,a.Fa);this.Xl=a.Ea.Xl;this.j4=a.Ea.metadata;this.aa=a.Ea.wt};_.J(jH,_.W);jH.Ba=function(){return{Ea:{Xl:_.OG,metadata:_.b_a,wt:_.LG}}};jH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.j4.getType(c.Od())===2?b.Xl.Rb(c):b.Xl.fetch(c);return _.Bl(c,_.PG)?d.then(function(e){return _.Dd(e)}):d},this)};_.qu(_.Tla,jH);._.l();._.k("K5nYTd");._.a_a=new _.pf(_.Pla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var RG=function(a){_.W.call(this,a.Fa);this.aa=a.Ea.yQ};_.J(RG,_.W);RG.Ba=func
                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                          File Type:ASCII text, with very long lines (5693)
                          Category:downloaded
                          Size (bytes):698375
                          Entropy (8bit):5.594847180822494
                          Encrypted:false
                          SSDEEP:6144:TN3KfgnkxgOYoRvEoQvSXwojVlmGa/ZLniy7ZkvgTa5PB1+UO5Hx+B8U2+:TUMkxgOENagFxniZU+
                          MD5:9CB39A9BED5FF75EEA0E5CDECB8173A2
                          SHA1:17221DDCEBFCDD26C01E6EB9A8FB51CFCDE716E8
                          SHA-256:37D3F108CC80806B0C46B3D6A2084E33E7370124D3B8AAEF55588370CFEBC014
                          SHA-512:8C07EC9BEB91B345B25280EFD158D77F8E4A6F889A9CDFDECF734C12EDAC2D2FC329EF5F72D5DBF7A795E24E5D77A30E4072F8547FCF80560655AB737ED4658E
                          Malicious:false
                          URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.PqO-Y4U4tl0.es5.O/ck=boq-identity.AccountsSignInUi.nq70RHujW6U.L.B1.O/am=xMFgKBimEQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGthBVGBSp-YI0QYkOxVUgN-__l4g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                          Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.5838066792858605
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:file.exe
                          File size:919'040 bytes
                          MD5:1a7dbcfc4c8a85127db62a70e3a6635a
                          SHA1:fc7eb4ea4434971e13299eb018ac584457f8f77a
                          SHA256:3693f77573eeb4005fd0032086e7c3f79245dc04136fe430749ba0f92cf886af
                          SHA512:905b6571e1a7a5b9e8a8e4def0293d73536bf34bdb3d03ec13a863b3ea5755544f01002442b3687f296a1ddee86760cda23f9fb1012aa4430ea7b81e7a678e7d
                          SSDEEP:24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8a4oK:zTvC/MTQYxsWR7a4
                          TLSH:54159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                          Icon Hash:aaf3e3e3938382a0
                          Entrypoint:0x420577
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66FF5CAF [Fri Oct 4 03:10:39 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:948cc502fe9226992dce9417f952fce3
                          Instruction
                          call 00007F254D34E613h
                          jmp 00007F254D34DF1Fh
                          push ebp
                          mov ebp, esp
                          push esi
                          push dword ptr [ebp+08h]
                          mov esi, ecx
                          call 00007F254D34E0FDh
                          mov dword ptr [esi], 0049FDF0h
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          and dword ptr [ecx+04h], 00000000h
                          mov eax, ecx
                          and dword ptr [ecx+08h], 00000000h
                          mov dword ptr [ecx+04h], 0049FDF8h
                          mov dword ptr [ecx], 0049FDF0h
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          push dword ptr [ebp+08h]
                          mov esi, ecx
                          call 00007F254D34E0CAh
                          mov dword ptr [esi], 0049FE0Ch
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          and dword ptr [ecx+04h], 00000000h
                          mov eax, ecx
                          and dword ptr [ecx+08h], 00000000h
                          mov dword ptr [ecx+04h], 0049FE14h
                          mov dword ptr [ecx], 0049FE0Ch
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, ecx
                          lea eax, dword ptr [esi+04h]
                          mov dword ptr [esi], 0049FDD0h
                          and dword ptr [eax], 00000000h
                          and dword ptr [eax+04h], 00000000h
                          push eax
                          mov eax, dword ptr [ebp+08h]
                          add eax, 04h
                          push eax
                          call 00007F254D350CBDh
                          pop ecx
                          pop ecx
                          mov eax, esi
                          pop esi
                          pop ebp
                          retn 0004h
                          lea eax, dword ptr [ecx+04h]
                          mov dword ptr [ecx], 0049FDD0h
                          push eax
                          call 00007F254D350D08h
                          pop ecx
                          ret
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, ecx
                          lea eax, dword ptr [esi+04h]
                          mov dword ptr [esi], 0049FDD0h
                          push eax
                          call 00007F254D350CF1h
                          test byte ptr [ebp+08h], 00000001h
                          pop ecx
                          Programming Language:
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9bb8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xd40000x9bb80x9c003501cb9ed73fca1e895198be0cb43613False0.31665665064102566data5.3324163620701235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                          RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                          RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                          RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                          RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                          RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                          RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                          RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                          RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                          RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                          RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                          RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                          RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                          RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                          RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                          RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                          RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                          RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                          RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                          RT_RCDATA0xdc7b80xe7edata1.002964959568733
                          RT_GROUP_ICON0xdd6380x76dataEnglishGreat Britain0.6610169491525424
                          RT_GROUP_ICON0xdd6b00x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0xdd6c40x14dataEnglishGreat Britain1.15
                          RT_GROUP_ICON0xdd6d80x14dataEnglishGreat Britain1.25
                          RT_VERSION0xdd6ec0xdcdataEnglishGreat Britain0.6181818181818182
                          RT_MANIFEST0xdd7c80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                          DLLImport
                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                          PSAPI.DLLGetProcessMemoryInfo
                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                          UxTheme.dllIsThemeActive
                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                          Language of compilation systemCountry where language is spokenMap
                          EnglishGreat Britain
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 4, 2024 05:31:04.513986111 CEST49675443192.168.2.4173.222.162.32
                          Oct 4, 2024 05:31:05.613246918 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:05.613348007 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:05.613523006 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:05.616895914 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:05.616920948 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.259505987 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.271455050 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.271517038 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.272809982 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.272902012 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.275382042 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.275465965 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.290992975 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.291486979 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.294898987 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.294980049 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.340769053 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.530235052 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.530424118 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.530560970 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.531003952 CEST49730443192.168.2.4142.250.186.174
                          Oct 4, 2024 05:31:06.531045914 CEST44349730142.250.186.174192.168.2.4
                          Oct 4, 2024 05:31:06.541099072 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:06.541151047 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:06.541218996 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:06.541434050 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:06.541446924 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.176553965 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.177154064 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.177217007 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.177772999 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.177848101 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.178771019 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.178831100 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.179789066 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.179872036 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.180016994 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.180032015 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.231400967 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.478360891 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.478415966 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.478581905 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:07.478585958 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.478651047 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.480897903 CEST49736443192.168.2.4216.58.212.142
                          Oct 4, 2024 05:31:07.480942965 CEST44349736216.58.212.142192.168.2.4
                          Oct 4, 2024 05:31:09.773607016 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:09.773699045 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:09.773775101 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:09.773992062 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:09.774017096 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:10.183533907 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:10.183564901 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:10.183643103 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:10.185920000 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:10.185933113 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:10.444714069 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:10.444988012 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:10.445002079 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:10.446444988 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:10.446513891 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:10.447509050 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:10.447592974 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:10.497126102 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:10.497133017 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:10.543998957 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:10.833185911 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:10.833307981 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:10.937779903 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:10.937802076 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:10.938731909 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:10.981890917 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.011737108 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.055406094 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.197107077 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.197253942 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.197308064 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.197460890 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.197488070 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.197500944 CEST49743443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.197508097 CEST44349743184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.239423990 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.239470959 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.239531994 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.239810944 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.239824057 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.883245945 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.883352041 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.885070086 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.885090113 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.885878086 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:11.887069941 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:11.931406975 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:12.155914068 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:12.155978918 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:12.156585932 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:12.161887884 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:12.161922932 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:12.161950111 CEST49745443192.168.2.4184.28.90.27
                          Oct 4, 2024 05:31:12.161964893 CEST44349745184.28.90.27192.168.2.4
                          Oct 4, 2024 05:31:14.468436956 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:14.468508959 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:14.468580961 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:14.468756914 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:14.468775034 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.108688116 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.108887911 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.108933926 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.109457970 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.109541893 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.110059023 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.110119104 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.110975027 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.111040115 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.111108065 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.111123085 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.154314041 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.429023027 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.429064989 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.429132938 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.429194927 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.429270029 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.429321051 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.434974909 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.435050011 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.435065985 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.441170931 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.441211939 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.441241026 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.441257000 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.441315889 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.447566986 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.447645903 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.453716993 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.453768969 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.453804016 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.453846931 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.517276049 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.517345905 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.517376900 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.517411947 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.517466068 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.518188000 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.518256903 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.524341106 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.524418116 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.524816036 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.524869919 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.530850887 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.530937910 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.537012100 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.537085056 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.537101030 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.543404102 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.543482065 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.543498039 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.549660921 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.549740076 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.549738884 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.549799919 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.570576906 CEST49756443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:31:15.570617914 CEST44349756142.250.184.238192.168.2.4
                          Oct 4, 2024 05:31:15.863688946 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:15.863738060 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:15.863821983 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:15.864053965 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:15.864072084 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:15.901985884 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:15.902044058 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:15.902142048 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:15.902565956 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:15.902584076 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.520500898 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.520781040 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.520812988 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.522361040 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.522459984 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.524888992 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.524959087 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.525749922 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.525983095 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.526158094 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.536079884 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.536338091 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.536402941 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.536957979 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.537061930 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.537955999 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.538028002 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.538172007 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.538258076 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.538300037 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.577080965 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.577140093 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.578986883 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.579015017 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.625210047 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.625236988 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.799129963 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.799195051 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.799371958 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.799597025 CEST49760443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.799645901 CEST44349760216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.800437927 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.800482035 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.800566912 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.800854921 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.800868034 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.812460899 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.812669992 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.812753916 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.812865019 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.812865019 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.812907934 CEST44349761216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.812952995 CEST49761443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.813487053 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.813566923 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:16.813640118 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.813803911 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:16.813822031 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.375401020 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:17.375437021 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:17.375515938 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:17.376943111 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:17.376959085 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:17.434591055 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.435822964 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.435832024 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.436871052 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.436939955 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.437491894 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.437541962 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.437681913 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.437735081 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.437819004 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.437825918 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.437844038 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.476978064 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.477180958 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.477242947 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.477754116 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.477962971 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.478749990 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.478805065 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.479110956 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.479199886 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.479243994 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.479325056 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.479341984 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.483408928 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.491734982 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.522665024 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.631994963 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.632272959 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.632328987 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.633104086 CEST49764443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.633116961 CEST44349764216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.675520897 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.675810099 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:17.675873041 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.676336050 CEST49765443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:17.676372051 CEST44349765216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:18.058754921 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:18.058815956 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:18.131346941 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:18.131362915 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:18.131699085 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:18.185177088 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:18.344130039 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:18.391434908 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615184069 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615293026 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615355015 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:18.615375042 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615437031 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615617037 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615677118 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:18.615731001 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615782976 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:18.615798950 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615852118 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.615988970 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:18.617280006 CEST49741443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:31:18.617311001 CEST44349741142.250.186.164192.168.2.4
                          Oct 4, 2024 05:31:18.833904028 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:18.879405022 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058435917 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058476925 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058485985 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058531046 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.058546066 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058562040 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.058568954 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058595896 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.058604002 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058617115 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058628082 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.058650970 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.058670998 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.058707952 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.058737040 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.059070110 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.059137106 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:19.059215069 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.566139936 CEST49766443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:19.566169024 CEST44349766172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:21.590912104 CEST4972380192.168.2.493.184.221.240
                          Oct 4, 2024 05:31:21.596426964 CEST804972393.184.221.240192.168.2.4
                          Oct 4, 2024 05:31:21.596479893 CEST4972380192.168.2.493.184.221.240
                          Oct 4, 2024 05:31:23.500313997 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:23.500375032 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:23.500461102 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:23.500798941 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:23.500818014 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.170094013 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.170497894 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.170564890 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.171902895 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.172213078 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.172406912 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.172406912 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.172422886 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.172456026 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.216223001 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.474396944 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.474706888 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:24.474817038 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.499651909 CEST49780443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:24.499679089 CEST44349780216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:46.328037024 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:46.328139067 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:46.328244925 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:46.328692913 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:46.328767061 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.123256922 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.123652935 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.123714924 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.124237061 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.124515057 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.124644995 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.124665022 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.124690056 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.125339031 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.168997049 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.402381897 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.402719021 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.403012991 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.403337955 CEST49781443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.403434992 CEST44349781216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.436600924 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.436697006 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.437006950 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.437119961 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.437151909 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.952892065 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.952991009 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:47.953089952 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.953322887 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:47.953345060 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.094391108 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.094847918 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.094916105 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.096188068 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.096599102 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.096689939 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.096690893 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.096729040 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.096805096 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.137927055 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.374385118 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.374560118 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.374623060 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.375107050 CEST49782443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.375133991 CEST44349782216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.610178947 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.610532045 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.610564947 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.611051083 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.611326933 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.611404896 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.611485958 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.611505985 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.611515999 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.806307077 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.806392908 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:48.806461096 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.807010889 CEST49783443192.168.2.4216.58.206.78
                          Oct 4, 2024 05:31:48.807032108 CEST44349783216.58.206.78192.168.2.4
                          Oct 4, 2024 05:31:56.545294046 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:56.545396090 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:56.545509100 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:56.546267033 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:56.546298981 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.248523951 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.248624086 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.254345894 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.254401922 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.254982948 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.269124985 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.315416098 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.517174006 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.517270088 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.517318010 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.517467976 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.517468929 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.517535925 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.517607927 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.518074989 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.518161058 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.518285990 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.518325090 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.518325090 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.518393993 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.525424004 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.525424004 CEST49784443192.168.2.4172.202.163.200
                          Oct 4, 2024 05:31:57.525491953 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:57.525527000 CEST44349784172.202.163.200192.168.2.4
                          Oct 4, 2024 05:31:58.220273972 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:58.220376968 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:58.220489979 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:58.220926046 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:58.220983028 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:58.865753889 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:58.866142988 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:58.981744051 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:58.981791019 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:58.982909918 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.028690100 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.067073107 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.111414909 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.165817022 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.165877104 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.165894985 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.166002989 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.166007996 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.166002989 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.166069031 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.166105032 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.166162014 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.166162014 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.250775099 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.250849962 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.250981092 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.250981092 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.251049042 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.251126051 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.252242088 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.252293110 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.252423048 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.252423048 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.252487898 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.252578020 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.336920977 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.336945057 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.336997032 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.337030888 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.337049961 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.337074995 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.337094069 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.337136984 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.337150097 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.337160110 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.337209940 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.338187933 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.338228941 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.338257074 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.338263988 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.338291883 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.338311911 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.339148998 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.339190960 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.339216948 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.339225054 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.339242935 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.339261055 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.422713041 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.422753096 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.422908068 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.422908068 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.422940016 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.423007011 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.423290014 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.423327923 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.423429966 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.423429966 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.423461914 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.423688889 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424088955 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.424130917 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.424165964 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424185038 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.424201965 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424247026 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424663067 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.424701929 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.424726009 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424734116 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.424748898 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424762964 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.424772024 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.425350904 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.425390959 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.425415993 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.425424099 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.425453901 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.425472975 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426286936 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426326036 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426362991 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426372051 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426387072 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426388025 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426441908 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426450014 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426476002 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426563978 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426597118 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426615000 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426615000 CEST49785443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.426625013 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.426635027 CEST4434978513.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.469757080 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.469851017 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.470062971 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.470422983 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.470500946 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.471312046 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.471416950 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.471493006 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.471662045 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.471683979 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.472783089 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.472877026 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.472950935 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.473550081 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.473592043 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.473647118 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.473685026 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.473766088 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.474395990 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.474422932 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.474486113 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.474514008 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.474530935 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:31:59.474575043 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:31:59.474581957 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.112452984 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.113410950 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.113481045 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.114099026 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.114113092 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.114204884 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.114684105 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.114731073 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.115067959 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.115076065 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.127087116 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.127809048 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.127897024 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.128494978 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.128547907 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.154563904 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.155271053 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.155292034 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.155805111 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.155810118 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.211169004 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.211225033 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.211361885 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.211493969 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.211493969 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.211752892 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.211752892 CEST49786443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.211795092 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.211817026 CEST4434978613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.212512016 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.212560892 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.212683916 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.212707996 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.212738037 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.212841988 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.212862968 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.212896109 CEST49789443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.212903023 CEST4434978913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.214827061 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.214858055 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.214879036 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.214947939 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.214951038 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.215030909 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.215075970 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.215084076 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.215317011 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.215426922 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.228336096 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.228490114 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.228550911 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.228907108 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.228907108 CEST49787443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.228974104 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.229011059 CEST4434978713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.231235981 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.231329918 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.231515884 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.231585026 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.231602907 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.261148930 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.261214972 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.261513948 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.261513948 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.261513948 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.263561010 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.263648987 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.263823986 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.263894081 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.263914108 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.562155008 CEST49790443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.562180042 CEST4434979013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.855978966 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.856868982 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.856930017 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.857213974 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.857225895 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.884576082 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.885226965 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.885265112 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.885673046 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.885682106 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.939985991 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.940498114 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.940560102 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.940931082 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.940938950 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.959034920 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.959170103 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.959239960 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.959350109 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.959350109 CEST49792443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.959423065 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.959448099 CEST4434979213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.962388992 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.962438107 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.962510109 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.962647915 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.962666035 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.985321045 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.985485077 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.985635042 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.985687971 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.985687971 CEST49793443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.985714912 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.985729933 CEST4434979313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.988280058 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.988313913 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:00.988457918 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.988538027 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:00.988543987 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.045183897 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.045262098 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.045443058 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.045497894 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.045497894 CEST49794443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.045522928 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.045541048 CEST4434979413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.048345089 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.048438072 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.048577070 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.048690081 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.048711061 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.205307961 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.205826044 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.205885887 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.206370115 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.206387997 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.254508972 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.255014896 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.255033970 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.255330086 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.255341053 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.310009003 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.310091972 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.310269117 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.310266972 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.310266972 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.310324907 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.310559988 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.310600042 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.310626030 CEST49788443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.310641050 CEST4434978813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.313242912 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.313333988 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.313622952 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.313623905 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.313783884 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.357971907 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.358129025 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.358292103 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.358292103 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.358292103 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.360234022 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.360276937 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.360341072 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.360450983 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.360459089 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.670090914 CEST49791443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.670160055 CEST4434979113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.796561003 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.797200918 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.797214031 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.797631979 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.797637939 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.803262949 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.803623915 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.803683043 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.803730965 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.803925037 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.803951979 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.803967953 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.804059029 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.804236889 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.804256916 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.895958900 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.896116018 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.896174908 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.896316051 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.896339893 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.896353960 CEST49796443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.896365881 CEST4434979613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.899243116 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.899295092 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.899373055 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.899502039 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.899511099 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.905796051 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.905946016 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.906018019 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.906094074 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.906094074 CEST49795443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.906136990 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.906162977 CEST4434979513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.908031940 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.908107042 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.908165932 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.908212900 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.908236027 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.908252001 CEST49797443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.908258915 CEST4434979713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.908430099 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.908519030 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.908591032 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.908730984 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.908749104 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.910270929 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.910290956 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.910361052 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.910458088 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.910474062 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.959825993 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.960262060 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.960293055 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.960730076 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.960740089 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.998362064 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.998944044 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.998961926 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:01.999340057 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:01.999346972 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.066538095 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.066637039 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.066724062 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.066930056 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.066956997 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.066972017 CEST49798443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.066978931 CEST4434979813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.069802999 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.069854975 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.069957972 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.070116043 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.070130110 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.097851038 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.097927094 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.097990990 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.098118067 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.098149061 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.098165035 CEST49799443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.098172903 CEST4434979913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.100384951 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.100431919 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.100610018 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.100673914 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.100688934 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.548208952 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.548279047 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.548743963 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.548779011 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.548823118 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.548852921 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.549211979 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.549217939 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.549305916 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.549313068 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.584997892 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.585395098 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.585417986 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.585781097 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.585786104 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.646481991 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.646565914 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.646621943 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.646771908 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.646800041 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.646821976 CEST49801443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.646830082 CEST4434980113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.649388075 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.649475098 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.649478912 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.649552107 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.649673939 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.649699926 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.649734974 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.649735928 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.649837017 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.649863958 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.649878979 CEST49800443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.649888039 CEST4434980013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.651631117 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.651652098 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.651717901 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.651838064 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.651850939 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.690515041 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.690597057 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.690654993 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.690756083 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.690776110 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.690789938 CEST49802443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.690795898 CEST4434980213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.692706108 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.692800999 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.692889929 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.693011045 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.693064928 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.734544039 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.734611988 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.755338907 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.755403042 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.755790949 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.755796909 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.756064892 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.756098986 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.756407022 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.756413937 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.851232052 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.851442099 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.851509094 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.851589918 CEST49804443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.851634026 CEST4434980413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.855221987 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.855458021 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.855521917 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.856815100 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.856832981 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.856846094 CEST49803443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.856853962 CEST4434980313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.864957094 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.865048885 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.865119934 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.866146088 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.866183996 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.866240978 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.866889954 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.866908073 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:02.866944075 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:02.867026091 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.292090893 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.292737007 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.292817116 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.293050051 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.293064117 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.309963942 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.310285091 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.310312986 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.310647011 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.310656071 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.344626904 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.345067024 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.345155954 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.345459938 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.345514059 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.391777992 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.391941071 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.392026901 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.392106056 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.392106056 CEST49806443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.392148972 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.392174959 CEST4434980613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.394582987 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.394618034 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.394695997 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.394831896 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.394840002 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.410104036 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.410252094 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.410362005 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.410389900 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.410403013 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.410449982 CEST49805443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.410464048 CEST4434980513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.412395954 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.412488937 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.412589073 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.412672043 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.412693977 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.445406914 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.445472002 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.445537090 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.445638895 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.445687056 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.445718050 CEST49807443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.445735931 CEST4434980713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.448086977 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.448177099 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.448260069 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.448369980 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.448405981 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.517471075 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.517939091 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.518026114 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.518345118 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.518359900 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.527439117 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.527734041 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.527756929 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.528142929 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.528148890 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.617305994 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.617480040 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.617680073 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.617680073 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.617680073 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.619435072 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.619524956 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.619607925 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.619721889 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.619750023 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.637217045 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.637420893 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.637489080 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.637615919 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.637629986 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.637665033 CEST49809443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.637671947 CEST4434980913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.639848948 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.639872074 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.639949083 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.640068054 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.640094042 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:03.930052042 CEST49808443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:03.930119991 CEST4434980813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.044328928 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.059300900 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.059323072 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.062886000 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.062892914 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.079308033 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.085088015 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.085149050 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.085510969 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.085524082 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.095043898 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.096147060 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.096204996 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.096576929 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.096590042 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.159554958 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.159722090 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.159799099 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.160034895 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.160057068 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.160069942 CEST49810443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.160079956 CEST4434981013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.163965940 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.164026022 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.164227962 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.164787054 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.164829969 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.185022116 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.185200930 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.185260057 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.186002970 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.186002970 CEST49811443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.186045885 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.186074972 CEST4434981113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.188257933 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.188344955 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.189126968 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.189255953 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.189289093 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.196814060 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.196885109 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.196952105 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.197067976 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.197088957 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.197134972 CEST49812443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.197148085 CEST4434981213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.198843956 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.198904037 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.199027061 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.199140072 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.199176073 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.259449959 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.262309074 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.262387037 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.262706995 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.262721062 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.280865908 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.283324003 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.283354998 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.283725023 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.283735991 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.358079910 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.358247995 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.358324051 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.358397007 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.358397007 CEST49813443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.358433962 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.358458996 CEST4434981313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.360615015 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.360702991 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.360785961 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.360893011 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.360914946 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.379801035 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.379951954 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.380019903 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.380058050 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.380058050 CEST49814443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.380072117 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.380089998 CEST4434981413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.381836891 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.381916046 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.381993055 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.382119894 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.382153034 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.804922104 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.809169054 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.809217930 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.809647083 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.809659958 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.828488111 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.828838110 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.828880072 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.829211950 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.829226017 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.848696947 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.849122047 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.849174023 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.849476099 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.849487066 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.905313969 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.905463934 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.905659914 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.905661106 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.905661106 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.908478975 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.908571959 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.908648968 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.908796072 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.908824921 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.928282976 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.928431988 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.928499937 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.928550959 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.928550959 CEST49816443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.928577900 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.928592920 CEST4434981613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.930891991 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.930932045 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.930999994 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.931171894 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.931188107 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.950006008 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.950145006 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.950225115 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.950225115 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.950225115 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.952565908 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.952591896 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:04.952644110 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.952951908 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:04.952967882 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.012567997 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.013088942 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.013144016 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.013519049 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.013531923 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.049721003 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.050137997 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.050196886 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.050458908 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.050472021 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.112879992 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.113015890 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.113168001 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.113205910 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.113235950 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.113284111 CEST49818443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.113298893 CEST4434981813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.115158081 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.115248919 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.115356922 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.115477085 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.115497112 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.153275967 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.153425932 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.153484106 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.153702974 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.153738022 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.153764963 CEST49819443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.153795004 CEST4434981913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.156143904 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.156176090 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.156240940 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.156393051 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.156405926 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.216193914 CEST49815443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.216237068 CEST4434981513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.262957096 CEST49817443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.262990952 CEST4434981713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.567332029 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.567869902 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.567953110 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.568315029 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.568330050 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.576540947 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.576831102 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.576860905 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.577162027 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.577171087 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.614684105 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.615073919 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.615108967 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.615437984 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.615444899 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.665651083 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.665791035 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.665870905 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.666016102 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.666064024 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.666101933 CEST49820443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.666119099 CEST4434982013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.668818951 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.668852091 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.669014931 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.669109106 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.669116974 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.690671921 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.690826893 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.690882921 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.691090107 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.691099882 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.691113949 CEST49821443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.691118956 CEST4434982113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.693240881 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.693327904 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.693420887 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.693569899 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.693597078 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.717681885 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.717809916 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.717868090 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.717914104 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.717921972 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.717953920 CEST49822443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.717957973 CEST4434982213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.719744921 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.719847918 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.719934940 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.720051050 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.720081091 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.754323006 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.754796028 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.754879951 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.755129099 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.755143881 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.823010921 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.823354959 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.823376894 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.823724985 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.823729038 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.892837048 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.893012047 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.893394947 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.893394947 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.893394947 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.896053076 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.896164894 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.896384001 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.896450043 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.896467924 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.926599979 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.926739931 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.926795006 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.926853895 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.926875114 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.926903009 CEST49825443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.926908970 CEST4434982513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.928899050 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.928924084 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:05.928992033 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.929136992 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:05.929152966 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.200392962 CEST49823443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.200464964 CEST4434982313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.339792967 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.344219923 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.345707893 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.345733881 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.346779108 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.346782923 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.347116947 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.347141981 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.347470045 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.347476959 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.355463028 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.355710983 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.355732918 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.356020927 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.356026888 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.443046093 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.443176031 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.443236113 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.444365025 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.444390059 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.444405079 CEST49827443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.444412947 CEST4434982713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.446074009 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.446212053 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.446270943 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.454545021 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.454603910 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.454641104 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.455421925 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.455421925 CEST49826443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.455461025 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.455485106 CEST4434982613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.467478991 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.467495918 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.467509031 CEST49828443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.467515945 CEST4434982813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.471204042 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.471242905 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.471297026 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.472352028 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.472398043 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.472445965 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.472656965 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.472673893 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.472733021 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.472749949 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.473666906 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.473709106 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.473757029 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.473850012 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.473867893 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.530890942 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.531621933 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.531656981 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.532200098 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.532206059 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.576239109 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.578105927 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.578119993 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.578490973 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.578495979 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.629626989 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.629690886 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.629731894 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.629920959 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.629940033 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.629952908 CEST49829443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.629960060 CEST4434982913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.632694006 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.632740021 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.632790089 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.632910967 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.632925034 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.677247047 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.677309990 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.677445889 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.677577972 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.677598953 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.677615881 CEST49830443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.677623034 CEST4434983013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.679519892 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.679563046 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:06.679631948 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.679752111 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:06.679765940 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.113682985 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.114170074 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.114206076 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.114588022 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.114599943 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.137188911 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.137537003 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.137567997 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.137897968 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.137908936 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.151077032 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.151408911 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.151469946 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.151747942 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.151762009 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.211827040 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.211961985 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.212023973 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.212131023 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.212131023 CEST49831443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.212167978 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.212192059 CEST4434983113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.215820074 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.215873957 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.215945005 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.216099024 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.216113091 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.240541935 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.240598917 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.240663052 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.240740061 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.240787029 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.240816116 CEST49833443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.240833044 CEST4434983313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.242671967 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.242706060 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.242759943 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.242887020 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.242897034 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.254971981 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.255115986 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.255172014 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.255243063 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.255244017 CEST49832443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.255280018 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.255305052 CEST4434983213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.257009029 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.257016897 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.257067919 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.257210970 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.257220030 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.282490969 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.282823086 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.282865047 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.283195972 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.283210039 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.322895050 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.323559999 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.323641062 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.323911905 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.323965073 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.421266079 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.421427965 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.421660900 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.422157049 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.422157049 CEST49835443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.422224998 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.422259092 CEST4434983513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.423264980 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.423355103 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.423446894 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.423785925 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.423867941 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.667743921 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.667898893 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.668071985 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.668176889 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.668225050 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.668255091 CEST49834443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.668272018 CEST4434983413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.671195984 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.671291113 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.671371937 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.671502113 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.671521902 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.860104084 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.860786915 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.860848904 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.861452103 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.861505985 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.907767057 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.908261061 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.908284903 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.908690929 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.908695936 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.911658049 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.911895037 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.911912918 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.912169933 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.912173986 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.960254908 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.960410118 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.960479975 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.960587025 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.960587025 CEST49836443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.960632086 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.960658073 CEST4434983613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.963124990 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.963234901 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:07.963311911 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.963452101 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:07.963473082 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.011157036 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.011203051 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.011240959 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.011373997 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.011392117 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.011404037 CEST49837443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.011409998 CEST4434983713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.011840105 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.011981964 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.012036085 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.012072086 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.012075901 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.012084961 CEST49838443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.012088060 CEST4434983813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.013593912 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.013629913 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.013695955 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.013875008 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.013902903 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.014728069 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.014816999 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.014899015 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.015065908 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.015105963 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.091480970 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.091955900 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.092036963 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.092204094 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.092231035 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.194227934 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.194391012 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.194725037 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.194866896 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.194866896 CEST49839443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.194919109 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.194956064 CEST4434983913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.196532011 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.196562052 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.196768045 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.196768045 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.196810007 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.349647045 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.350265026 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.350326061 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.350732088 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.350785017 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.455259085 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.455467939 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.455857038 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.456614971 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.456615925 CEST49840443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.456681967 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.456717014 CEST4434984013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.458466053 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.458559036 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.459012985 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.459012985 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.459140062 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.630644083 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.631146908 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.631192923 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.631635904 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.631643057 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.682096004 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.682614088 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.682674885 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.682730913 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.683031082 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.683084965 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.683526993 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.683562040 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.683876991 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.683888912 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.732630014 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.732779026 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.732851028 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.733510017 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.733530998 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.733545065 CEST49841443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.733551979 CEST4434984113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.736705065 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.736799002 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.736882925 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.736988068 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.737009048 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.784929037 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.785085917 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.785187006 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.786940098 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.787000895 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.787194967 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.832426071 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.832458973 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.832519054 CEST49842443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.832525969 CEST4434984213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.833704948 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.833704948 CEST49843443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.833774090 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.833808899 CEST4434984313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.836237907 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.836286068 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.836471081 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.836767912 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.836824894 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.836874962 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.836940050 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.836971045 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.837021112 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.837033033 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.889960051 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.933765888 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.961559057 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.961570978 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:08.962290049 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:08.962295055 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.071429968 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.071508884 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.071552038 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.071715117 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.071734905 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.071748972 CEST49844443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.071754932 CEST4434984413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.074361086 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.074450016 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.074522018 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.074651003 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.074671030 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.139266968 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.139698982 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.139760971 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.140113115 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.140125990 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.243690968 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.243825912 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.243995905 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.243995905 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.243995905 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.246186972 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.246287107 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.246376991 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.246498108 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.246519089 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.370527029 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.371120930 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.371160030 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.371604919 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.371613979 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.469533920 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.469679117 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.469755888 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.469861031 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.469883919 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.469897032 CEST49846443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.469903946 CEST4434984613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.470925093 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.471251011 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.471268892 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.471652031 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.471656084 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.472568035 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.472592115 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.472660065 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.472799063 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.472804070 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.491214991 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.491514921 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.491559029 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.491878986 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.491885900 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.544378042 CEST49845443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.544389009 CEST4434984513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.591710091 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.591869116 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.591922998 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.591969967 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.591969967 CEST49847443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.591989040 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.592000008 CEST4434984713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.594074965 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.594158888 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.594237089 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.594336033 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.594358921 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.603909969 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.603955984 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.603997946 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.604074001 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.604087114 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.604096889 CEST49848443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.604101896 CEST4434984813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.605792046 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.605884075 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.605988979 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.606339931 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.606420040 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.748946905 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.749525070 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.749629021 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.749983072 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.750036955 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.826956034 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:09.827044964 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:09.827219963 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:09.827438116 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:09.827478886 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:09.853884935 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.853955984 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.854134083 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.854218006 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.854218960 CEST49849443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.854262114 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.854293108 CEST4434984913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.856631041 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.856689930 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.856775999 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.856977940 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.857003927 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.897496939 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.897850990 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.897927999 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.898231983 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:09.898245096 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.998862982 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.999023914 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:09.999228001 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.000168085 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.000168085 CEST49850443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.000236034 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.000271082 CEST4434985013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.003791094 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.003817081 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.003875971 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.004131079 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.004138947 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.113609076 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.114173889 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.114187956 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.114613056 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.114617109 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.212585926 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.212752104 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.212807894 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.212843895 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.212857962 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.212869883 CEST49851443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.212874889 CEST4434985113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.215477943 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.215569973 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.215670109 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.215780973 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.215807915 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.259378910 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.259737968 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.259773016 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.260159969 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.260170937 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.266961098 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.267343998 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.267405033 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.267822027 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.267874956 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370492935 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370563984 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370618105 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.370735884 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.370735884 CEST49852443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.370762110 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370786905 CEST4434985213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370810032 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370852947 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.370891094 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.370981932 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.371007919 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.371023893 CEST49853443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.371032000 CEST4434985313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.374162912 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.374253035 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.374392986 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.374646902 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.374680042 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.374730110 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.374914885 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.374974966 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.374985933 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.375020027 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.450939894 CEST4972480192.168.2.493.184.221.240
                          Oct 4, 2024 05:32:10.456768990 CEST804972493.184.221.240192.168.2.4
                          Oct 4, 2024 05:32:10.456882954 CEST4972480192.168.2.493.184.221.240
                          Oct 4, 2024 05:32:10.462817907 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:10.463239908 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:10.463304996 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:10.464467049 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:10.464771032 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:10.464956999 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:10.493289948 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.493798018 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.493843079 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.494227886 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.494239092 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.513262987 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:10.591653109 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.591809988 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.591886044 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.592097044 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.592116117 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.592171907 CEST49855443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.592185974 CEST4434985513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.594861984 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.594897985 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.594980955 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.595154047 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.595168114 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.687778950 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.688206911 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.688221931 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.688570023 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.688574076 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.793872118 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.794039011 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.794089079 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.794307947 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.794327021 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.794337988 CEST49856443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.794343948 CEST4434985613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.797064066 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.797161102 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.797252893 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.797384977 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.797409058 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.857198000 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.857697010 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.857785940 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.858104944 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.858159065 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.956695080 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.956856966 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.957158089 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.957246065 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.957287073 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.957336903 CEST49857443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.957355022 CEST4434985713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.959882975 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.959974051 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:10.960283995 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.960284948 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:10.960412979 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.019799948 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.020138025 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.020232916 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.020603895 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.020617962 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.020906925 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.021183968 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.021202087 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.021522045 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.021526098 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.120385885 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.120543003 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.120628119 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.120727062 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.120774984 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.120806932 CEST49858443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.120824099 CEST4434985813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.121902943 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.121958017 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.122001886 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.122467041 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.122487068 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.122495890 CEST49859443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.122499943 CEST4434985913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.124254942 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.124350071 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.124473095 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.124660969 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.124682903 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.125467062 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.125559092 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.125649929 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.125729084 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.125762939 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.235249996 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.235752106 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.235802889 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.239097118 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.239109993 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.334510088 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.334671974 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.334839106 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.335875988 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.335912943 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.335938931 CEST49860443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.335954905 CEST4434986013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.360719919 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.360830069 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.360918999 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.364021063 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.364057064 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.477952957 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.478559017 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.478617907 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.478883028 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.478899956 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.582684040 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.582839966 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.582997084 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.583172083 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.583172083 CEST49861443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.583205938 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.583230972 CEST4434986113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.585640907 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.585762024 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.586126089 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.586126089 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.586258888 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.614684105 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.615179062 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.615288019 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.615679979 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.615732908 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.714797020 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.714932919 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.715264082 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.716192961 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.716192961 CEST49862443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.716259956 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.716295004 CEST4434986213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.718127966 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.718214989 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.718328953 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.718463898 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.718502998 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.764502048 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.765033007 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.765091896 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.765436888 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.765449047 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.788150072 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.788667917 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.788755894 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.789058924 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.789113045 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.862370014 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.862396002 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.862456083 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.862463951 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.862504005 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.862761021 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.862793922 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.862817049 CEST49863443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.862831116 CEST4434986313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.865685940 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.865735054 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.865904093 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.866039038 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.866067886 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.891695976 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.891745090 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.891944885 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.892239094 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.892239094 CEST49864443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.892309904 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.892344952 CEST4434986413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.894265890 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.894349098 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:11.894448996 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.894615889 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:11.894649982 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.005894899 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.006325006 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.006398916 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.006706953 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.006720066 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.106307983 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.106466055 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.106538057 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.106676102 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.106676102 CEST49865443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.106714010 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.106738091 CEST4434986513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.110361099 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.110466957 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.112073898 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.113467932 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.113503933 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.222999096 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.223443985 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.223467112 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.223855019 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.223867893 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.320636034 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.320688963 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.320820093 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.320924044 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.321043968 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.321090937 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.321120024 CEST49866443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.321135998 CEST4434986613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.324218035 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.324268103 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.324354887 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.324585915 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.324605942 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.386080027 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.386658907 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.386722088 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.386993885 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.387008905 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.489906073 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.489962101 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.490094900 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.490278006 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.490278006 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.490381956 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.490381956 CEST49867443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.490426064 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.490454912 CEST4434986713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.493771076 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.493860960 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.493978024 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.494204044 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.494240999 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.527476072 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.530785084 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.530858994 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.531224966 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.531238079 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.541595936 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.542397976 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.542427063 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.542706966 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.542712927 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.643165112 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.643325090 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.643421888 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.643605947 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.643621922 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.643668890 CEST49869443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.643676043 CEST4434986913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.644172907 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.644227982 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.644299984 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.644320965 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.644359112 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.644423962 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.644748926 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.644748926 CEST49868443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.644768000 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.644779921 CEST4434986813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.647562981 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.647651911 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.647726059 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.647819042 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.647839069 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.648000956 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.648040056 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.648062944 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.648176908 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.648200989 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.785288095 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.785845041 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.785872936 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.786226988 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.786238909 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.877010107 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.877439976 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.877470970 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.877820969 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.877829075 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.889194965 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.889349937 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.889436007 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.889599085 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.889628887 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.889659882 CEST49870443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.889672995 CEST4434987013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.893368959 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.893460989 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.893703938 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.893822908 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.893853903 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.977317095 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.977494001 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.977557898 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.977871895 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.977895021 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.977909088 CEST49871443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.977916002 CEST4434987113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.984987974 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.985076904 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:12.985162973 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.985714912 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:12.985749960 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.147097111 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.147701025 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.147723913 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.148130894 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.148133993 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.247112989 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.247243881 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.247452974 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.247544050 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.247544050 CEST49872443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.247591019 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.247627020 CEST4434987213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.250380993 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.250418901 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.250504971 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.250602007 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.250610113 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.287837982 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.288305998 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.288367033 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.288969040 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.288980961 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.312567949 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.312971115 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.313005924 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.313325882 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.313337088 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.387249947 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.387449980 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.387557983 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.387885094 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.387929916 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.387960911 CEST49873443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.387978077 CEST4434987313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.391294003 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.391324043 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.391554117 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.391724110 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.391733885 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.414427042 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.414566994 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.414638042 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.414758921 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.414791107 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.414819956 CEST49874443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.414832115 CEST4434987413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.417514086 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.417606115 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.417714119 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.417877913 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.417911053 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.535254955 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.536257029 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.536286116 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.536827087 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.536880016 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.633846998 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.634001017 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.634193897 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.634314060 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.634365082 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.634396076 CEST49875443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.634412050 CEST4434987513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.636521101 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.637204885 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.637278080 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.637873888 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.637887001 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.639096022 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.639194965 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.639281034 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.639486074 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.639509916 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.736954927 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.737123013 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.737318993 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.749878883 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.749947071 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.750005007 CEST49876443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.750025034 CEST4434987613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.825196981 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.825258970 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.825452089 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.857599020 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.857640028 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.918118954 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.925095081 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.925111055 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:13.929792881 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:13.929797888 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.030711889 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.030862093 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.030930996 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.040023088 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.040045977 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.040060997 CEST49877443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.040069103 CEST4434987713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.045555115 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.073954105 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.073971033 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.085155964 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.085165024 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.090333939 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.090380907 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.090454102 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.090620995 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.090641022 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.097291946 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.098033905 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.098098040 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.099111080 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.099164009 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.182260990 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.182426929 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.182492971 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.182648897 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.182672977 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.182684898 CEST49878443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.182692051 CEST4434987813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.185911894 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.186007023 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.186099052 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.186393976 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.186428070 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.201869011 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.201936007 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.202007055 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.202085018 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.202120066 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.202188015 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.202229977 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.202270031 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.202296019 CEST49879443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.202311039 CEST4434987913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.204204082 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.204260111 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.204340935 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.204487085 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.204513073 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.306534052 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.307151079 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.307173967 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.307590961 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.307601929 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.408802986 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.409020901 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.409101963 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.409285069 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.409316063 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.409342051 CEST49880443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.409357071 CEST4434988013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.411936045 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.412029982 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.412136078 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.412327051 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.412368059 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.537098885 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.537693024 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.537724018 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.538180113 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.538187027 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.643012047 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.643090010 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.643143892 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.643176079 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.643204927 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.643259048 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.643455982 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.643476963 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.643491030 CEST49881443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.643497944 CEST4434988113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.647645950 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.647737026 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.647830963 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.647985935 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.648015976 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.757802963 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.758501053 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.758533955 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.758775949 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.758784056 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.830173016 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.835282087 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.835316896 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.836018085 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.836025000 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.840497971 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.843194008 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.843213081 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.843657017 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.843662024 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.867996931 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.868117094 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.868187904 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.868412971 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.868439913 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.868455887 CEST49882443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.868463039 CEST4434988213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.871803999 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.871876955 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.871984005 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.872147083 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.872172117 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.938549042 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.938668013 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.938734055 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.938997984 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.939018011 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.939033985 CEST49883443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.939042091 CEST4434988313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.942198038 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.942228079 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.942316055 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.942468882 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.942478895 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.944217920 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.944370031 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.944437981 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.944488049 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.944498062 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.944515944 CEST49884443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.944521904 CEST4434988413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.946583986 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.946630001 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:14.946712017 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.946818113 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:14.946837902 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.056566954 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.057260036 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.057324886 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.057768106 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.057781935 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.154539108 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.154622078 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.154735088 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.154820919 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.154820919 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.155085087 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.155138016 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.155170918 CEST49885443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.155186892 CEST4434988513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.158085108 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.158134937 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.158230066 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.158363104 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.158382893 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.295562983 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.296272039 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.296317101 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.296899080 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.296909094 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.394300938 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.394658089 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.394721985 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.394773006 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.394792080 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.394808054 CEST49886443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.394814968 CEST4434988613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.397999048 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.398076057 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.398174047 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.398349047 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.398382902 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.524529934 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.525182009 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.525234938 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.525681973 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.525697947 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.578689098 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.579288960 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.579365969 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.579701900 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.579715014 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.625371933 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.625529051 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.625694036 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.625776052 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.625812054 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.625838041 CEST49887443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.625854015 CEST4434988713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.627455950 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.627937078 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.628027916 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.628272057 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.628325939 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.629151106 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.629213095 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.629304886 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.629502058 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.629528999 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.678251982 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.678409100 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.678493023 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.678658009 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.678658009 CEST49888443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.678694010 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.678716898 CEST4434988813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.681238890 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.681289911 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.681515932 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.681515932 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.681579113 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.733315945 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.733375072 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.733475924 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.733593941 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.733594894 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.733594894 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.733686924 CEST49889443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.733725071 CEST4434988913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.736237049 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.736278057 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.736370087 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.736490011 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.736505032 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.799894094 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.800314903 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.800390005 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.800678968 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.800692081 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.898319006 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.898458958 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.898530006 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.900801897 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.900801897 CEST49890443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.900835037 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.900857925 CEST4434989013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.906362057 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.906431913 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:15.906524897 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.906637907 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:15.906655073 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.038011074 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.038424969 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.038446903 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.038825989 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.038834095 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.137907028 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.137932062 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.137969017 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.138019085 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.138051033 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.138205051 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.138226986 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.138240099 CEST49891443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.138247013 CEST4434989113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.140652895 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.140748978 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.140850067 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.140988111 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.141020060 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.285463095 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.285932064 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.285950899 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.286385059 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.286391020 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.326419115 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.326961994 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.327006102 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.327112913 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.327121973 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.386580944 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.386629105 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.386707067 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.386881113 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.386910915 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.386936903 CEST49892443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.386950970 CEST4434989213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.391051054 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.391088009 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.391155958 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.391311884 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.391324997 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.407582045 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.407998085 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.408042908 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.408252001 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.408261061 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.426646948 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.426810026 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.427032948 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.427088022 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.427088022 CEST49893443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.427112103 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.427128077 CEST4434989313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.429009914 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.429023027 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.429089069 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.429243088 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.429255009 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.510010004 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.510243893 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.510305882 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.510395050 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.510413885 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.510431051 CEST49894443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.510437965 CEST4434989413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.513364077 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.513412952 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.513624907 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.513624907 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.513684034 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.559335947 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.563297033 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.563329935 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.563724995 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.563736916 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.663039923 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.663116932 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.663177967 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.663199902 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.663235903 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.663292885 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.663418055 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.663418055 CEST49895443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.663444996 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.663466930 CEST4434989513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.665714979 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.665807009 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.665899992 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.666032076 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.666057110 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.786276102 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.786705971 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.786786079 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.787116051 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.787128925 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.884577990 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.885215998 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.885377884 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.885379076 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.885379076 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.888458967 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.888547897 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:16.888648987 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.888799906 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:16.888823986 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.027774096 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.028342962 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.028366089 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.028839111 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.028845072 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.067778111 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.068157911 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.068186045 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.068628073 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.068634033 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.127746105 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.127973080 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.128036022 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.128068924 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.128068924 CEST49897443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.128084898 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.128094912 CEST4434989713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.131145000 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.131237030 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.131321907 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.131643057 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.131722927 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.164352894 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.166625977 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.166712046 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.167032003 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.167083979 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.167453051 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.167614937 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.167674065 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.167699099 CEST49898443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.167706966 CEST4434989813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.170027971 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.170066118 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.170212984 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.170340061 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.170355082 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.200887918 CEST49896443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.200949907 CEST4434989613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.264646053 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.264715910 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.264816999 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.264920950 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.265089989 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.265089989 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.265141010 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.265208960 CEST49900443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.265225887 CEST4434990013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.267654896 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.267693996 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.268012047 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.268157005 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.268165112 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.308759928 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.309495926 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.309556961 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.309921026 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.309973955 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.408662081 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.408798933 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.409008980 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.409008980 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.409089088 CEST49901443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.409125090 CEST4434990113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.411529064 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.411592960 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.411663055 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.411796093 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.411827087 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.527301073 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.527951956 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.528038025 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.528465033 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.528548956 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.627340078 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.627548933 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.627634048 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.627717972 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.627717972 CEST49902443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.627762079 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.627788067 CEST4434990213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.630332947 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.630378008 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.630444050 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.630594969 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.630604982 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.779000998 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.779432058 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.779494047 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.779850960 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.779865026 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.848830938 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.849169970 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.849200964 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.849514008 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.849529982 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.878717899 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.878921032 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.879120111 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.879120111 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.879120111 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.881468058 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.881557941 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.881639957 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.881750107 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.881769896 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.948831081 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.949364901 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.949440002 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.949754953 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.949768066 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.954365015 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.954435110 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.954482079 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.954504013 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.954541922 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.954587936 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.954617977 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.954631090 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.954641104 CEST49904443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.954646111 CEST4434990413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.957233906 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.957283020 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:17.957361937 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.957509995 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:17.957520008 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.052702904 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.052994013 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.053071976 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.053152084 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.053152084 CEST49905443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.053195000 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.053220987 CEST4434990513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.055526972 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.055569887 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.055623055 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.055752993 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.055763006 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.090593100 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.090986013 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.091021061 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.091530085 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.091542006 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.184987068 CEST49903443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.185038090 CEST4434990313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.196027040 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.196212053 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.196289062 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.196369886 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.196369886 CEST49906443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.196413040 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.196438074 CEST4434990613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.198662996 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.198751926 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.198837042 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.198961973 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.198983908 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.268040895 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.309978008 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.318664074 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.318681002 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.319396973 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.319408894 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.415249109 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.415476084 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.415541887 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.419255018 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.419284105 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.419296980 CEST49907443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.419302940 CEST4434990713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.428746939 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.428848982 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.428924084 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.429140091 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.429174900 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.516273975 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.532553911 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:18.532597065 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:18.532651901 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:18.532916069 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:18.532932997 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:18.543279886 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.543319941 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.543725967 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.543740988 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.639739990 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.639842033 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.639908075 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.639925957 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.639978886 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.641244888 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.641244888 CEST49908443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.641280890 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.641303062 CEST4434990813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.642303944 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.648538113 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.648595095 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.649050951 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.649068117 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.650243044 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.650336981 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.650435925 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.650561094 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.650588036 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.694251060 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.694626093 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.694658995 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.694983006 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.694993973 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.749289989 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.749474049 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.749550104 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.749600887 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.749634981 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.749660969 CEST49909443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.749675989 CEST4434990913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.751756907 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.751820087 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.751898050 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.752007008 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.752027988 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.797723055 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.797833920 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.797892094 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.797924042 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.797951937 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.798002005 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.798037052 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.798053980 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.798074961 CEST49910443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.798085928 CEST4434991013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.799758911 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.799788952 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.799854994 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.799969912 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.799984932 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.841630936 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.842178106 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.842231035 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.842561960 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.842573881 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.939492941 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.939568996 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.939640999 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.939718008 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.939754963 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.939780951 CEST49911443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.939795017 CEST4434991113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.941819906 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.941911936 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.942004919 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.942114115 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:18.942142963 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:18.981590033 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:18.981632948 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:18.981709003 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:18.982223988 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:18.982254028 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.088392019 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.088829041 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.088855982 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.089284897 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.089291096 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.187860966 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.187885046 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.187920094 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.187935114 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.187989950 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.188227892 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.188262939 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.188287973 CEST49912443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.188302994 CEST4434991213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.191085100 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.191123009 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.191190958 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.191307068 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.191315889 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.229140997 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.229610920 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.229629993 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.230885029 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.231163979 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.231312990 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.231317997 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.231332064 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.231339931 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.275398970 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.278731108 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.332473040 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.332988024 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.333029032 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.333441973 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.333456039 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.427670002 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.428088903 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.428169012 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.428445101 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.428458929 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.434015989 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.434212923 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.434272051 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.434304953 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.434324026 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.434335947 CEST49914443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.434340954 CEST4434991413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.436989069 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.437031984 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.437112093 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.437233925 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.437252998 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.514749050 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.515010118 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.515069962 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.515450001 CEST49913443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.515459061 CEST44349913142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.517117023 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.517431021 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.517468929 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.517719030 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.517725945 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.528759956 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.528826952 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.528919935 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.529059887 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.529061079 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.529061079 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.529061079 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.531153917 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.531241894 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.531339884 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.531465054 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.531483889 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.592668056 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.593204021 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.593286037 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.593470097 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.593483925 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.622864008 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.623058081 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.623121977 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.623151064 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.623172045 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.623184919 CEST49916443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.623192072 CEST4434991613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.625176907 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.625260115 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.625353098 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.625480890 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.625505924 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.654679060 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.654949903 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.655009031 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.655556917 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.656526089 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.656629086 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.656709909 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.656745911 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.656760931 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.691411018 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.691519022 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.691601992 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.691621065 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.691684961 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.691787004 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.691831112 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.691859961 CEST49917443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.691875935 CEST4434991713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.694448948 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.694480896 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.694559097 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.694710970 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.694720030 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.828242064 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.828629017 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.828648090 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.829041004 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.829047918 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.841229916 CEST49915443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.841293097 CEST4434991513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.928682089 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.928842068 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.928950071 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.929074049 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.929095030 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.929109097 CEST49919443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.929116964 CEST4434991913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.931551933 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.931655884 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.931761980 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.931899071 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:19.931921959 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:19.934777975 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.934926033 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:19.934984922 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.935584068 CEST49918443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:19.935617924 CEST44349918142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:20.072351933 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.072871923 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.072954893 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.073471069 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.073484898 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.171195030 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.171278954 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.171420097 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.171493053 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.171514034 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.171526909 CEST49920443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.171533108 CEST4434992013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.174303055 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.174335003 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.174410105 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.174474001 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.174577951 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.174587011 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.174818993 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.174880028 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.175211906 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.175226927 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.265420914 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.265794992 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.265853882 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.266108990 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.266123056 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.272731066 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.272878885 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.273238897 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.273238897 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.273238897 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.275377035 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.275423050 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.275495052 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.275623083 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.275634050 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.364126921 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:20.364193916 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:20.364259958 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:20.364860058 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.364926100 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.364979029 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.365017891 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.365053892 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.365101099 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.365196943 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.365232944 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.365279913 CEST49922443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.365294933 CEST4434992213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.370738029 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.370805979 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.370898962 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.371036053 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.371072054 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.373836040 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.374564886 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.374638081 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.374816895 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.374830961 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.477108955 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.477247953 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.477535009 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.477535009 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.477535009 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.479541063 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.479625940 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.479717970 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.479852915 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.479886055 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.575674057 CEST49921443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.575748920 CEST4434992113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.582720995 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.583230972 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.583307981 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.583604097 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.583617926 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.684305906 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.684379101 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.684483051 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.684607029 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.684607029 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.684931993 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.684931993 CEST49924443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.685034990 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.685075045 CEST4434992413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.688285112 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.688318968 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.688395023 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.688688993 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.688703060 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.778870106 CEST49923443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.778932095 CEST4434992313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.812243938 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.843036890 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.843056917 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.843481064 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.843487978 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.915731907 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.940386057 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.940469980 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.940524101 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.956041098 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.956048965 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.956468105 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.956473112 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.956790924 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.956806898 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.956820965 CEST49925443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.956826925 CEST4434992513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.965256929 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.965293884 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:20.965347052 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.968204021 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:20.968234062 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.051033020 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.051577091 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.051640034 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.051992893 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.052006006 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.052061081 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.052221060 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.052279949 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.052315950 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.052334070 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.052349091 CEST49926443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.052356005 CEST4434992613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.055083990 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.055169106 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.055254936 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.055351019 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.055376053 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.154514074 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.154702902 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.154778957 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.154836893 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.154836893 CEST49927443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.154870033 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.154892921 CEST4434992713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.156936884 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.157027960 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.157123089 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.157238960 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.157263041 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.161537886 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.161876917 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.161921024 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.162259102 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.162270069 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.264597893 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.264657974 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.264750957 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.264833927 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.264833927 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.264894962 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.264894962 CEST49928443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.264920950 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.264941931 CEST4434992813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.266745090 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.266834021 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.266918898 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.267019987 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.267051935 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.327271938 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.328679085 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.328722000 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.329080105 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.329094887 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.426045895 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.426250935 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.426321030 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.426486969 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.426487923 CEST49929443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.426506996 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.426517963 CEST4434992913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.428997040 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.429084063 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.429179907 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.429342985 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.429367065 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.618141890 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.618500948 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.618534088 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.618937016 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.618944883 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.696208000 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.696554899 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.696635008 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.696979046 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.696993113 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.719085932 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.719145060 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.719188929 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.719201088 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.719240904 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.722129107 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.722152948 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.722167969 CEST49930443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.722173929 CEST4434993013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.724930048 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.725023985 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.725100040 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.725238085 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.725260973 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.794625998 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.794780970 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.794971943 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.794972897 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.794972897 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.796674967 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.796715975 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.796895981 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.796895981 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.796933889 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.809286118 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.809814930 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.809890985 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.810285091 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.810298920 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.905813932 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.906380892 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.906465054 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.906711102 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.906719923 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.909403086 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.909576893 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.909758091 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.909836054 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.909837008 CEST49932443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.909878969 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.909904003 CEST4434993213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.911587000 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.911675930 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:21.911765099 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.911866903 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:21.911890030 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.004491091 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.004640102 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.004822016 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.004822016 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.004822016 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.006544113 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.006635904 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.006726980 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.006819963 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.006850004 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.095951080 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.096359015 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.096406937 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.096817970 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.096829891 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.107871056 CEST49931443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.107939959 CEST4434993113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.198009014 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.198177099 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.198246956 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.198359966 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.198360920 CEST49934443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.198406935 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.198432922 CEST4434993413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.202033997 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.202069998 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.202133894 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.202272892 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.202285051 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.311480999 CEST49933443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.311502934 CEST4434993313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.361530066 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.361979008 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.362052917 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.362371922 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.362385035 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.463891983 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.463972092 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.464035034 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.464173079 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.464210987 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.464236975 CEST49935443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.464251995 CEST4434993513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.468355894 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.468439102 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.468523026 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.468621016 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.468657017 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.488066912 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.488415956 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.488428116 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.488908052 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.488914967 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.589700937 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.590095997 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.590190887 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.590446949 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.590461969 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.594760895 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.594921112 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.594985962 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.595026970 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.595042944 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.595055103 CEST49936443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.595062017 CEST4434993613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.597111940 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.597151995 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.597243071 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.597368956 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.597392082 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.659467936 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.659827948 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.659858942 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.660164118 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.660173893 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.694546938 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.694700003 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.694780111 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.694829941 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.694859028 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.694919109 CEST49937443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.694933891 CEST4434993713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.696712017 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.696759939 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.696841002 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.696945906 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.696958065 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.759701014 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.759763956 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.759821892 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.759850025 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.759882927 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.759932041 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.760252953 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.760273933 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.760298014 CEST49938443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.760309935 CEST4434993813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.763616085 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.763683081 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.763748884 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.765189886 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.765219927 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.854348898 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.854707003 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.854732037 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.855228901 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.855235100 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.954020977 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.954190016 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.954256058 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.954405069 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.954421043 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.954436064 CEST49939443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.954442024 CEST4434993913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.957045078 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.957155943 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:22.957247019 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.957390070 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:22.957422972 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.143147945 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.181967020 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.182049036 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.182569027 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.182583094 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.257010937 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.257472038 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.257508039 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.258107901 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.258111954 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.283646107 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.283726931 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.283994913 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.289573908 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.289573908 CEST49940443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.289613008 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.289638042 CEST4434994013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.300415993 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.300512075 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.300589085 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.300967932 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.301004887 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.340424061 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.356736898 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.356909990 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.356972933 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.392385960 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.433120966 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.480725050 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.480777025 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.481121063 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.481137991 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.481317997 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.481359959 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.481389999 CEST49941443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.481405973 CEST4434994113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.481580973 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.482985973 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.483006001 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.483330011 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.483342886 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.500070095 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.500127077 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.500211000 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.500343084 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.500365973 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.576245070 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.576292992 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.576359034 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.576421022 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.576459885 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.576517105 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.576622963 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.576622963 CEST49942443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.576654911 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.576678038 CEST4434994213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.579761028 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.579869032 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.579941034 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.580228090 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.580265999 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.583117962 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.583185911 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.583246946 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.583286047 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.583317995 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.583374977 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.583374977 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.583374977 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.585124016 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.585150957 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.585221052 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.585308075 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.585315943 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.644434929 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.644836903 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.644856930 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.645205975 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.645215988 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.748650074 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.748749018 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.748821020 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.748852968 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.748904943 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.748960018 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.748960018 CEST49944443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.749003887 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.749030113 CEST4434994413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.751116991 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.751156092 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.751213074 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.751333952 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.751347065 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.887862921 CEST49943443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.887897968 CEST4434994313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.933790922 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.934560061 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.934648037 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:23.934905052 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:23.934921026 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.033250093 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.033308029 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.033658981 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.033659935 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.033740044 CEST49945443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.033776045 CEST4434994513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.036251068 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.036338091 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.036436081 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.036570072 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.036598921 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.161634922 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.162214041 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.162275076 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.162682056 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.162694931 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.221599102 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.222028971 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.222045898 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.222384930 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.222388983 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.248969078 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.249258041 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.249315977 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.249623060 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.249635935 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.262557983 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.262748003 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.262852907 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.262876034 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.262911081 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.263015985 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.263015985 CEST49946443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.263050079 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.263071060 CEST4434994613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.265646935 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.265672922 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.265737057 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.265841961 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.265846014 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.320858002 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.320908070 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.321023941 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.321038008 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.321190119 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.321233034 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.321233034 CEST49948443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.321249008 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.321258068 CEST4434994813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.323374987 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.323393106 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.323467970 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.323601007 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.323609114 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.351974010 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.352365971 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.352581024 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.352581024 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.352581024 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.354757071 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.354790926 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.354863882 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.354974031 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.354983091 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.386312008 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.386658907 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.386677027 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.387193918 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.387198925 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.484374046 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.484442949 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.484513044 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.484569073 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.484613895 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.490961075 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.490979910 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.490997076 CEST49949443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.491002083 CEST4434994913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.493505955 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.493525028 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.493591070 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.493705034 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.493710041 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:24.653593063 CEST49947443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:24.653657913 CEST4434994713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.619259119 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.620546103 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.620589018 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.620970964 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.620978117 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.722270012 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.722328901 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.722390890 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.722436905 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.722670078 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.722670078 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.724005938 CEST49950443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.724026918 CEST4434995013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.725394011 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.725430012 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.725660086 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.725660086 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.725708961 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.806350946 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.809400082 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.813325882 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.817663908 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.819281101 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.819325924 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.822304964 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.822310925 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.822773933 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.822796106 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.823250055 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.823267937 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.823421001 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.823429108 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.823904991 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.823909998 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.824161053 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.824172020 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.824604034 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.824608088 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.917695999 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.917843103 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.917922020 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.919720888 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.919821024 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.919938087 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.919980049 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.919996977 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.920008898 CEST49953443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.920008898 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.920017958 CEST4434995313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.921422005 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.921588898 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.921654940 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.922285080 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.922403097 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.922462940 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.927769899 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.927784920 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.927797079 CEST49951443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.927802086 CEST4434995113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.936079025 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.936088085 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.936098099 CEST49952443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.936100960 CEST4434995213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.947338104 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.947348118 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.947381020 CEST49954443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.947392941 CEST4434995413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.966253042 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.966341972 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.966423988 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.967133045 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.967223883 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.967932940 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.967957973 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.967982054 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.968391895 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.968417883 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.968430042 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.968523026 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.968556881 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.968723059 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.968746901 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.969387054 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.969408035 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:25.972006083 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.972086906 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:25.972100973 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.360470057 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.361053944 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.361082077 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.361699104 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.361705065 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.460715055 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.460772038 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.460942984 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.461086035 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.461117983 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.461137056 CEST49955443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.461144924 CEST4434995513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.464471102 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.464561939 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.464660883 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.464867115 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.464903116 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.609971046 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.612514019 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.612574100 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.613127947 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.613142014 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.613992929 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.614428997 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.614447117 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.614535093 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.614794970 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.614805937 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.615243912 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.615274906 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.615545034 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.615551949 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.636688948 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.637062073 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.637078047 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.637438059 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.637443066 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.709784031 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.709943056 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.710110903 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.710159063 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.710192919 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.710217953 CEST49957443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.710232019 CEST4434995713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.712012053 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.712074041 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.712162971 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.712168932 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.712271929 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.712271929 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.712294102 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.712320089 CEST49958443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.712328911 CEST4434995813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.712886095 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.713036060 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.713108063 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.713722944 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.713794947 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.713867903 CEST49959443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.713882923 CEST4434995913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.713934898 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.714049101 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.714076042 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.714123964 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.714148998 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.714173079 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.714286089 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.714308977 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.716366053 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.716455936 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.716561079 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.716789961 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.716823101 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.739597082 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.739662886 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.739763021 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.739878893 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.739880085 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.740109921 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.740115881 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.740147114 CEST49956443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.740154028 CEST4434995613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.742130041 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.742156982 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:26.742235899 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.742398977 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:26.742410898 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.145418882 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.145986080 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.146064997 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.146399975 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.146413088 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.249344110 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.249521971 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.249586105 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.249768972 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.249809980 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.249836922 CEST49960443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.249850988 CEST4434996013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.253432035 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.253487110 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.253566027 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.253669977 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.253678083 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.356949091 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.356976032 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.357603073 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.357625008 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.357836962 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.357846975 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.358016014 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.358021975 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.358438015 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.358444929 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.398029089 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.398437977 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.398485899 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.398768902 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.398781061 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.407407045 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.407795906 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.407810926 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.408123016 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.408128023 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.457568884 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.457724094 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.457796097 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.457819939 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.457912922 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.457938910 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.457956076 CEST49962443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.457962990 CEST4434996213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.458002090 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.458053112 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.458075047 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.458081007 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.458092928 CEST49961443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.458097935 CEST4434996113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.460382938 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.460428953 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.460535049 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.460614920 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.460623026 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.460654020 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.460675001 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.460730076 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.460804939 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.460809946 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.502372026 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.502511978 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.502599001 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.502697945 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.502726078 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.502749920 CEST49963443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.502762079 CEST4434996313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.505019903 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.505062103 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.505146027 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.505311012 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.505321026 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.510859013 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.510929108 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.510987043 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.510994911 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.511037111 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.511085033 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.511110067 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.511116982 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.511126041 CEST49964443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.511128902 CEST4434996413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.513438940 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.513524055 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.513612032 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.513804913 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.513844013 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.922216892 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.922846079 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.922887087 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:27.923280001 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:27.923286915 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.024585962 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.024736881 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.024806976 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.024955034 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.024976969 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.024991989 CEST49965443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.024997950 CEST4434996513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.028084993 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.028177977 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.028284073 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.028397083 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.028422117 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.102440119 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.102875948 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.102897882 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.103611946 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.103617907 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.128878117 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.129201889 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.129247904 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.129875898 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.129887104 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.157454967 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.157757044 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.157804966 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.158076048 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.158087969 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.171178102 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.171487093 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.171516895 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.172063112 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.172068119 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.200829029 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.201050043 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.201112986 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.201159000 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.201176882 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.201188087 CEST49967443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.201194048 CEST4434996713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.204569101 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.204601049 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.204688072 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.204794884 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.204802036 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.231051922 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.231086016 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.231134892 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.231163979 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.231216908 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.231374979 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.231374979 CEST49966443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.231416941 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.231437922 CEST4434996613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.234740973 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.234797001 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.234878063 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.234960079 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.234975100 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.259819031 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.259965897 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.260040045 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.260164022 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.260195971 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.260242939 CEST49969443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.260260105 CEST4434996913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.263053894 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.263097048 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.263175011 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.263336897 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.263355017 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.320312023 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.320389986 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.320451021 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.320467949 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.320486069 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.320547104 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.320708990 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.320733070 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.320744038 CEST49968443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.320749998 CEST4434996813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.322808027 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.322823048 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.322916031 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.323021889 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.323030949 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.676161051 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.676810980 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.676877975 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.677233934 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.677241087 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.776707888 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.777407885 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.777489901 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.777513981 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.777587891 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.777647018 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.777693033 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.777723074 CEST49970443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.777739048 CEST4434997013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.782139063 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.782232046 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.782320976 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.782500029 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.782531023 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.857785940 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.858247995 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.858299971 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.858648062 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.858660936 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.887212038 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.887706041 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.887744904 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.888425112 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.888436079 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.906596899 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.907005072 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.907040119 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.907330036 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.907336950 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.961901903 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.962100029 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.962182999 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.962304115 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.962336063 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.962361097 CEST49971443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.962376118 CEST4434997113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.965078115 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.965168953 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.965276957 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.965399027 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.965420961 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.982059002 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.982391119 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.982439995 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.982781887 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.982789993 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.990725994 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.990776062 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.990842104 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.990864038 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.990938902 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.990993977 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.991122007 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.991147995 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.991172075 CEST49972443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.991184950 CEST4434997213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.993535995 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.993562937 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:28.993629932 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.993735075 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:28.993741035 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.008101940 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.008157015 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.008225918 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.008254051 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.008320093 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.008374929 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.008397102 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.008414030 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.008425951 CEST49973443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.008431911 CEST4434997313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.010627031 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.010634899 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.010700941 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.010864019 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.010870934 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.080329895 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.080404997 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.080461025 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.080482960 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.080516100 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.080568075 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.080677032 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.080691099 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.080703974 CEST49974443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.080710888 CEST4434997413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.083451033 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.083537102 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.083851099 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.083851099 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.083982944 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.426199913 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.427537918 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.427618027 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.427937031 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.427990913 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.524458885 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.524650097 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.524719954 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.524815083 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.524840117 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.524852991 CEST49975443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.524861097 CEST4434997513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.528304100 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.528398991 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.528732061 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.528733015 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.528867006 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.635894060 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.636404991 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.636466026 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.636851072 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.636863947 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.653693914 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.653960943 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.653978109 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.654275894 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.654280901 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.662162066 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.662501097 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.662507057 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.662803888 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.662806988 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.739120007 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.739195108 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.739288092 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.739362955 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.739795923 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.739797115 CEST49976443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.739864111 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.739897966 CEST4434997613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.742186069 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.742278099 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.742372036 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.742503881 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.742525101 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.751652956 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.751802921 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.751874924 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.751938105 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.751945972 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.751985073 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.752018929 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.752068043 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.752110958 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.752131939 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.752144098 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.752152920 CEST49978443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.752157927 CEST4434997813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.752393007 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.752408981 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.754184961 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.754205942 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.754283905 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.754426003 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.754451990 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.764163017 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.764378071 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.764430046 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.764451981 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.764456034 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.764463902 CEST49977443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.764467001 CEST4434997713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.766231060 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.766314983 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.766403913 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.766510010 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.766535997 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.853399038 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.853537083 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.853741884 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.853741884 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.853743076 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.855882883 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.855942965 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:29.856043100 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.856184959 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:29.856215954 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.168370962 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.168934107 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.168998957 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.169087887 CEST49979443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.169156075 CEST4434997913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.169688940 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.169704914 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.267561913 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.267635107 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.267740011 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.267741919 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.267972946 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.267973900 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.267973900 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.268028021 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.271672964 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.271704912 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.271776915 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.271982908 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.271995068 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.400202036 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.406910896 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.408752918 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.408817053 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.409209967 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.409229040 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.419905901 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.423732996 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.423748016 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.426482916 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.426493883 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.429779053 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.429840088 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.432365894 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.432382107 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.481679916 CEST49980443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.481748104 CEST4434998013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.505182028 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.505260944 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.505359888 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.505381107 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.505424023 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.510536909 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.510570049 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.510601044 CEST49982443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.510616064 CEST4434998213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.518162966 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.518189907 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.518270016 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.518479109 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.518490076 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.526906967 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.527040958 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.527092934 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.527218103 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.527219057 CEST49981443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.527237892 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.527260065 CEST4434998113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.527631044 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.527793884 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.527988911 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.527988911 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.527988911 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.529625893 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.529686928 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.529840946 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.529866934 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.529930115 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.529958963 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.529979944 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.530002117 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.530085087 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.530107021 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.535911083 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.536819935 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.536854029 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.537235975 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.537246943 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.640002966 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.640444994 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.640537024 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.640674114 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.640696049 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.640743971 CEST49984443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.640758038 CEST4434998413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.642901897 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.642993927 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.643068075 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.643213034 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.643245935 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.828198910 CEST49983443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.828268051 CEST4434998313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.924928904 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.925405979 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.925421000 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:30.925837040 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:30.925842047 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.025058031 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.025135994 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.025238991 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.025259018 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.025310993 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.025424957 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.025497913 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.025497913 CEST49985443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.025517941 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.025530100 CEST4434998513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.028655052 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.028708935 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.028770924 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.029016972 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.029032946 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.171952963 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.172513962 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.172600985 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.172904968 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.172919989 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.186686039 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.187011957 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.187025070 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.187390089 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.187396049 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.198143005 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.198441982 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.198462963 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.198839903 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.198853016 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.270695925 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.270757914 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.270849943 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.270854950 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.270915031 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.271173954 CEST49988443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.271215916 CEST4434998813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.273905039 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.273953915 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.274032116 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.274168015 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.274187088 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.284323931 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.284636021 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.284682989 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.284977913 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.284992933 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.288655043 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.288852930 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.288913965 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.288949966 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.288963079 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.289001942 CEST49986443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.289009094 CEST4434998613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.290659904 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.290744066 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.290822029 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.290924072 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.290945053 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.300700903 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.300828934 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.300906897 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.300908089 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.300971031 CEST49987443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.300993919 CEST4434998713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.302552938 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.302654982 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.302742004 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.302844048 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.302870035 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.383038044 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.383183002 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.383245945 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.383307934 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.383307934 CEST49989443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.383339882 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.383362055 CEST4434998913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.385888100 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.385927916 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.386004925 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.386126995 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.386151075 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.676690102 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.677356958 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.677412033 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.677978039 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.677994967 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.776499033 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.776568890 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.776690006 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.776709080 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.776774883 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.776974916 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.777020931 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.777050018 CEST49990443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.777065992 CEST4434999013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.779846907 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.779939890 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.780034065 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.780194998 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.780214071 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.935782909 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.936701059 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.936786890 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.937146902 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.937201023 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.962148905 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.962547064 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.962630033 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.962893009 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.962907076 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.983289003 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.983869076 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.983947039 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:31.984185934 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:31.984200954 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.035183907 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.035332918 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.035444021 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.035780907 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.035780907 CEST49992443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.035849094 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.035885096 CEST4434999213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.038374901 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.038464069 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.038568974 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.038705111 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.038722038 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.073172092 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.073297977 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.073486090 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.073565006 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.073606968 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.073750019 CEST49991443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.073766947 CEST4434999113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.075577021 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.075589895 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.075619936 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.075699091 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.075788975 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.075795889 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.076009989 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.076087952 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.076368093 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.076383114 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.087376118 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.087469101 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.087572098 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.087600946 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.087635040 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.087773085 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.087774038 CEST49993443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.087805986 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.087830067 CEST4434999313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.089579105 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.089589119 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.089662075 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.089783907 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.089799881 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.178848028 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.178992033 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.179053068 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.179100990 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.179100990 CEST49994443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.179124117 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.179146051 CEST4434999413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.181057930 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.181140900 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.181214094 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.181334972 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.181356907 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.437160015 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.437702894 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.437783003 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.438113928 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.438127995 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.538625956 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.538778067 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.538852930 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.538978100 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.538978100 CEST49995443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.539000034 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.539011002 CEST4434999513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.541698933 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.541812897 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.541908026 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.542064905 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.542088032 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.710273981 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.716202974 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.732650995 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.740660906 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.740722895 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.741091013 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.741103888 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.741303921 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.741334915 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.741610050 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.741616011 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.741781950 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.741790056 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.742069960 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.742077112 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.825205088 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.827192068 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.827230930 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.831912041 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.831922054 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.836678028 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.838828087 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.838897943 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.839062929 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.839123011 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.839145899 CEST49997443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.839167118 CEST4434999713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.839179993 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.839189053 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.839262962 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.839313030 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.839437008 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.839437008 CEST49998443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.839445114 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.839453936 CEST4434999813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.840805054 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.840871096 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.840926886 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.840945959 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.840981960 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.841025114 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.849081039 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.849116087 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.849142075 CEST49996443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.849157095 CEST4434999613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.904913902 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.905004978 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.905097961 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.914699078 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.914721966 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.914788008 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.917013884 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.917081118 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.917191029 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.917242050 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.917275906 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.917499065 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.917526007 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.917654991 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.917701006 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.929143906 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.929342031 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.929397106 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.929435968 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.929447889 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.929474115 CEST49999443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.929485083 CEST4434999913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.931705952 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.931741953 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.931801081 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.932157993 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:32.932173967 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:32.951864004 CEST49854443192.168.2.4142.250.186.164
                          Oct 4, 2024 05:32:32.951911926 CEST44349854142.250.186.164192.168.2.4
                          Oct 4, 2024 05:32:33.204073906 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.204567909 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.204602003 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.204988003 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.204998970 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.315213919 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.315294027 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.315349102 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.315515995 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.315515995 CEST50000443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.315546036 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.315571070 CEST4435000013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.318126917 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.318200111 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.318295956 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.318413973 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.318430901 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.554378986 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.555084944 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.555150032 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.555526972 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.555543900 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.558826923 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.559119940 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.559174061 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.559417009 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.559428930 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.584076881 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.584381104 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.584408045 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.584739923 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.584752083 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.597259998 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.599519014 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.599540949 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.599848032 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.599853992 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.654393911 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.654457092 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.654557943 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.654628038 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.654628038 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.654722929 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.654722929 CEST50001443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.654768944 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.654798985 CEST4435000113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.657054901 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.657125950 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.657262087 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.657382011 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.657407999 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.658695936 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.658847094 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.658907890 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.658961058 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.658961058 CEST50003443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.659007072 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.659029961 CEST4435000313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.660769939 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.660815001 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.660871983 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.660968065 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.660975933 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.685713053 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.685867071 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.686053038 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.700931072 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.701075077 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.701127052 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.701139927 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.701175928 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.701215982 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.721863985 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.721864939 CEST50002443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.721935034 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.721971035 CEST4435000213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.723170996 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.723198891 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.723215103 CEST50004443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.723222017 CEST4435000413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.725594044 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.725634098 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.725708008 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.726656914 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.726771116 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.726773024 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.726789951 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.726838112 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.726927042 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.726953030 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.983701944 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.984155893 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.984210014 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:33.984591961 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:33.984606028 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.085971117 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.086123943 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.086190939 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.086294889 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.086294889 CEST50005443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.086327076 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.086349010 CEST4435000513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.088852882 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.088952065 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.089029074 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.089173079 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.089195013 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.297941923 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.298397064 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.298414946 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.298804045 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.298810959 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.300278902 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.300551891 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.300566912 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.300868034 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.300873995 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.396600008 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.396675110 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.396764994 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.396799088 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.396862984 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.396915913 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.396960974 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.396991968 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.396991968 CEST50006443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.397012949 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.397031069 CEST4435000613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.399288893 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.399455070 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.399507046 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.399570942 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.399591923 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.399601936 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.399624109 CEST50007443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.399631977 CEST4435000713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.399655104 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.399719000 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.399853945 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.399873018 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.401735067 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.401840925 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.401926041 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.402019978 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.402040005 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.407305956 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.407624006 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.407682896 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.408003092 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.408018112 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.512437105 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.512636900 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.512799978 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.512799978 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.514909983 CEST50009443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.514942884 CEST4435000913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.516355991 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.516448021 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.516525984 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.516649961 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.516670942 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.756524086 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.773773909 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.773835897 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.774178028 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.774189949 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.874063969 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.874133110 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.874191999 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.874217033 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.874245882 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.874301910 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.874423027 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.874448061 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.874471903 CEST50010443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.874485970 CEST4435001013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.876725912 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.876787901 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:34.876914978 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.877057076 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:34.877094030 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.046055079 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.046593904 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.046650887 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.047125101 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.047137022 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.056519985 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.056770086 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.056806087 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.057071924 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.057077885 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.145598888 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.145786047 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.145857096 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.156285048 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.156465054 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.156542063 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.167572021 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.204222918 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.204262018 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.204283953 CEST50012443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.204293013 CEST4435001213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.209475040 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.209507942 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.209523916 CEST50011443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.209532976 CEST4435001113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.210514069 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.210596085 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.210920095 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.210932970 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.249460936 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.249550104 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.249578953 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.249629021 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.249649048 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.249705076 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.249881029 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.249903917 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.249907970 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.249922991 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.308588028 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.308753014 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.308825016 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.366390944 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.366427898 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.366456985 CEST50013443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.366471052 CEST4435001313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.391257048 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.391292095 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.391365051 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.391694069 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.391716003 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.532645941 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.533225060 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.533277035 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.533638000 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.533648968 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.632673025 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.632849932 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.632935047 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.633012056 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.633044958 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.633070946 CEST50015443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.633085012 CEST4435001513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.635823965 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.635859013 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.635945082 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.636100054 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.636127949 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.886702061 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.887451887 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.887496948 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.887770891 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.887779951 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.920171976 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.921155930 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.921243906 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:35.921303034 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:35.921317101 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.004153967 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.004211903 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.004360914 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.004582882 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.004610062 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.004636049 CEST50016443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.004647970 CEST4435001613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.007428885 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.007467985 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.007538080 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.007643938 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.007653952 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.024384975 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.024604082 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.024676085 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.024761915 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.024761915 CEST50017443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.024807930 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.024836063 CEST4435001713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.027266026 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.027369022 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.027575970 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.027687073 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.027724028 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.034120083 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.034385920 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.034421921 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.034719944 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.034732103 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.129744053 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.130130053 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.130222082 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.130307913 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.130307913 CEST50018443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.130357027 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.130382061 CEST4435001813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.133352995 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.133441925 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.133536100 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.133697033 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.133718014 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.281795025 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.282461882 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.282540083 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.283056974 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.283070087 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381165028 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381263018 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381345987 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.381370068 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381400108 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381472111 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.381519079 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381548882 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.381550074 CEST50019443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.381568909 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.381591082 CEST4435001913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.384838104 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.384886980 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.384977102 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.385165930 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.385179996 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.552548885 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.553422928 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.553440094 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.553944111 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.553950071 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.654635906 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.654970884 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.655067921 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.655168056 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.655181885 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.655196905 CEST50008443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.655205011 CEST4435000813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.657170057 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.658097029 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.658113956 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.658659935 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.658664942 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.659007072 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.659040928 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.659106016 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.659312010 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.659323931 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.706192970 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.706741095 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.706819057 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.707317114 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.707331896 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.757320881 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.757462025 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.757524967 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.757601023 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.757610083 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.757622957 CEST50020443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.757630110 CEST4435002013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.760642052 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.760710955 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.760818005 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.761025906 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.761046886 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.809967995 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.810029030 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.810117006 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.810133934 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.810210943 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.810314894 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.810367107 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.810396910 CEST50021443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.810411930 CEST4435002113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.811058998 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.812151909 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.812211037 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.812731981 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.812746048 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.814630032 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.814696074 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.814779043 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.814944983 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.814965963 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.915528059 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.915616989 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.915697098 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.915949106 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.915949106 CEST50022443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.915973902 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.915988922 CEST4435002213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.918773890 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.918804884 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:36.918876886 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.919642925 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:36.919655085 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.025144100 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.025715113 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.025746107 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.026382923 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.026391029 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.125654936 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.125777960 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.125842094 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.125878096 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.125901937 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.125967979 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.126060009 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.126060009 CEST50023443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.126080990 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.126091957 CEST4435002313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.129419088 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.129509926 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.129614115 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.129801035 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.129822016 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.299633980 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.300420046 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.300437927 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.301629066 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.301634073 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.400022984 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.400674105 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.400769949 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.400818110 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.400840998 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.400855064 CEST50024443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.400861979 CEST4435002413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.405002117 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.405102015 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.405221939 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.405369043 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.405400991 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.416043043 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.418334007 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.418353081 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.418955088 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.418962002 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.496174097 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.496682882 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.496697903 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.497284889 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.497294903 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.516855001 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.516921997 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.517071009 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.517602921 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.517602921 CEST50025443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.517637014 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.517668009 CEST4435002513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.520649910 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.520740986 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.520940065 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.521116972 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.521152973 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.587053061 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.587696075 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.587745905 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.588366032 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.588372946 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.605237961 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.605329037 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.605529070 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.607439041 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.607475042 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.607505083 CEST50026443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.607520103 CEST4435002613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.610310078 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.610367060 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.610584974 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.642188072 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.642234087 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.689558029 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.689635992 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.689786911 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.689862967 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.692079067 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.692794085 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.692819118 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.692833900 CEST50027443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.692842007 CEST4435002713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.729496956 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.729599953 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.729984999 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.757716894 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.757801056 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.801954985 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.805951118 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.805994034 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.811424971 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:37.811450005 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.920005083 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.920572042 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:37.920706987 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.018203974 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.018233061 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.018268108 CEST50028443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.018275976 CEST4435002813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.025122881 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.025181055 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.025369883 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.025540113 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.025551081 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.076680899 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.077200890 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.077286005 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.077795982 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.077810049 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.179941893 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.180125952 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.180206060 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.180294037 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.180294037 CEST50029443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.180340052 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.180376053 CEST4435002913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.183535099 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.183558941 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.183634996 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.183821917 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.183830023 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.187160969 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.187542915 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.187563896 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.188114882 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.188126087 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.282589912 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.283202887 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.283263922 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.283746958 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.283755064 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.289647102 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.289695024 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.289818048 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.289881945 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.289881945 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.289973974 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.289973974 CEST50030443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.290019035 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.290056944 CEST4435003013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.292865038 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.292960882 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.293087959 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.293354034 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.293435097 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.382235050 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.382405996 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.382544041 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.382723093 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.382772923 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.382827997 CEST50031443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.382844925 CEST4435003113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.385808945 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.385901928 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.386008024 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.386240959 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.386276007 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.398869991 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.399447918 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.399523020 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.399918079 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.399971008 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.498352051 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.498378038 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.498433113 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.498884916 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.498886108 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.498886108 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.501780987 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.501882076 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.501997948 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.502214909 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.502238035 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.703403950 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.703887939 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.703906059 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.704314947 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.704320908 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.807780027 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.807811022 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.807904959 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.807920933 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.807976007 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.808311939 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.808334112 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.808355093 CEST50033443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.808360100 CEST4435003313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.811857939 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.811916113 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.812025070 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.812235117 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.812254906 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.813707113 CEST50032443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.813740969 CEST4435003213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.832169056 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.832688093 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.832705975 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.833101034 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.833105087 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.934628963 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.934688091 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.934777975 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.934806108 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.935050011 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.935066938 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.935075998 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.935429096 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.935504913 CEST4435003413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.935559034 CEST50034443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.938369036 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.938420057 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.938502073 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.938774109 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.938807964 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.939884901 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.940296888 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.940380096 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:38.940700054 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:38.940713882 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.041416883 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.041435957 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.041527033 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.041590929 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.041657925 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.041719913 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.041874886 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.041908979 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.041955948 CEST50035443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.041970968 CEST4435003513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.045492887 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.045587063 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.045855045 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.045855999 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.045986891 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.053689003 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.054148912 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.054228067 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.054528952 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.054543972 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.320477009 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.320633888 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.320704937 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.320921898 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.320944071 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.320971966 CEST50036443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.320980072 CEST4435003613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.322534084 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.322962999 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.323005915 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.323595047 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.323601961 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.323950052 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.324038029 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.324129105 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.324234962 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.324256897 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.422487974 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.422641993 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.422735929 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.422904968 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.422926903 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.422945023 CEST50037443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.422954082 CEST4435003713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.426208973 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.426261902 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.426348925 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.426484108 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.426500082 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.511311054 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.511878014 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.511957884 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.512542963 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.512558937 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.574683905 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.575505972 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.575562954 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.576111078 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.576165915 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.611675024 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.611851931 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.611987114 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.612162113 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.612162113 CEST50038443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.612195015 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.612268925 CEST4435003813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.614789009 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.614878893 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.614993095 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.615170002 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.615195036 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.674205065 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.674386024 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.674475908 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.674544096 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.674572945 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.674599886 CEST50039443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.674612999 CEST4435003913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.677195072 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.677272081 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.677369118 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.677592993 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.677644014 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.710978031 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.711483002 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.711565018 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.712174892 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.712188959 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.815433025 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.815485001 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.815602064 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.815876961 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.815877914 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.816076994 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.816076994 CEST50040443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.816119909 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.816148996 CEST4435004013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.819417000 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.819467068 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.819833994 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.819833994 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.819899082 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.986176014 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.987016916 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.987106085 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:39.987365007 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:39.987448931 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.086985111 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.087054968 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.087163925 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.087203979 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.087454081 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.087464094 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.087479115 CEST50041443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.087534904 CEST4435004113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.090214968 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.090260983 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.090361118 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.090487957 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.090502024 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.097609043 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.098067999 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.098099947 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.098462105 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.098473072 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.202472925 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.202538013 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.202588081 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.202620983 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.202651024 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.202683926 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.202712059 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.271215916 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.271657944 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.271744967 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.272002935 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.272017956 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.291081905 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.291189909 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.291213989 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.291240931 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.291240931 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.291297913 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.291337967 CEST50042443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.291354895 CEST4435004213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.293709040 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.293780088 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.293894053 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.293999910 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.294035912 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.320605040 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.321147919 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.321176052 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.321476936 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.321487904 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.395060062 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.395111084 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.395292997 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.395307064 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.395395041 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.395504951 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.395551920 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.395582914 CEST50043443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.395597935 CEST4435004313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.398300886 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.398360014 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.398459911 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.398587942 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.398616076 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.487329006 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.487812996 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.487839937 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.488205910 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.488214970 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.569068909 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.569138050 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.569180965 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.569233894 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.569293976 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.569328070 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.569356918 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.587898970 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.587948084 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.588013887 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.588027000 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.588072062 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.588098049 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.588149071 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.588247061 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.588274956 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.588285923 CEST50045443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.588293076 CEST4435004513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.592403889 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.592447996 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.592538118 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.592641115 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.592653036 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.654676914 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.654733896 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.654803038 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.654839039 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.654874086 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.654887915 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.654913902 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.654943943 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.654943943 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.654980898 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.655015945 CEST50044443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.655031919 CEST4435004413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.658287048 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.658318996 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.658391953 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.658552885 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.658567905 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.779356956 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.780245066 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.780267954 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.781470060 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.781476021 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.883590937 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.883620977 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.883677006 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.883713007 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.883779049 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.884030104 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.884054899 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.884066105 CEST50046443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.884073019 CEST4435004613.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.887717009 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.887773037 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.887881994 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.888185024 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.888216972 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.938060999 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.938622952 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.938676119 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:40.939013958 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:40.939029932 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.202297926 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.202508926 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.202584982 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.203022003 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.203056097 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.203083038 CEST50047443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.203097105 CEST4435004713.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.206290007 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.206330061 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.206409931 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.206542015 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.206569910 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.208406925 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.209136963 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.209137917 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.209218979 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.209254980 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.316838026 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.316997051 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.317126989 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.317322016 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.317361116 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.317385912 CEST50048443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.317401886 CEST4435004813.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.320489883 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.320538998 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.320627928 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.320792913 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.320810080 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.389355898 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.389790058 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.389868975 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.390373945 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.390388012 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.391376019 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.391645908 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.391674995 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.392093897 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.392105103 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.489001989 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.489151001 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.489226103 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.489294052 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.489330053 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.489355087 CEST50050443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.489371061 CEST4435005013.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.490034103 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.490228891 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.490294933 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.490365028 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.490365028 CEST50049443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.490381956 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.490401983 CEST4435004913.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.492300987 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.492350101 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.492434978 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.492573023 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.492589951 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.492650032 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.492675066 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.492733002 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.492810011 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.492820024 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.561580896 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.562043905 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.562087059 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.562455893 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.562467098 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.665203094 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.665267944 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.665353060 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.665395021 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.665421963 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.665608883 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.665608883 CEST50051443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.665631056 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.665652037 CEST4435005113.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.853880882 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.854557991 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.854574919 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.855101109 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.855106115 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.960063934 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.963485003 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.963593006 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.964617968 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.964617968 CEST50052443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.964627028 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.964653969 CEST4435005213.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.998243093 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.998703003 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.998763084 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:41.999304056 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:41.999317884 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.099525928 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.099720001 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.099862099 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.127880096 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.127926111 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.127975941 CEST50053443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.127995014 CEST4435005313.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.147744894 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.148200035 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.148252010 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.148277044 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.148571014 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.148582935 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.148761034 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.148791075 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.149066925 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.149070978 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246258020 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246436119 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246486902 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.246661901 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246682882 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.246699095 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246710062 CEST50055443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.246714115 CEST4435005513.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246815920 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.246932030 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.249088049 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.249088049 CEST50054443192.168.2.413.107.246.60
                          Oct 4, 2024 05:32:42.249125004 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:42.249147892 CEST4435005413.107.246.60192.168.2.4
                          Oct 4, 2024 05:32:48.611895084 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:48.611998081 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:48.612086058 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:48.612338066 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:48.612370968 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.267002106 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.267292023 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:49.267349005 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.267882109 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.268143892 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:49.268234015 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.268307924 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:49.268307924 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:49.268349886 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.546471119 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.546802044 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:49.546885014 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:49.546993971 CEST50056443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:49.547034025 CEST44350056142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:50.931369066 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:50.931482077 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:50.931583881 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:50.931840897 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:50.931879997 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.580037117 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.580331087 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.580403090 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.581640005 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.581948042 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.582093000 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.582117081 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.582140923 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.582144022 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.622220039 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.622235060 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.865423918 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.865763903 CEST44350057142.250.184.238192.168.2.4
                          Oct 4, 2024 05:32:51.865839958 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.865947962 CEST50057443192.168.2.4142.250.184.238
                          Oct 4, 2024 05:32:51.865976095 CEST44350057142.250.184.238192.168.2.4
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 4, 2024 05:31:05.545448065 CEST53627431.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:05.597006083 CEST6311153192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:05.597224951 CEST5783153192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:05.603781939 CEST53631111.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:05.604120016 CEST53578311.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:05.615166903 CEST53650171.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:06.533432007 CEST6437753192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:06.533610106 CEST5078853192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:06.540198088 CEST53507881.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:06.540685892 CEST53643771.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:06.681143999 CEST53617791.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:09.764400005 CEST5871453192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:09.764571905 CEST5329053192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:09.771768093 CEST53532901.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:09.772597075 CEST53587141.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:11.878222942 CEST53491901.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:14.459148884 CEST6117053192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:14.459325075 CEST5163553192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:14.465888023 CEST53516351.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:14.465923071 CEST53611701.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:15.855751038 CEST5349953192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:15.855869055 CEST4997953192.168.2.41.1.1.1
                          Oct 4, 2024 05:31:15.862783909 CEST53499791.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:15.862804890 CEST53534991.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:17.833638906 CEST53499611.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:22.023374081 CEST138138192.168.2.4192.168.2.255
                          Oct 4, 2024 05:31:23.802561045 CEST53614681.1.1.1192.168.2.4
                          Oct 4, 2024 05:31:42.509500027 CEST53601421.1.1.1192.168.2.4
                          Oct 4, 2024 05:32:05.133733988 CEST53527451.1.1.1192.168.2.4
                          Oct 4, 2024 05:32:05.568041086 CEST53554751.1.1.1192.168.2.4
                          Oct 4, 2024 05:32:16.496267080 CEST53531881.1.1.1192.168.2.4
                          Oct 4, 2024 05:32:18.521670103 CEST6011353192.168.2.41.1.1.1
                          Oct 4, 2024 05:32:18.525095940 CEST6160453192.168.2.41.1.1.1
                          Oct 4, 2024 05:32:18.528559923 CEST53601131.1.1.1192.168.2.4
                          Oct 4, 2024 05:32:18.531879902 CEST53616041.1.1.1192.168.2.4
                          Oct 4, 2024 05:32:32.961463928 CEST53582271.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 4, 2024 05:31:05.597006083 CEST192.168.2.41.1.1.10x251cStandard query (0)youtube.comA (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:05.597224951 CEST192.168.2.41.1.1.10xe550Standard query (0)youtube.com65IN (0x0001)false
                          Oct 4, 2024 05:31:06.533432007 CEST192.168.2.41.1.1.10x26f1Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.533610106 CEST192.168.2.41.1.1.10x8c06Standard query (0)www.youtube.com65IN (0x0001)false
                          Oct 4, 2024 05:31:09.764400005 CEST192.168.2.41.1.1.10xd850Standard query (0)www.google.comA (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:09.764571905 CEST192.168.2.41.1.1.10x7963Standard query (0)www.google.com65IN (0x0001)false
                          Oct 4, 2024 05:31:14.459148884 CEST192.168.2.41.1.1.10xa021Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:14.459325075 CEST192.168.2.41.1.1.10x7066Standard query (0)accounts.youtube.com65IN (0x0001)false
                          Oct 4, 2024 05:31:15.855751038 CEST192.168.2.41.1.1.10x6fb3Standard query (0)play.google.comA (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:15.855869055 CEST192.168.2.41.1.1.10x4a5Standard query (0)play.google.com65IN (0x0001)false
                          Oct 4, 2024 05:32:18.521670103 CEST192.168.2.41.1.1.10x7196Standard query (0)play.google.comA (IP address)IN (0x0001)false
                          Oct 4, 2024 05:32:18.525095940 CEST192.168.2.41.1.1.10x2ea0Standard query (0)play.google.com65IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 4, 2024 05:31:05.603781939 CEST1.1.1.1192.168.2.40x251cNo error (0)youtube.com142.250.186.174A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:05.604120016 CEST1.1.1.1192.168.2.40xe550No error (0)youtube.com65IN (0x0001)false
                          Oct 4, 2024 05:31:06.540198088 CEST1.1.1.1192.168.2.40x8c06No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540198088 CEST1.1.1.1192.168.2.40x8c06No error (0)youtube-ui.l.google.com65IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:06.540685892 CEST1.1.1.1192.168.2.40x26f1No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:09.771768093 CEST1.1.1.1192.168.2.40x7963No error (0)www.google.com65IN (0x0001)false
                          Oct 4, 2024 05:31:09.772597075 CEST1.1.1.1192.168.2.40xd850No error (0)www.google.com142.250.186.164A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:14.465888023 CEST1.1.1.1192.168.2.40x7066No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 4, 2024 05:31:14.465923071 CEST1.1.1.1192.168.2.40xa021No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                          Oct 4, 2024 05:31:14.465923071 CEST1.1.1.1192.168.2.40xa021No error (0)www3.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:31:15.862804890 CEST1.1.1.1192.168.2.40x6fb3No error (0)play.google.com216.58.206.78A (IP address)IN (0x0001)false
                          Oct 4, 2024 05:32:18.528559923 CEST1.1.1.1192.168.2.40x7196No error (0)play.google.com142.250.184.238A (IP address)IN (0x0001)false
                          • youtube.com
                          • www.youtube.com
                          • fs.microsoft.com
                          • https:
                            • accounts.youtube.com
                            • play.google.com
                            • www.google.com
                          • slscr.update.microsoft.com
                          • otelrules.azureedge.net
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449730142.250.186.1744435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:06 UTC851OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                          Host: youtube.com
                          Connection: keep-alive
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          sec-ch-ua-platform: "Windows"
                          Upgrade-Insecure-Requests: 1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: none
                          Sec-Fetch-Mode: navigate
                          Sec-Fetch-User: ?1
                          Sec-Fetch-Dest: document
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-04 03:31:06 UTC1919INHTTP/1.1 301 Moved Permanently
                          Content-Type: application/binary
                          X-Content-Type-Options: nosniff
                          Expires: Fri, 04 Oct 2024 03:31:06 GMT
                          Date: Fri, 04 Oct 2024 03:31:06 GMT
                          Cache-Control: private, max-age=31536000
                          Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                          X-Frame-Options: SAMEORIGIN
                          Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                          Content-Security-Policy: require-trusted-types-for 'script'
                          Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                          Server: ESF
                          Content-Length: 0
                          X-XSS-Protection: 0
                          Set-Cookie: YSC=KNf6Bnwwh64; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.449736216.58.212.1424435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:07 UTC894OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                          Host: www.youtube.com
                          Connection: keep-alive
                          Upgrade-Insecure-Requests: 1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: none
                          Sec-Fetch-Mode: navigate
                          Sec-Fetch-User: ?1
                          Sec-Fetch-Dest: document
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: YSC=KNf6Bnwwh64
                          2024-10-04 03:31:07 UTC2530INHTTP/1.1 303 See Other
                          Content-Type: application/binary
                          X-Content-Type-Options: nosniff
                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                          Pragma: no-cache
                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                          Date: Fri, 04 Oct 2024 03:31:07 GMT
                          Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                          Strict-Transport-Security: max-age=31536000
                          X-Frame-Options: SAMEORIGIN
                          Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                          Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                          Content-Security-Policy: require-trusted-types-for 'script'
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                          Server: ESF
                          Content-Length: 0
                          X-XSS-Protection: 0
                          Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Fri, 04-Oct-2024 04:01:07 GMT; Path=/; Secure; HttpOnly
                          Set-Cookie: VISITOR_INFO1_LIVE=Uty1_PrYP1A; Domain=.youtube.com; Expires=Wed, 02-Apr-2025 03:31:07 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                          Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgYw%3D%3D; Domain=.youtube.com; Expires=Wed, 02-Apr-2025 03:31:07 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.449743184.28.90.27443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:11 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          Accept-Encoding: identity
                          User-Agent: Microsoft BITS/7.8
                          Host: fs.microsoft.com
                          2024-10-04 03:31:11 UTC467INHTTP/1.1 200 OK
                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                          Content-Type: application/octet-stream
                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                          Server: ECAcc (lpl/EF70)
                          X-CID: 11
                          X-Ms-ApiVersion: Distribute 1.2
                          X-Ms-Region: prod-neu-z1
                          Cache-Control: public, max-age=220442
                          Date: Fri, 04 Oct 2024 03:31:11 GMT
                          Connection: close
                          X-CID: 2


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.449745184.28.90.27443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:11 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          Accept-Encoding: identity
                          If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                          Range: bytes=0-2147483646
                          User-Agent: Microsoft BITS/7.8
                          Host: fs.microsoft.com
                          2024-10-04 03:31:12 UTC515INHTTP/1.1 200 OK
                          ApiVersion: Distribute 1.1
                          Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                          Content-Type: application/octet-stream
                          ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                          Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                          Server: ECAcc (lpl/EF06)
                          X-CID: 11
                          X-Ms-ApiVersion: Distribute 1.2
                          X-Ms-Region: prod-weu-z1
                          Cache-Control: public, max-age=220516
                          Date: Fri, 04 Oct 2024 03:31:12 GMT
                          Content-Length: 55
                          Connection: close
                          X-CID: 2
                          2024-10-04 03:31:12 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                          Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          4192.168.2.449756142.250.184.2384435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:15 UTC1215OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=214798233&timestamp=1728012673477 HTTP/1.1
                          Host: accounts.youtube.com
                          Connection: keep-alive
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-arch: "x86"
                          sec-ch-ua-platform: "Windows"
                          sec-ch-ua-platform-version: "10.0.0"
                          sec-ch-ua-model: ""
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          Upgrade-Insecure-Requests: 1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: cross-site
                          Sec-Fetch-Mode: navigate
                          Sec-Fetch-Dest: iframe
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-04 03:31:15 UTC1969INHTTP/1.1 200 OK
                          Content-Type: text/html; charset=utf-8
                          X-Frame-Options: ALLOW-FROM https://accounts.google.com
                          Content-Security-Policy: frame-ancestors https://accounts.google.com
                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                          Content-Security-Policy: script-src 'report-sample' 'nonce-CZd_4qXJOJ6hFDZR8kBsMA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                          Pragma: no-cache
                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                          Date: Fri, 04 Oct 2024 03:31:15 GMT
                          Cross-Origin-Resource-Policy: cross-origin
                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                          Cross-Origin-Opener-Policy: same-origin
                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                          reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw1JBikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh6P58N_tbAI_fl-ayqikl5RfGJ-ZkppXkllSmZKfm5iZl5yfn52ZWlycWlSWWhRvZGBkYmBpZKlnYBFfYAAA-mwuDA"
                          Server: ESF
                          X-XSS-Protection: 0
                          X-Content-Type-Options: nosniff
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:15 UTC1969INData Raw: 37 36 31 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 43 5a 64 5f 34 71 58 4a 4f 4a 36 68 46 44 5a 52 38 6b 42 73 4d 41 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                          Data Ascii: 7615<html><head><script nonce="CZd_4qXJOJ6hFDZR8kBsMA">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                          2024-10-04 03:31:15 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                          Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                          2024-10-04 03:31:15 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                          Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                          2024-10-04 03:31:15 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                          Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                          2024-10-04 03:31:15 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                          Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                          2024-10-04 03:31:15 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                          Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                          2024-10-04 03:31:15 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                          Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                          2024-10-04 03:31:15 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                          Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                          2024-10-04 03:31:15 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 62 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                          Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ba:k,error:l});return e}},tb=function(a){var b=h
                          2024-10-04 03:31:15 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                          Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          5192.168.2.449760216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:16 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Accept: */*
                          Access-Control-Request-Method: POST
                          Access-Control-Request-Headers: x-goog-authuser
                          Origin: https://accounts.google.com
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-04 03:31:16 UTC520INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                          Access-Control-Max-Age: 86400
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:16 GMT
                          Server: Playlog
                          Content-Length: 0
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          6192.168.2.449761216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:16 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Accept: */*
                          Access-Control-Request-Method: POST
                          Access-Control-Request-Headers: x-goog-authuser
                          Origin: https://accounts.google.com
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-04 03:31:16 UTC520INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                          Access-Control-Max-Age: 86400
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:16 GMT
                          Server: Playlog
                          Content-Length: 0
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          7192.168.2.449764216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:17 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 519
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-04 03:31:17 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 38 30 31 32 36 37 34 35 39 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"31",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1728012674590",null,null,null
                          2024-10-04 03:31:17 UTC933INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Set-Cookie: NID=518=0CJVxcqzZo0GFcNhiHWr3EqRnmVg-J4n0GB5lErkz9_848XMcDnHg_T0-W35F2munT1OXfozsFuSsG5h9l4OM10lqaCEDR-lAGLU7fM-QqtvG89j1wDEIyDp_riyXTKjF02VxYDiRVxDOxnxKfpy8v4ckHUjeiqgNnnG2__PHvs0pQSTIlQ; expires=Sat, 05-Apr-2025 03:31:17 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:17 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Expires: Fri, 04 Oct 2024 03:31:17 GMT
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:17 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:31:17 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          8192.168.2.449765216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:17 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 519
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          2024-10-04 03:31:17 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 38 30 31 32 36 37 34 39 32 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"31",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1728012674925",null,null,null
                          2024-10-04 03:31:17 UTC933INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Set-Cookie: NID=518=B_zICH9liEG0_A5dcm8XXX4j1Vlqcq6hAH4B5UGBOtDJ95RxfvtQ8-jlSwf4qRzaLjKitcnMm9SYRPgSjOoQGfFAIOFnTCoL-D4AoiQlrQZClGTWL7aEgHF6BVCZHnyrwkw0gM0Q05h0ik7Dm29qu_OGbVzkespVPBZRNtQCZ-OeBtjfz-c; expires=Sat, 05-Apr-2025 03:31:17 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:17 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Expires: Fri, 04 Oct 2024 03:31:17 GMT
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:17 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:31:17 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          9192.168.2.449741142.250.186.1644435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:18 UTC1214OUTGET /favicon.ico HTTP/1.1
                          Host: www.google.com
                          Connection: keep-alive
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: no-cors
                          Sec-Fetch-Dest: image
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=B_zICH9liEG0_A5dcm8XXX4j1Vlqcq6hAH4B5UGBOtDJ95RxfvtQ8-jlSwf4qRzaLjKitcnMm9SYRPgSjOoQGfFAIOFnTCoL-D4AoiQlrQZClGTWL7aEgHF6BVCZHnyrwkw0gM0Q05h0ik7Dm29qu_OGbVzkespVPBZRNtQCZ-OeBtjfz-c
                          2024-10-04 03:31:18 UTC705INHTTP/1.1 200 OK
                          Accept-Ranges: bytes
                          Cross-Origin-Resource-Policy: cross-origin
                          Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                          Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                          Content-Length: 5430
                          X-Content-Type-Options: nosniff
                          Server: sffe
                          X-XSS-Protection: 0
                          Date: Fri, 04 Oct 2024 02:29:19 GMT
                          Expires: Sat, 12 Oct 2024 02:29:19 GMT
                          Cache-Control: public, max-age=691200
                          Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                          Content-Type: image/x-icon
                          Vary: Accept-Encoding
                          Age: 3719
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close
                          2024-10-04 03:31:18 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                          Data Ascii: h& ( 0.v]X:X:rY
                          2024-10-04 03:31:18 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                          Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                          2024-10-04 03:31:18 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                          Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                          2024-10-04 03:31:18 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                          Data Ascii: BBBBBBF!4I
                          2024-10-04 03:31:18 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                          Data Ascii: $'


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          10192.168.2.449766172.202.163.200443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:18 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=oKcpLspDuRys95K&MD=2AyAgdWU HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                          Host: slscr.update.microsoft.com
                          2024-10-04 03:31:19 UTC560INHTTP/1.1 200 OK
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Type: application/octet-stream
                          Expires: -1
                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                          ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                          MS-CorrelationId: 969123e2-a491-4688-80ac-397b94fe7e2c
                          MS-RequestId: 7e3d4940-6997-439a-b315-da46402ad149
                          MS-CV: ppi9UlyTxkqvmqhI.0
                          X-Microsoft-SLSClientCache: 2880
                          Content-Disposition: attachment; filename=environment.cab
                          X-Content-Type-Options: nosniff
                          Date: Fri, 04 Oct 2024 03:31:18 GMT
                          Connection: close
                          Content-Length: 24490
                          2024-10-04 03:31:19 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                          Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                          2024-10-04 03:31:19 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                          Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          11192.168.2.449780216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:24 UTC1299OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1224
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: text/plain;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=B_zICH9liEG0_A5dcm8XXX4j1Vlqcq6hAH4B5UGBOtDJ95RxfvtQ8-jlSwf4qRzaLjKitcnMm9SYRPgSjOoQGfFAIOFnTCoL-D4AoiQlrQZClGTWL7aEgHF6BVCZHnyrwkw0gM0Q05h0ik7Dm29qu_OGbVzkespVPBZRNtQCZ-OeBtjfz-c
                          2024-10-04 03:31:24 UTC1224OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 38 30 31 32 36 37 32 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1728012672000",null,null,null,
                          2024-10-04 03:31:24 UTC941INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Set-Cookie: NID=518=UMyTg8vS69D0gYHA3clpZW2IksC__bks30xTMPIhas2foZACIxQidZaVBnvxiT7NDPR2pWdkrvRm5rPTedJbjzePBpcSoH6VdqV6akicn2eYL5_rWB0KXM-SX5_WQbtxo-XsMDc1necGYM0pPrOaOqUgFUx98GgGQIABgv2hb3W45uK8-JttKAB98KA; expires=Sat, 05-Apr-2025 03:31:24 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:24 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Expires: Fri, 04 Oct 2024 03:31:24 GMT
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:24 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:31:24 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          12192.168.2.449781216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:47 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1198
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=UMyTg8vS69D0gYHA3clpZW2IksC__bks30xTMPIhas2foZACIxQidZaVBnvxiT7NDPR2pWdkrvRm5rPTedJbjzePBpcSoH6VdqV6akicn2eYL5_rWB0KXM-SX5_WQbtxo-XsMDc1necGYM0pPrOaOqUgFUx98GgGQIABgv2hb3W45uK8-JttKAB98KA
                          2024-10-04 03:31:47 UTC1198OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 38 30 31 32 37 30 35 33 35 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"31",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1728012705351",null,null,null
                          2024-10-04 03:31:47 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:47 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:47 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:31:47 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          13192.168.2.449782216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:48 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1205
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=UMyTg8vS69D0gYHA3clpZW2IksC__bks30xTMPIhas2foZACIxQidZaVBnvxiT7NDPR2pWdkrvRm5rPTedJbjzePBpcSoH6VdqV6akicn2eYL5_rWB0KXM-SX5_WQbtxo-XsMDc1necGYM0pPrOaOqUgFUx98GgGQIABgv2hb3W45uK8-JttKAB98KA
                          2024-10-04 03:31:48 UTC1205OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 38 30 31 32 37 30 36 39 37 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"31",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1728012706975",null,null,null
                          2024-10-04 03:31:48 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:48 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:48 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:31:48 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          14192.168.2.449783216.58.206.784435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:48 UTC1290OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1067
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          sec-ch-ua-full-version: "117.0.5938.132"
                          Content-Type: text/plain;charset=UTF-8
                          sec-ch-ua-platform-version: "10.0.0"
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: no-cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=UMyTg8vS69D0gYHA3clpZW2IksC__bks30xTMPIhas2foZACIxQidZaVBnvxiT7NDPR2pWdkrvRm5rPTedJbjzePBpcSoH6VdqV6akicn2eYL5_rWB0KXM-SX5_WQbtxo-XsMDc1necGYM0pPrOaOqUgFUx98GgGQIABgv2hb3W45uK8-JttKAB98KA
                          2024-10-04 03:31:48 UTC1067OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 31 30 30 31 2e 30 36 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20241001.06_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                          2024-10-04 03:31:48 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:31:48 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:31:48 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:31:48 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          15192.168.2.449784172.202.163.200443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:57 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=oKcpLspDuRys95K&MD=2AyAgdWU HTTP/1.1
                          Connection: Keep-Alive
                          Accept: */*
                          User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                          Host: slscr.update.microsoft.com
                          2024-10-04 03:31:57 UTC560INHTTP/1.1 200 OK
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Type: application/octet-stream
                          Expires: -1
                          Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                          ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                          MS-CorrelationId: 580e3e14-9b32-45a0-aeef-420db89026e1
                          MS-RequestId: b027395b-f4ff-4cfc-83cf-eb2318939a2b
                          MS-CV: cjMh3DZJb0Ge1UcO.0
                          X-Microsoft-SLSClientCache: 1440
                          Content-Disposition: attachment; filename=environment.cab
                          X-Content-Type-Options: nosniff
                          Date: Fri, 04 Oct 2024 03:31:57 GMT
                          Connection: close
                          Content-Length: 30005
                          2024-10-04 03:31:57 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                          Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                          2024-10-04 03:31:57 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                          Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                          Session IDSource IPSource PortDestination IPDestination Port
                          16192.168.2.44978513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:31:59 UTC195OUTGET /rules/other-Win32-v19.bundle HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:31:59 UTC540INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:31:59 GMT
                          Content-Type: text/plain
                          Content-Length: 218853
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public
                          Last-Modified: Mon, 30 Sep 2024 13:16:38 GMT
                          ETag: "0x8DCE1521DF74B57"
                          x-ms-request-id: 90766f9b-701e-006f-578c-15afc4000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033159Z-15767c5fc55w69c2zvnrz0gmgw0000000c70000000006dma
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:31:59 UTC15844INData Raw: 31 30 30 30 76 35 2b 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 30 30 30 22 20 56 3d 22 35 22 20 44 43 3d 22 45 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 52 75 6c 65 45 72 72 6f 72 73 41 67 67 72 65 67 61 74 65 64 22 20 41 54 54 3d 22 66 39 39 38 63 63 35 62 61 34 64 34 34 38 64 36 61 31 65 38 65 39 31 33 66 66 31 38 62 65 39 34 2d 64 64 31 32 32 65 30 61 2d 66 63 66 38 2d 34 64 63 35 2d 39 64 62 62 2d 36 61 66 61 63 35 33 32 35 31 38 33 2d 37 34 30 35 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 53 3d 22 37 30 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 50 53 50 20 50 53 55 22 20
                          Data Ascii: 1000v5+<?xml version="1.0" encoding="utf-8"?><R Id="1000" V="5" DC="ESM" EN="Office.Telemetry.RuleErrorsAggregated" ATT="f998cc5ba4d448d6a1e8e913ff18be94-dd122e0a-fcf8-4dc5-9dbb-6afac5325183-7405" SP="CriticalBusinessImpact" S="70" DL="A" DCa="PSP PSU"
                          2024-10-04 03:31:59 UTC16384INData Raw: 22 30 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 2f 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 56 20 56 3d 22 34 30 30 22 20 54 3d 22 49 33 32 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 2f 52 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 4f 3e 0d 0a 20 20 20 20 20 20 3c 2f 52 3e 0d 0a 20 20 20 20 3c 2f 4f 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 42 22 20 49 3d 22 35 22 20 4f 3d 22 66 61 6c 73 65 22 3e 0d 0a 20 20 20 20 3c 4f 20 54 3d 22 41 4e 44 22 3e 0d 0a 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4f 20 54 3d 22 47 45 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 2f 3e
                          Data Ascii: "0" /> </L> <R> <V V="400" T="I32" /> </R> </O> </R> </O> </C> <C T="B" I="5" O="false"> <O T="AND"> <L> <O T="GE"> <L> <S T="1" F="0" />
                          2024-10-04 03:31:59 UTC16384INData Raw: 20 20 3c 53 54 3e 0d 0a 20 20 20 20 3c 53 20 54 3d 22 31 22 20 2f 3e 0d 0a 20 20 3c 2f 53 54 3e 0d 0a 3c 2f 52 3e 0d 0a 3c 24 21 23 3e 31 30 38 32 30 76 33 2b 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 30 38 32 30 22 20 56 3d 22 33 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 4f 75 74 6c 6f 6f 6b 2e 44 65 73 6b 74 6f 70 2e 43 6f 6e 74 61 63 74 43 61 72 64 50 72 6f 70 65 72 74 69 65 73 43 6f 75 6e 74 73 22 20 41 54 54 3d 22 64 38 30 37 36 30 39 32 37 36 37 34 34 32 34 35 62 61 66 38 31 62 66 37 62 63 38 30 33 33 66 36 2d 32 32 36 38 65 33 37 34 2d 37 37 36 36 2d 34 39 37 36 2d 62 65 34 34 2d 62 36 61 64 35 62 64 64 63 35 62 36 2d 37 38 31
                          Data Ascii: <ST> <S T="1" /> </ST></R><$!#>10820v3+<?xml version="1.0" encoding="utf-8"?><R Id="10820" V="3" DC="SM" EN="Office.Outlook.Desktop.ContactCardPropertiesCounts" ATT="d807609276744245baf81bf7bc8033f6-2268e374-7766-4976-be44-b6ad5bddc5b6-781
                          2024-10-04 03:31:59 UTC16384INData Raw: 20 54 3d 22 55 36 34 22 20 49 3d 22 38 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 45 76 65 6e 74 73 5f 41 76 67 22 3e 0d 0a 20 20 20 20 3c 53 20 54 3d 22 32 22 20 46 3d 22 41 76 65 72 61 67 65 22 20 2f 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 39 22 20 4f 3d 22 74 72 75 65 22 20 4e 3d 22 50 75 72 67 65 64 5f 41 67 65 22 3e 0d 0a 20 20 20 20 3c 53 20 54 3d 22 34 22 20 46 3d 22 43 6f 75 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 31 30 22 20 4f 3d 22 74 72 75 65 22 20 4e 3d 22 50 75 72 67 65 64 5f 43 6f 75 6e 74 22 3e 0d 0a 20 20 20 20 3c 53 20 54 3d 22 35 22 20 46 3d 22 43 6f 75 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20
                          Data Ascii: T="U64" I="8" O="false" N="Events_Avg"> <S T="2" F="Average" /> </C> <C T="U32" I="9" O="true" N="Purged_Age"> <S T="4" F="Count" /> </C> <C T="U32" I="10" O="true" N="Purged_Count"> <S T="5" F="Count" /> </C> <C T="U32"
                          2024-10-04 03:31:59 UTC16384INData Raw: 22 30 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 43 6f 75 6e 74 5f 43 72 65 61 74 65 43 61 72 64 5f 56 61 6c 69 64 50 65 72 73 6f 6e 61 5f 46 61 6c 73 65 22 3e 0d 0a 20 20 20 20 3c 43 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 30 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 43 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 31 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 43 6f 75 6e 74 5f 43 72 65 61 74 65 43 61 72 64 5f 56 61 6c 69 64 4d 61 6e 61 67 65 72 5f 46 61 6c 73 65 22 3e 0d 0a 20 20 20 20 3c 43 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 43 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 32 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 43 6f
                          Data Ascii: "0" O="false" N="Count_CreateCard_ValidPersona_False"> <C> <S T="10" /> </C> </C> <C T="U32" I="1" O="false" N="Count_CreateCard_ValidManager_False"> <C> <S T="11" /> </C> </C> <C T="U32" I="2" O="false" N="Co
                          2024-10-04 03:31:59 UTC16384INData Raw: 20 20 20 20 3c 53 20 54 3d 22 33 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 43 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 31 39 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 50 61 69 6e 74 5f 49 4d 73 6f 50 65 72 73 6f 6e 61 5f 57 61 73 4e 75 6c 6c 5f 43 6f 75 6e 74 22 3e 0d 0a 20 20 20 20 3c 43 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 33 32 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 43 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 32 30 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 50 61 69 6e 74 5f 49 4d 73 6f 50 65 72 73 6f 6e 61 5f 4e 75 6c 6c 5f 43 6f 75 6e 74 22 3e 0d 0a 20 20 20 20 3c 43 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 33 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 43 3e 0d 0a
                          Data Ascii: <S T="31" /> </C> </C> <C T="U32" I="19" O="false" N="Paint_IMsoPersona_WasNull_Count"> <C> <S T="32" /> </C> </C> <C T="U32" I="20" O="false" N="Paint_IMsoPersona_Null_Count"> <C> <S T="33" /> </C>
                          2024-10-04 03:31:59 UTC16384INData Raw: 20 3c 53 20 54 3d 22 33 22 20 46 3d 22 52 65 74 72 69 65 76 61 6c 4d 69 6c 6c 69 73 65 63 6f 6e 64 73 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 56 20 56 3d 22 32 30 30 22 20 54 3d 22 49 36 34 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 2f 4f 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 4c 3e 0d 0a 20 20 20 20 20 20 20 20 3c 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 4f 20 54 3d 22 4c 54 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 33 22 20 46 3d 22 52 65 74 72 69 65 76 61 6c 4d 69 6c 6c 69 73 65 63
                          Data Ascii: <S T="3" F="RetrievalMilliseconds" /> </L> <R> <V V="200" T="I64" /> </R> </O> </L> <R> <O T="LT"> <L> <S T="3" F="RetrievalMillisec
                          2024-10-04 03:31:59 UTC16384INData Raw: 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 56 20 56 3d 22 30 22 20 54 3d 22 49 33 32 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 52 3e 0d 0a 20 20 20 20 20 20 3c 2f 4f 3e 0d 0a 20 20 20 20 3c 2f 46 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 30 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 4f 63 6f 6d 32 49 55 43 4f 66 66 69 63 65 49 6e 74 65 67 72 61 74 69 6f 6e 46 69 72 73 74 43 61 6c 6c 53 75 63 63 65 73 73 43 6f 75 6e 74 22 3e 0d 0a 20 20 20 20 3c 43 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 43 3e 0d 0a 20 20 3c 2f 43 3e 0d 0a 20 20 3c 43 20 54 3d 22 55 33 32 22 20 49 3d 22 31 22 20 4f 3d 22 66 61 6c 73 65 22 20 4e 3d 22 4f 63 6f 6d 32 49 55 43 4f 66 66 69 63 65 49 6e
                          Data Ascii: R> <V V="0" T="I32" /> </R> </O> </F> </S> <C T="U32" I="0" O="false" N="Ocom2IUCOfficeIntegrationFirstCallSuccessCount"> <C> <S T="9" /> </C> </C> <C T="U32" I="1" O="false" N="Ocom2IUCOfficeIn
                          2024-10-04 03:31:59 UTC16384INData Raw: 52 3e 0d 0a 20 20 20 20 20 20 3c 2f 4f 3e 0d 0a 20 20 20 20 3c 2f 46 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 36 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 41 4e 44 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 33 22 20 46 3d 22 54 65 6e 61 6e 74 20 65 6e 61 62 6c 65 64 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 4c 3e 0d 0a 20 20 20 20 20 20 20 20 3c 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 33 22 20 46 3d 22 55 73 65 72 20 65 6e 61 62 6c 65 64 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: R> </O> </F> <F T="6"> <O T="AND"> <L> <S T="3" F="Tenant enabled" /> </L> <R> <O T="EQ"> <L> <S T="3" F="User enabled" /> </L>
                          2024-10-04 03:31:59 UTC16384INData Raw: 54 3d 22 36 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 32 22 20 46 3d 22 48 74 74 70 53 74 61 74 75 73 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 4c 3e 0d 0a 20 20 20 20 20 20 20 20 3c 52 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 56 20 56 3d 22 34 30 34 22 20 54 3d 22 55 33 32 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 52 3e 0d 0a 20 20 20 20 20 20 3c 2f 4f 3e 0d 0a 20 20 20 20 3c 2f 46 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 37 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 41 4e 44 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 4f 20 54 3d 22 47 45 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c
                          Data Ascii: T="6"> <O T="EQ"> <L> <S T="2" F="HttpStatus" /> </L> <R> <V V="404" T="U32" /> </R> </O> </F> <F T="7"> <O T="AND"> <L> <O T="GE"> <


                          Session IDSource IPSource PortDestination IPDestination Port
                          17192.168.2.44978613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC193OUTGET /rules/rule120402v21s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:00 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 3788
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:17 GMT
                          ETag: "0x8DC582BAC2126A6"
                          x-ms-request-id: 1cc2ff82-e01e-0071-478c-1508e7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc554wklc0x4mc5pq0w0000000cb0000000004nv4
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:00 UTC3788INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 34 30 32 22 20 56 3d 22 32 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 6e 67 72 61 63 65 66 75 6c 41 70 70 45 78 69 74 44 65 73 6b 74 6f 70 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 43 65 6e 73 75 73 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 50 53 50 22 20 78 6d 6c 6e 73 3d 22 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120402" V="21" DC="SM" EN="Office.System.SystemHealthUngracefulAppExitDesktop" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalCensus" DL="A" DCa="PSP" xmlns=""


                          Session IDSource IPSource PortDestination IPDestination Port
                          18192.168.2.44978913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC192OUTGET /rules/rule120608v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:00 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 2160
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:03 GMT
                          ETag: "0x8DC582BA3B95D81"
                          x-ms-request-id: 39d43082-801e-00ac-658c-15fd65000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc55v7j95gq2uzq37a00000000c2000000000n4us
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:00 UTC2160INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 30 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 30 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 32 22 20 52 3d 22 31 32 30 36 37 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 33 22 20 52 3d 22 31 32 30 36 31 30 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 34 22 20 52 3d 22 31 32 30 36 31 32 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 35 22 20 52 3d 22 31 32 30 36 31 34 22 20 2f 3e 0d 0a 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120608" V="0" DC="SM" T="Subrule" DCa="PSU" xmlns=""> <S> <R T="1" R="120609" /> <R T="2" R="120679" /> <R T="3" R="120610" /> <R T="4" R="120612" /> <R T="5" R="120614" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          19192.168.2.44978713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC192OUTGET /rules/rule224902v2s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:00 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 450
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:25 GMT
                          ETag: "0x8DC582BD4C869AE"
                          x-ms-request-id: b9d87bc4-001e-008d-138c-15d91e000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc55ncqdn59ub6rndq00000000brg000000001aqp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:00 UTC450INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 32 32 34 39 30 32 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 31 30 30 22 20 2f 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 32 22 20 49 64 3d 22 62 62 72 35 71 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 53 20 54 3d 22 33 22 20 47 3d 22 7b 61 33 36 61 39 37 30 64 2d 34 35 61 39 2d 34 65 30 64 2d 39 63 61 62 2d 32 61 32 33 35 63 63 39 64 37 63 36 7d 22 20 2f 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 47 22 20 49 3d 22 30 22 20 4f 3d 22 66 61 6c 73 65 4e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="224902" V="2" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120100" /> <UTS T="2" Id="bbr5q" /> <SS T="3" G="{a36a970d-45a9-4e0d-9cab-2a235cc9d7c6}" /> </S> <C T="G" I="0" O="falseN


                          Session IDSource IPSource PortDestination IPDestination Port
                          20192.168.2.44979013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC192OUTGET /rules/rule120609v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:00 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 408
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:33 GMT
                          ETag: "0x8DC582BB56D3AFB"
                          x-ms-request-id: 4b0a31e7-c01e-00ad-448c-15a2b9000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc554w2fgapsyvy8ua00000000bhg000000002mdf
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:00 UTC408INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 30 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 38 32 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 44 64 5d 5b 45 65 5d 5b 4c 6c 5d 5b 4c 6c 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120609" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120682" /> <SR T="2" R="^([Dd][Ee][Ll][Ll])"> <S T="1" F="0" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true">


                          Session IDSource IPSource PortDestination IPDestination Port
                          21192.168.2.44979213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC192OUTGET /rules/rule120610v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:00 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 474
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:46 GMT
                          ETag: "0x8DC582B9964B277"
                          x-ms-request-id: aa8826a4-b01e-0053-608c-15cdf8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc55gs96cphvgp5f5vc0000000bv000000000bbbp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:00 UTC474INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 30 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120610" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120609" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          22192.168.2.44979313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC192OUTGET /rules/rule120612v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:00 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 471
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:25 GMT
                          ETag: "0x8DC582BB10C598B"
                          x-ms-request-id: 24b39cfc-301e-0096-2a8c-15e71d000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc55d6fcl6x6bw8cpdc0000000bw000000000828u
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:00 UTC471INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120612" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120611" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          23192.168.2.44979413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:00 UTC192OUTGET /rules/rule120613v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:01 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:00 GMT
                          Content-Type: text/xml
                          Content-Length: 632
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:35 GMT
                          ETag: "0x8DC582BB6E3779E"
                          x-ms-request-id: 3a0dc1eb-601e-0032-608c-15eebb000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033200Z-15767c5fc55qkvj6n60pxm9mbw000000013g00000000aatw
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:01 UTC632INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 48 68 5d 5b 50 70 5d 28 5b 5e 45 5d 7c 24 29 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 33 22 20 52 3d 22 28 5b 48 68 5d 5b 45 65 5d 5b 57 77 5d 5b 4c 6c 5d 5b 45 65 5d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120613" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120611" /> <SR T="2" R="^([Hh][Pp]([^E]|$))"> <S T="1" F="1" M="Ignore" /> </SR> <SR T="3" R="([Hh][Ee][Ww][Ll][Ee]


                          Session IDSource IPSource PortDestination IPDestination Port
                          24192.168.2.44978813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120600v4s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:01 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:01 GMT
                          Content-Type: text/xml
                          Content-Length: 2980
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:10 GMT
                          ETag: "0x8DC582BA80D96A1"
                          x-ms-request-id: b9d87bc3-001e-008d-128c-15d91e000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033201Z-15767c5fc55jdxmppy6cmd24bn000000043000000000gxhn
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:01 UTC2980INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 30 30 22 20 56 3d 22 34 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 4d 65 74 61 64 61 74 61 44 65 76 69 63 65 43 6f 6e 73 6f 6c 69 64 61 74 65 64 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 44 43 22 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120600" V="4" DC="SM" EN="Office.System.SystemHealthMetadataDeviceConsolidated" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalBusinessImpact" DL="A" DCa="DC"


                          Session IDSource IPSource PortDestination IPDestination Port
                          25192.168.2.44979113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120611v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:01 UTC491INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:01 GMT
                          Content-Type: text/xml
                          Content-Length: 415
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:56 GMT
                          ETag: "0x8DC582B9F6F3512"
                          x-ms-request-id: 757ce4f4-401e-000a-128c-154a7b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033201Z-15767c5fc55jdxmppy6cmd24bn00000004a00000000004hc
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          X-Cache-Info: L1_T2
                          Accept-Ranges: bytes
                          2024-10-04 03:32:01 UTC415INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 30 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4c 6c 5d 5b 45 65 5d 5b 4e 6e 5d 5b 4f 6f 5d 5b 56 76 5d 5b 4f 6f 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120611" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120609" /> <SR T="2" R="([Ll][Ee][Nn][Oo][Vv][Oo])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="tru


                          Session IDSource IPSource PortDestination IPDestination Port
                          26192.168.2.44979613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120615v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:01 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:01 GMT
                          Content-Type: text/xml
                          Content-Length: 407
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:42 GMT
                          ETag: "0x8DC582BBAD04B7B"
                          x-ms-request-id: 023e3708-a01e-003d-568c-1598d7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033201Z-15767c5fc554wklc0x4mc5pq0w0000000c8000000000c60z
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:01 UTC407INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 41 61 5d 5b 53 73 5d 5b 55 75 5d 5b 53 73 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120615" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120613" /> <SR T="2" R="([Aa][Ss][Uu][Ss])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true">


                          Session IDSource IPSource PortDestination IPDestination Port
                          27192.168.2.44979713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120616v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:01 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:01 GMT
                          Content-Type: text/xml
                          Content-Length: 486
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:29 GMT
                          ETag: "0x8DC582BB344914B"
                          x-ms-request-id: 1cc301c6-e01e-0071-6b8c-1508e7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033201Z-15767c5fc5546rn6ch9zv310e000000004zg000000004a97
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:01 UTC486INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120616" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120615" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          28192.168.2.44979513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120614v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:01 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:01 GMT
                          Content-Type: text/xml
                          Content-Length: 467
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:08 GMT
                          ETag: "0x8DC582BA6C038BC"
                          x-ms-request-id: b2393cc3-501e-005b-768c-15d7f7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033201Z-15767c5fc55gq5fmm10nm5qqr80000000c30000000008wpv
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:01 UTC467INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120614" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120613" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          29192.168.2.44979813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120617v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:01 GMT
                          Content-Type: text/xml
                          Content-Length: 427
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:02 GMT
                          ETag: "0x8DC582BA310DA18"
                          x-ms-request-id: 1cc301ca-e01e-0071-6f8c-1508e7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033201Z-15767c5fc554w2fgapsyvy8ua00000000bcg00000000g15d
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC427INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4d 6d 5d 5b 49 69 5d 5b 43 63 5d 5b 52 72 5d 5b 4f 6f 5d 5b 53 73 5d 5b 4f 6f 5d 5b 46 66 5d 5b 54 74 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120617" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120615" /> <SR T="2" R="([Mm][Ii][Cc][Rr][Oo][Ss][Oo][Ff][Tt])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W"


                          Session IDSource IPSource PortDestination IPDestination Port
                          30192.168.2.44979913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:01 UTC192OUTGET /rules/rule120618v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:02 GMT
                          Content-Type: text/xml
                          Content-Length: 486
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:30 GMT
                          ETag: "0x8DC582B9018290B"
                          x-ms-request-id: e0871f45-901e-00a0-0d8c-156a6d000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033202Z-15767c5fc55lghvzbxktxfqntw0000000bp00000000091e7
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC486INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120618" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120617" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          31192.168.2.44980113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:02 UTC192OUTGET /rules/rule120620v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:02 GMT
                          Content-Type: text/xml
                          Content-Length: 469
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:41 GMT
                          ETag: "0x8DC582BBA701121"
                          x-ms-request-id: a68dfe67-f01e-0052-588c-159224000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033202Z-15767c5fc55472x4k7dmphmadg0000000bm000000000bus8
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC469INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120620" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120619" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          32192.168.2.44980013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:02 UTC192OUTGET /rules/rule120619v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:02 GMT
                          Content-Type: text/xml
                          Content-Length: 407
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:41 GMT
                          ETag: "0x8DC582B9698189B"
                          x-ms-request-id: 023e3944-a01e-003d-708c-1598d7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033202Z-15767c5fc55kg97hfq5uqyxxaw0000000by000000000agu3
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC407INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 31 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 41 61 5d 5b 43 63 5d 5b 45 65 5d 5b 52 72 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120619" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120617" /> <SR T="2" R="([Aa][Cc][Ee][Rr])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true">


                          Session IDSource IPSource PortDestination IPDestination Port
                          33192.168.2.44980213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:02 UTC192OUTGET /rules/rule120621v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:02 GMT
                          Content-Type: text/xml
                          Content-Length: 415
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:03 GMT
                          ETag: "0x8DC582BA41997E3"
                          x-ms-request-id: c54fb296-901e-008f-528c-1567a6000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033202Z-15767c5fc55kg97hfq5uqyxxaw0000000bv000000000m3zs
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC415INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 31 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 56 76 5d 5b 4d 6d 5d 5b 57 77 5d 5b 41 61 5d 5b 52 72 5d 5b 45 65 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120621" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120619" /> <SR T="2" R="([Vv][Mm][Ww][Aa][Rr][Ee])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="tru


                          Session IDSource IPSource PortDestination IPDestination Port
                          34192.168.2.44980313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:02 UTC192OUTGET /rules/rule120622v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:02 GMT
                          Content-Type: text/xml
                          Content-Length: 477
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:38 GMT
                          ETag: "0x8DC582BB8CEAC16"
                          x-ms-request-id: 24b39fc0-301e-0096-298c-15e71d000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033202Z-15767c5fc5546rn6ch9zv310e000000004vg00000000fpdp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC477INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120622" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120621" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          35192.168.2.44980413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:02 UTC192OUTGET /rules/rule120623v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:02 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:02 GMT
                          Content-Type: text/xml
                          Content-Length: 464
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:43 GMT
                          ETag: "0x8DC582B97FB6C3C"
                          x-ms-request-id: dc68ccfc-201e-006e-438c-15bbe3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033202Z-15767c5fc55tsfp92w7yna557w0000000c2g000000000p9c
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:02 UTC464INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 47 67 5d 5b 49 69 5d 5b 47 67 5d 5b 41 61 5d 5b 42 62 5d 5b 59 79 5d 5b 54 74 5d 5b 45 65 5d 20 5b 54 74 5d 5b 45 65 5d 5b 43 63 5d 5b 48 68 5d 5b 4e 6e 5d 5b 4f 6f 5d 5b 4c 6c 5d 5b 4f 6f 5d 5b 47 67 5d 5b 59 79 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120623" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120621" /> <SR T="2" R="([Gg][Ii][Gg][Aa][Bb][Yy][Tt][Ee] [Tt][Ee][Cc][Hh][Nn][Oo][Ll][Oo][Gg][Yy])"> <S T="1" F="1" M="Ignor


                          Session IDSource IPSource PortDestination IPDestination Port
                          36192.168.2.44980613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:03 UTC192OUTGET /rules/rule120625v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:03 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:03 GMT
                          Content-Type: text/xml
                          Content-Length: 419
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:42 GMT
                          ETag: "0x8DC582B9748630E"
                          x-ms-request-id: 0da94923-701e-0097-168c-15b8c1000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033203Z-15767c5fc55fdfx81a30vtr1fw0000000cc0000000002mp0
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:03 UTC419INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 46 66 5d 5b 55 75 5d 5b 4a 6a 5d 5b 49 69 5d 5b 54 74 5d 5b 53 73 5d 5b 55 75 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120625" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120623" /> <SR T="2" R="([Ff][Uu][Jj][Ii][Tt][Ss][Uu])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O=


                          Session IDSource IPSource PortDestination IPDestination Port
                          37192.168.2.44980513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:03 UTC192OUTGET /rules/rule120624v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:03 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:03 GMT
                          Content-Type: text/xml
                          Content-Length: 494
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:35 GMT
                          ETag: "0x8DC582BB7010D66"
                          x-ms-request-id: 79ade187-001e-0065-788c-150b73000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033203Z-15767c5fc55gq5fmm10nm5qqr80000000bz000000000gtcs
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:03 UTC494INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120624" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120623" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          38192.168.2.44980713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:03 UTC192OUTGET /rules/rule120626v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:03 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:03 GMT
                          Content-Type: text/xml
                          Content-Length: 472
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:53 GMT
                          ETag: "0x8DC582B9DACDF62"
                          x-ms-request-id: 8e9c869d-201e-000c-4b8c-1579c4000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033203Z-15767c5fc55w69c2zvnrz0gmgw0000000c4g00000000ce6k
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:03 UTC472INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120626" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120625" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          39192.168.2.44980813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:03 UTC192OUTGET /rules/rule120627v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:03 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:03 GMT
                          Content-Type: text/xml
                          Content-Length: 404
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:54 GMT
                          ETag: "0x8DC582B9E8EE0F3"
                          x-ms-request-id: 4f10c824-e01e-0085-1c8c-15c311000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033203Z-15767c5fc55v7j95gq2uzq37a00000000c8g0000000033vy
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:03 UTC404INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 4e 6e 5d 5b 45 65 5d 5b 43 63 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20 20 3c 53
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120627" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120625" /> <SR T="2" R="^([Nn][Ee][Cc])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true"> <S


                          Session IDSource IPSource PortDestination IPDestination Port
                          40192.168.2.44980913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:03 UTC192OUTGET /rules/rule120628v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:03 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:03 GMT
                          Content-Type: text/xml
                          Content-Length: 468
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:51 GMT
                          ETag: "0x8DC582B9C8E04C8"
                          x-ms-request-id: 09e6f7ee-001e-0034-548c-15dd04000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033203Z-15767c5fc55qkvj6n60pxm9mbw000000011000000000gfpz
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:03 UTC468INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120628" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120627" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          41192.168.2.44981013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120629v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 428
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:17 GMT
                          ETag: "0x8DC582BAC4F34CA"
                          x-ms-request-id: 82f8b22c-c01e-0014-5a8c-15a6a3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc55gs96cphvgp5f5vc0000000bu000000000dv7p
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC428INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 32 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4d 6d 5d 5b 49 69 5d 5b 43 63 5d 5b 52 72 5d 5b 4f 6f 5d 2d 5b 53 73 5d 5b 54 74 5d 5b 41 61 5d 5b 52 72 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120629" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120627" /> <SR T="2" R="([Mm][Ii][Cc][Rr][Oo]-[Ss][Tt][Aa][Rr])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W"


                          Session IDSource IPSource PortDestination IPDestination Port
                          42192.168.2.44981113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120630v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 499
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:45 GMT
                          ETag: "0x8DC582B98CEC9F6"
                          x-ms-request-id: 30fd46b0-d01e-00a1-368c-1535b1000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc55kg97hfq5uqyxxaw0000000c00000000005t9z
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC499INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120630" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120629" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          43192.168.2.44981213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120631v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 415
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:44 GMT
                          ETag: "0x8DC582B988EBD12"
                          x-ms-request-id: 6a901ce3-301e-005d-708c-15e448000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc55gq5fmm10nm5qqr80000000c40000000004y9h
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC415INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 32 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 48 68 5d 5b 55 75 5d 5b 41 61 5d 5b 57 77 5d 5b 45 65 5d 5b 49 69 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120631" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120629" /> <SR T="2" R="([Hh][Uu][Aa][Ww][Ee][Ii])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="tru


                          Session IDSource IPSource PortDestination IPDestination Port
                          44192.168.2.44981313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120632v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 471
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:33 GMT
                          ETag: "0x8DC582BB5815C4C"
                          x-ms-request-id: 75493038-e01e-00aa-508c-15ceda000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc554w2fgapsyvy8ua00000000beg000000009y2d
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC471INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120632" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120631" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          45192.168.2.44981413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120633v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 419
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:29 GMT
                          ETag: "0x8DC582BB32BB5CB"
                          x-ms-request-id: c2ca9d4d-801e-0035-458c-15752a000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc5546rn6ch9zv310e000000004xg000000009nmg
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC419INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 53 73 5d 5b 41 61 5d 5b 4d 6d 5d 5b 53 73 5d 5b 55 75 5d 5b 4e 6e 5d 5b 47 67 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120633" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120631" /> <SR T="2" R="([Ss][Aa][Mm][Ss][Uu][Nn][Gg])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O=


                          Session IDSource IPSource PortDestination IPDestination Port
                          46192.168.2.44981513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120634v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 494
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:38 GMT
                          ETag: "0x8DC582BB8972972"
                          x-ms-request-id: 831ef799-b01e-0098-7b8c-15cead000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc55rv8zjq9dg0musxg0000000bvg00000000gk5c
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC494INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120634" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120633" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          47192.168.2.44981613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120635v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 420
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:53 GMT
                          ETag: "0x8DC582B9DAE3EC0"
                          x-ms-request-id: a7623418-001e-00a2-348c-15d4d5000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc55dtdv4d4saq7t47n0000000bt0000000006mk8
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC420INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 54 74 5d 5b 4f 6f 5d 5b 53 73 5d 5b 48 68 5d 5b 49 69 5d 5b 42 62 5d 5b 41 61 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120635" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120633" /> <SR T="2" R="^([Tt][Oo][Ss][Hh][Ii][Bb][Aa])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O


                          Session IDSource IPSource PortDestination IPDestination Port
                          48192.168.2.44981713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:04 UTC192OUTGET /rules/rule120636v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:04 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:04 GMT
                          Content-Type: text/xml
                          Content-Length: 472
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:52 GMT
                          ETag: "0x8DC582B9D43097E"
                          x-ms-request-id: 4b0a3852-c01e-00ad-3b8c-15a2b9000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033204Z-15767c5fc55xsgnlxyxy40f4m00000000byg0000000024cd
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:04 UTC472INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120636" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120635" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          49192.168.2.44981813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120637v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 427
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:12 GMT
                          ETag: "0x8DC582BA909FA21"
                          x-ms-request-id: eccf174e-001e-0079-238c-1512e8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc554l9xf959gp9cb1s000000067g00000000135p
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC427INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 50 70 5d 5b 41 61 5d 5b 4e 6e 5d 5b 41 61 5d 5b 53 73 5d 5b 4f 6f 5d 5b 4e 6e 5d 5b 49 69 5d 5b 43 63 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120637" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120635" /> <SR T="2" R="([Pp][Aa][Nn][Aa][Ss][Oo][Nn][Ii][Cc])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W"


                          Session IDSource IPSource PortDestination IPDestination Port
                          50192.168.2.44981913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120638v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 486
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:35 GMT
                          ETag: "0x8DC582B92FCB436"
                          x-ms-request-id: 76615707-c01e-0082-6a8c-15af72000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc55w69c2zvnrz0gmgw0000000c90000000001qr7
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC486INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120638" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120637" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          51192.168.2.44982013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120639v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 423
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:36 GMT
                          ETag: "0x8DC582BB7564CE8"
                          x-ms-request-id: bb2e28bd-501e-0016-0b8c-15181b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc554wklc0x4mc5pq0w0000000c7g00000000es7e
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC423INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 33 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 44 64 5d 5b 59 79 5d 5b 4e 6e 5d 5b 41 61 5d 5b 42 62 5d 5b 4f 6f 5d 5b 4f 6f 5d 5b 4b 6b 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120639" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120637" /> <SR T="2" R="([Dd][Yy][Nn][Aa][Bb][Oo][Oo][Kk])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0


                          Session IDSource IPSource PortDestination IPDestination Port
                          52192.168.2.44982113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120640v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 478
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:48 GMT
                          ETag: "0x8DC582B9B233827"
                          x-ms-request-id: 4da5bf60-a01e-0070-668c-15573b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc55lghvzbxktxfqntw0000000bk000000000hr06
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC478INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120640" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120639" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          53192.168.2.44982213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120641v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 404
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:39 GMT
                          ETag: "0x8DC582B95C61A3C"
                          x-ms-request-id: 0dcb6c6d-e01e-0003-668c-150fa8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc55qdcd62bsn50hd6s0000000bv0000000001v0u
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC404INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 33 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 4d 6d 5d 5b 53 73 5d 5b 49 69 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20 20 3c 53
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120641" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120639" /> <SR T="2" R="^([Mm][Ss][Ii])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true"> <S


                          Session IDSource IPSource PortDestination IPDestination Port
                          54192.168.2.44982313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120642v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 468
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:24 GMT
                          ETag: "0x8DC582BB046B576"
                          x-ms-request-id: 8789ddbb-a01e-0084-6a8c-159ccd000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc554w2fgapsyvy8ua00000000bb000000000nd1b
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC468INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120642" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120641" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          55192.168.2.44982513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:05 UTC192OUTGET /rules/rule120643v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:05 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:05 GMT
                          Content-Type: text/xml
                          Content-Length: 400
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:28 GMT
                          ETag: "0x8DC582BB2D62837"
                          x-ms-request-id: 9bed673a-001e-0046-278c-15da4b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033205Z-15767c5fc55xsgnlxyxy40f4m00000000bx0000000005emf
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:05 UTC400INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 4c 6c 5d 5b 47 67 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20 20 3c 53 20 54 3d 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120643" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120641" /> <SR T="2" R="^([Ll][Gg])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true"> <S T="


                          Session IDSource IPSource PortDestination IPDestination Port
                          56192.168.2.44982613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:06 UTC192OUTGET /rules/rule120644v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:06 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:06 GMT
                          Content-Type: text/xml
                          Content-Length: 479
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:37 GMT
                          ETag: "0x8DC582BB7D702D0"
                          x-ms-request-id: 772ea1ab-e01e-003c-188c-15c70b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033206Z-15767c5fc554wklc0x4mc5pq0w0000000cc0000000002ews
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:06 UTC479INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120644" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120643" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          57192.168.2.44982713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:06 UTC192OUTGET /rules/rule120645v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:06 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:06 GMT
                          Content-Type: text/xml
                          Content-Length: 425
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:40 GMT
                          ETag: "0x8DC582BBA25094F"
                          x-ms-request-id: 3a0dcc46-601e-0032-6c8c-15eebb000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033206Z-15767c5fc55qkvj6n60pxm9mbw0000000170000000001dsu
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:06 UTC425INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 41 61 5d 5b 4d 6d 5d 5b 41 61 5d 5b 5a 7a 5d 5b 4f 6f 5d 5b 4e 6e 5d 20 5b 45 65 5d 5b 43 63 5d 32 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120645" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120643" /> <SR T="2" R="([Aa][Mm][Aa][Zz][Oo][Nn] [Ee][Cc]2)"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I=


                          Session IDSource IPSource PortDestination IPDestination Port
                          58192.168.2.44982813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:06 UTC192OUTGET /rules/rule120646v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:06 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:06 GMT
                          Content-Type: text/xml
                          Content-Length: 475
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:28 GMT
                          ETag: "0x8DC582BB2BE84FD"
                          x-ms-request-id: 15fe0b87-a01e-0002-3b8c-155074000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033206Z-15767c5fc55sdcjq8ksxt4n9mc00000001c00000000013d3
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:06 UTC475INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120646" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120645" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          59192.168.2.44982913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:06 UTC192OUTGET /rules/rule120647v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:06 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:06 GMT
                          Content-Type: text/xml
                          Content-Length: 448
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:29 GMT
                          ETag: "0x8DC582BB389F49B"
                          x-ms-request-id: 1f480944-c01e-002b-018c-156e00000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033206Z-15767c5fc55dtdv4d4saq7t47n0000000br000000000aqya
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:06 UTC448INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 41 61 5d 5b 50 70 5d 5b 41 61 5d 5b 43 63 5d 5b 48 68 5d 5b 45 65 5d 20 5b 53 73 5d 5b 4f 6f 5d 5b 46 66 5d 5b 54 74 5d 5b 57 77 5d 5b 41 61 5d 5b 52 72 5d 5b 45 65 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120647" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120645" /> <SR T="2" R="([Aa][Pp][Aa][Cc][Hh][Ee] [Ss][Oo][Ff][Tt][Ww][Aa][Rr][Ee])"> <S T="1" F="1" M="Ignore" /> </SR>


                          Session IDSource IPSource PortDestination IPDestination Port
                          60192.168.2.44983013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:06 UTC192OUTGET /rules/rule120648v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:06 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:06 GMT
                          Content-Type: text/xml
                          Content-Length: 491
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:44 GMT
                          ETag: "0x8DC582B98B88612"
                          x-ms-request-id: c54fbac1-901e-008f-588c-1567a6000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033206Z-15767c5fc55852fxfeh7csa2dn0000000bw0000000008cvk
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:06 UTC491INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120648" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120647" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          61192.168.2.44983113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120649v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:07 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 416
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:21 GMT
                          ETag: "0x8DC582BAEA4B445"
                          x-ms-request-id: 75858473-001e-000b-318c-1515a7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc55kg97hfq5uqyxxaw0000000bx000000000dd9n
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:07 UTC416INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 34 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 46 66 5d 5b 45 65 5d 5b 44 64 5d 5b 4f 6f 5d 5b 52 72 5d 5b 41 61 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120649" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120647" /> <SR T="2" R="^([Ff][Ee][Dd][Oo][Rr][Aa])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="tr


                          Session IDSource IPSource PortDestination IPDestination Port
                          62192.168.2.44983313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120651v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:07 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 415
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:10 GMT
                          ETag: "0x8DC582BA80D96A1"
                          x-ms-request-id: b9a197f6-401e-0078-3b8c-154d34000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc55n4msds84xh4z67w00000005ng00000000a7xz
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:07 UTC415INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 47 67 5d 5b 4f 6f 5d 5b 4f 6f 5d 5b 47 67 5d 5b 4c 6c 5d 5b 45 65 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120651" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120649" /> <SR T="2" R="([Gg][Oo][Oo][Gg][Ll][Ee])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="tru


                          Session IDSource IPSource PortDestination IPDestination Port
                          63192.168.2.44983213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120650v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:07 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 479
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:44 GMT
                          ETag: "0x8DC582B989EE75B"
                          x-ms-request-id: 76252b1b-c01e-0066-488c-15a1ec000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc55gq5fmm10nm5qqr80000000c3g000000005u5y
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:07 UTC479INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 34 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120650" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120649" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          64192.168.2.44983413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120652v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:07 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 471
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:43 GMT
                          ETag: "0x8DC582B97E6FCDD"
                          x-ms-request-id: b83a8dc4-f01e-003f-308c-15d19d000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc55qkvj6n60pxm9mbw000000017g000000000by0
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:07 UTC471INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120652" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120651" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          65192.168.2.44983513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120653v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:07 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 419
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:51 GMT
                          ETag: "0x8DC582B9C710B28"
                          x-ms-request-id: 2f8443ca-b01e-0070-308c-151cc0000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc552g4w83buhsr3htc0000000c2g000000000uvw
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:07 UTC419INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 49 69 5d 5b 4e 6e 5d 5b 4e 6e 5d 5b 4f 6f 5d 5b 54 74 5d 5b 45 65 5d 5b 4b 6b 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120653" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120651" /> <SR T="2" R="([Ii][Nn][Nn][Oo][Tt][Ee][Kk])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O=


                          Session IDSource IPSource PortDestination IPDestination Port
                          66192.168.2.44983613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120654v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:07 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 477
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:05 GMT
                          ETag: "0x8DC582BA54DCC28"
                          x-ms-request-id: 7be6812e-d01e-008e-528c-15387a000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc554l9xf959gp9cb1s000000063000000000c24h
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:07 UTC477INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120654" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120653" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          67192.168.2.44983713.107.246.604435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120655v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 419
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:37 GMT
                          ETag: "0x8DC582BB7F164C3"
                          x-ms-request-id: 1f480aea-c01e-002b-028c-156e00000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc55jdxmppy6cmd24bn000000046g00000000808r
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC419INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4e 6e 5d 5b 49 69 5d 5b 4d 6d 5d 5b 42 62 5d 5b 4f 6f 5d 5b 58 78 5d 5b 58 78 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120655" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120653" /> <SR T="2" R="([Nn][Ii][Mm][Bb][Oo][Xx][Xx])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O=


                          Session IDSource IPSource PortDestination IPDestination Port
                          68192.168.2.44983813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:07 UTC192OUTGET /rules/rule120656v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:07 GMT
                          Content-Type: text/xml
                          Content-Length: 477
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:04 GMT
                          ETag: "0x8DC582BA48B5BDD"
                          x-ms-request-id: 7be6821c-d01e-008e-398c-15387a000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033207Z-15767c5fc55whfstvfw43u8fp40000000bzg00000000kfdp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC477INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120656" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120655" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          69192.168.2.44983913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:08 UTC192OUTGET /rules/rule120657v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:08 GMT
                          Content-Type: text/xml
                          Content-Length: 419
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:57 GMT
                          ETag: "0x8DC582B9FF95F80"
                          x-ms-request-id: 16d3a614-701e-0032-288c-15a540000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033208Z-15767c5fc55fdfx81a30vtr1fw0000000cbg000000003p3n
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC419INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4e 6e 5d 5b 55 75 5d 5b 54 74 5d 5b 41 61 5d 5b 4e 6e 5d 5b 49 69 5d 5b 58 78 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120657" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120655" /> <SR T="2" R="([Nn][Uu][Tt][Aa][Nn][Ii][Xx])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O=


                          Session IDSource IPSource PortDestination IPDestination Port
                          70192.168.2.44984013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:08 UTC192OUTGET /rules/rule120658v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:08 GMT
                          Content-Type: text/xml
                          Content-Length: 472
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:34 GMT
                          ETag: "0x8DC582BB650C2EC"
                          x-ms-request-id: aa883537-b01e-0053-4c8c-15cdf8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033208Z-15767c5fc552g4w83buhsr3htc0000000bzg000000007ss5
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC472INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120658" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120657" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          71192.168.2.44984113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:08 UTC192OUTGET /rules/rule120659v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:08 GMT
                          Content-Type: text/xml
                          Content-Length: 468
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:30 GMT
                          ETag: "0x8DC582BB3EAF226"
                          x-ms-request-id: cce0beff-001e-0082-398c-155880000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033208Z-15767c5fc55sdcjq8ksxt4n9mc000000015g00000000n0ka
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC468INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 35 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4f 6f 5d 5b 50 70 5d 5b 45 65 5d 5b 4e 6e 5d 5b 53 73 5d 5b 54 74 5d 5b 41 61 5d 5b 43 63 5d 5b 4b 6b 5d 20 5b 46 66 5d 5b 4f 6f 5d 5b 55 75 5d 5b 4e 6e 5d 5b 44 64 5d 5b 41 61 5d 5b 54 74 5d 5b 49 69 5d 5b 4f 6f 5d 5b 4e 6e 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120659" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120657" /> <SR T="2" R="([Oo][Pp][Ee][Nn][Ss][Tt][Aa][Cc][Kk] [Ff][Oo][Uu][Nn][Dd][Aa][Tt][Ii][Oo][Nn])"> <S T="1" F="1" M="I


                          Session IDSource IPSource PortDestination IPDestination Port
                          72192.168.2.44984313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:08 UTC192OUTGET /rules/rule120661v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:08 GMT
                          Content-Type: text/xml
                          Content-Length: 411
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:44 GMT
                          ETag: "0x8DC582B989AF051"
                          x-ms-request-id: be018b72-401e-0035-7e8c-1582d8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033208Z-15767c5fc55n4msds84xh4z67w00000005s0000000001xzx
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC411INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 4f 6f 5d 5b 56 76 5d 5b 49 69 5d 5b 52 72 5d 5b 54 74 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120661" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120659" /> <SR T="2" R="([Oo][Vv][Ii][Rr][Tt])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true">


                          Session IDSource IPSource PortDestination IPDestination Port
                          73192.168.2.44984213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:08 UTC192OUTGET /rules/rule120660v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:08 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:08 GMT
                          Content-Type: text/xml
                          Content-Length: 485
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:39 GMT
                          ETag: "0x8DC582BB9769355"
                          x-ms-request-id: dc68dac5-201e-006e-298c-15bbe3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033208Z-15767c5fc55852fxfeh7csa2dn0000000bx0000000005py6
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:08 UTC485INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 35 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120660" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120659" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          74192.168.2.44984413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:08 UTC192OUTGET /rules/rule120662v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:08 GMT
                          Content-Type: text/xml
                          Content-Length: 470
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:42 GMT
                          ETag: "0x8DC582BBB181F65"
                          x-ms-request-id: 4da5c699-a01e-0070-198c-15573b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033208Z-15767c5fc55d6fcl6x6bw8cpdc0000000by0000000002vqp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC470INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120662" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120661" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          75192.168.2.44984513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:09 UTC192OUTGET /rules/rule120663v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:09 GMT
                          Content-Type: text/xml
                          Content-Length: 427
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:32 GMT
                          ETag: "0x8DC582BB556A907"
                          x-ms-request-id: be018b82-401e-0035-0c8c-1582d8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033209Z-15767c5fc554w2fgapsyvy8ua00000000bf0000000008see
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC427INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 50 70 5d 5b 41 61 5d 5b 52 72 5d 5b 41 61 5d 5b 4c 6c 5d 5b 4c 6c 5d 5b 45 65 5d 5b 4c 6c 5d 5b 53 73 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120663" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120661" /> <SR T="2" R="([Pp][Aa][Rr][Aa][Ll][Ll][Ee][Ll][Ss])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W"


                          Session IDSource IPSource PortDestination IPDestination Port
                          76192.168.2.44984613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:09 UTC192OUTGET /rules/rule120664v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:09 GMT
                          Content-Type: text/xml
                          Content-Length: 502
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:35 GMT
                          ETag: "0x8DC582BB6A0D312"
                          x-ms-request-id: 801e2bd2-b01e-0021-6a8c-15cab7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033209Z-15767c5fc55rv8zjq9dg0musxg0000000c2g000000000r3v
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC502INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120664" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120663" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          77192.168.2.44984813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:09 UTC192OUTGET /rules/rule120666v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC471INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:09 GMT
                          Content-Type: text/xml
                          Content-Length: 474
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:30 GMT
                          ETag: "0x8DC582BB3F48DAE"
                          x-ms-request-id: c0f539ba-f01e-005d-330d-1613ba000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033209Z-15767c5fc5546rn6ch9zv310e000000004zg000000004amp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_MISS
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC474INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120666" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120665" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          78192.168.2.44984713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:09 UTC192OUTGET /rules/rule120665v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:09 GMT
                          Content-Type: text/xml
                          Content-Length: 407
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:52 GMT
                          ETag: "0x8DC582B9D30478D"
                          x-ms-request-id: 285c7e33-c01e-008e-718c-157381000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033209Z-15767c5fc55dtdv4d4saq7t47n0000000bng00000000kt35
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC407INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 50 70 5d 5b 53 73 5d 5b 53 73 5d 5b 43 63 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120665" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120663" /> <SR T="2" R="([Pp][Ss][Ss][Cc])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true">


                          Session IDSource IPSource PortDestination IPDestination Port
                          79192.168.2.44984913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:09 UTC192OUTGET /rules/rule120667v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:09 GMT
                          Content-Type: text/xml
                          Content-Length: 408
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:40 GMT
                          ETag: "0x8DC582BB9B6040B"
                          x-ms-request-id: 04c46130-501e-0064-028c-151f54000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033209Z-15767c5fc55rv8zjq9dg0musxg0000000byg000000009bhv
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC408INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 51 71 5d 5b 45 65 5d 5b 4d 6d 5d 5b 55 75 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120667" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120665" /> <SR T="2" R="^([Qq][Ee][Mm][Uu])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true">


                          Session IDSource IPSource PortDestination IPDestination Port
                          80192.168.2.44985013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:09 UTC192OUTGET /rules/rule120668v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:09 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:09 GMT
                          Content-Type: text/xml
                          Content-Length: 469
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:30 GMT
                          ETag: "0x8DC582BB3CAEBB8"
                          x-ms-request-id: 6a902a44-301e-005d-788c-15e448000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033209Z-15767c5fc55dtdv4d4saq7t47n0000000bqg00000000bz0h
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:09 UTC469INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120668" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120667" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          81192.168.2.44985113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:10 UTC192OUTGET /rules/rule120669v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:10 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:10 GMT
                          Content-Type: text/xml
                          Content-Length: 416
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:32 GMT
                          ETag: "0x8DC582BB5284CCE"
                          x-ms-request-id: 15fe14b4-a01e-0002-638c-155074000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033210Z-15767c5fc55xsgnlxyxy40f4m00000000bs000000000kz9n
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:10 UTC416INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 36 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 52 72 5d 5b 45 65 5d 5b 44 64 5d 20 5b 48 68 5d 5b 41 61 5d 5b 54 74 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120669" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120667" /> <SR T="2" R="([Rr][Ee][Dd] [Hh][Aa][Tt])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="tr


                          Session IDSource IPSource PortDestination IPDestination Port
                          82192.168.2.44985213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:10 UTC192OUTGET /rules/rule120670v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:10 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:10 GMT
                          Content-Type: text/xml
                          Content-Length: 472
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:33 GMT
                          ETag: "0x8DC582B91EAD002"
                          x-ms-request-id: 4da5c882-a01e-0070-628c-15573b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033210Z-15767c5fc554wklc0x4mc5pq0w0000000cb0000000004p7k
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:10 UTC472INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120670" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120669" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          83192.168.2.44985313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:10 UTC192OUTGET /rules/rule120671v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:10 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:10 GMT
                          Content-Type: text/xml
                          Content-Length: 432
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:15 GMT
                          ETag: "0x8DC582BAABA2A10"
                          x-ms-request-id: 15fe1592-a01e-0002-378c-155074000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033210Z-15767c5fc55v7j95gq2uzq37a00000000c5000000000b1nz
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:10 UTC432INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 36 39 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 5e 28 5b 53 73 5d 5b 55 75 5d 5b 50 70 5d 5b 45 65 5d 5b 52 72 5d 5b 4d 6d 5d 5b 49 69 5d 5b 43 63 5d 5b 52 72 5d 5b 4f 6f 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120671" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120669" /> <SR T="2" R="^([Ss][Uu][Pp][Ee][Rr][Mm][Ii][Cc][Rr][Oo])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T


                          Session IDSource IPSource PortDestination IPDestination Port
                          84192.168.2.44985513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:10 UTC192OUTGET /rules/rule120672v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:10 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:10 GMT
                          Content-Type: text/xml
                          Content-Length: 475
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:41 GMT
                          ETag: "0x8DC582BBA740822"
                          x-ms-request-id: b9a19b13-401e-0078-148c-154d34000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033210Z-15767c5fc554w2fgapsyvy8ua00000000bk0000000001r3g
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:10 UTC475INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120672" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120671" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          85192.168.2.44985613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:10 UTC192OUTGET /rules/rule120673v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:10 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:10 GMT
                          Content-Type: text/xml
                          Content-Length: 427
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:31 GMT
                          ETag: "0x8DC582BB464F255"
                          x-ms-request-id: 9bed6e8e-001e-0046-5b8c-15da4b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033210Z-15767c5fc55xsgnlxyxy40f4m00000000bxg000000003zsa
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:10 UTC427INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 33 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 54 74 5d 5b 48 68 5d 5b 49 69 5d 5b 4e 6e 5d 5b 50 70 5d 5b 55 75 5d 5b 54 74 5d 5b 45 65 5d 5b 52 72 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120673" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120671" /> <SR T="2" R="([Tt][Hh][Ii][Nn][Pp][Uu][Tt][Ee][Rr])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W"


                          Session IDSource IPSource PortDestination IPDestination Port
                          86192.168.2.44985713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:10 UTC192OUTGET /rules/rule120674v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:10 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:10 GMT
                          Content-Type: text/xml
                          Content-Length: 474
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:03 GMT
                          ETag: "0x8DC582BA4037B0D"
                          x-ms-request-id: e08726cd-901e-00a0-738c-156a6d000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033210Z-15767c5fc55852fxfeh7csa2dn0000000bwg000000007m1r
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:10 UTC474INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 34 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120674" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120673" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          87192.168.2.44985813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120675v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 419
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:08 GMT
                          ETag: "0x8DC582BA6CF78C8"
                          x-ms-request-id: 766164d5-c01e-0082-668c-15af72000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc55jdxmppy6cmd24bn0000000480000000003zx0
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC419INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 35 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 33 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5b 55 75 5d 5b 50 70 5d 5b 43 63 5d 5b 4c 6c 5d 5b 4f 6f 5d 5b 55 75 5d 5b 44 64 5d 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120675" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120673" /> <SR T="2" R="([Uu][Pp][Cc][Ll][Oo][Uu][Dd])"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O=


                          Session IDSource IPSource PortDestination IPDestination Port
                          88192.168.2.44985913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120676v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 472
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:44 GMT
                          ETag: "0x8DC582B984BF177"
                          x-ms-request-id: dcc4dd0d-f01e-0099-7c8c-159171000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc55v7j95gq2uzq37a00000000c80000000003gwg
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC472INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120676" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120675" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          89192.168.2.44986013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120677v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 405
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:37 GMT
                          ETag: "0x8DC582B942B6AFF"
                          x-ms-request-id: d59d44fd-601e-003e-698c-153248000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc554l9xf959gp9cb1s000000062g00000000dr6q
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC405INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 37 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 35 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 52 20 54 3d 22 32 22 20 52 3d 22 28 5e 5b 58 78 5d 5b 45 65 5d 5b 4e 6e 5d 24 29 22 3e 0d 0a 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 31 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 3c 2f 53 52 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22 57 22 20 49 3d 22 30 22 20 4f 3d 22 74 72 75 65 22 3e 0d 0a 20 20 20 20 3c
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120677" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120675" /> <SR T="2" R="(^[Xx][Ee][Nn]$)"> <S T="1" F="1" M="Ignore" /> </SR> </S> <C T="W" I="0" O="true"> <


                          Session IDSource IPSource PortDestination IPDestination Port
                          90192.168.2.44986113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120678v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 468
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:41 GMT
                          ETag: "0x8DC582BBA642BF4"
                          x-ms-request-id: 4a2177bf-401e-00a3-638c-158b09000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc55gs96cphvgp5f5vc0000000bz000000000186m
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC468INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 38 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 37 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 55 20 54 3d 22 45 71 75 61 6c 73 4e 75 6c 6c 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 53 20 54 3d 22 31 22 20 46 3d 22 30 22 20 4d 3d 22 49 67 6e 6f 72 65 22 20 2f 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120678" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120677" /> <TH T="2"> <O T="EQ"> <L> <U T="EqualsNull"> <S T="1" F="0" M="Ignore" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          91192.168.2.44986213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120679v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 174
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:33 GMT
                          ETag: "0x8DC582B91D80E15"
                          x-ms-request-id: 4da5cae8-a01e-0070-0e8c-15573b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc55v7j95gq2uzq37a00000000c3g00000000fxxs
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC174INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 37 39 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 37 37 22 20 2f 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 54 3e 0d 0a 20 20 20 20 3c 53 20 54 3d 22 31 22 20 2f 3e 0d 0a 20 20 3c 2f 54 3e 0d 0a 3c 2f 52 3e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120679" V="0" DC="SM" T="Subrule" xmlns=""> <S> <R T="1" R="120677" /> </S> <T> <S T="1" /> </T></R>


                          Session IDSource IPSource PortDestination IPDestination Port
                          92192.168.2.44986313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120680v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 1952
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:39 GMT
                          ETag: "0x8DC582B956B0F3D"
                          x-ms-request-id: 1cc30b66-e01e-0071-368c-1508e7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc55w69c2zvnrz0gmgw0000000c8g000000002ta3
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC1952INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 38 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 53 53 20 54 3d 22 31 22 20 47 3d 22 7b 62 31 36 37 36 61 63 33 2d 37 66 65 65 2d 34 34 61 39 2d 39 61 30 65 2d 64 62 62 30 62 34 39 36 65 66 61 35 7d 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 32 22 20 52 3d 22 31 32 30 36 38 32 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 33 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 4c 54 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120680" V="0" DC="SM" T="Subrule" DCa="PSU" xmlns=""> <S> <SS T="1" G="{b1676ac3-7fee-44a9-9a0e-dbb0b496efa5}" /> <R T="2" R="120682" /> <F T="3"> <O T="LT"> <L>


                          Session IDSource IPSource PortDestination IPDestination Port
                          93192.168.2.44986413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:11 UTC192OUTGET /rules/rule120681v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:11 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:11 GMT
                          Content-Type: text/xml
                          Content-Length: 958
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:58 GMT
                          ETag: "0x8DC582BA0A31B3B"
                          x-ms-request-id: 8e9c9a52-201e-000c-6b8c-1579c4000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033211Z-15767c5fc554wklc0x4mc5pq0w0000000cd0000000000bmp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:11 UTC958INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 38 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 31 22 20 52 3d 22 31 32 30 36 30 38 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 32 22 20 52 3d 22 31 32 30 36 38 30 22 20 2f 3e 0d 0a 20 20 20 20 3c 54 48 20 54 3d 22 33 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54 3d 22 41 4e 44 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 3c 4f 20 54 3d 22 45 51 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 4c 3e 0d 0a
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120681" V="0" DC="SM" T="Subrule" DCa="PSU" xmlns=""> <S> <R T="1" R="120608" /> <R T="2" R="120680" /> <TH T="3"> <O T="AND"> <L> <O T="EQ"> <L>


                          Session IDSource IPSource PortDestination IPDestination Port
                          94192.168.2.44986513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC192OUTGET /rules/rule120682v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC470INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 501
                          Connection: close
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:18 GMT
                          ETag: "0x8DC582BACFDAACD"
                          x-ms-request-id: 0da9586c-701e-0097-318c-15b8c1000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55jdxmppy6cmd24bn0000000480000000003zy1
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC501INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 38 32 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 54 3d 22 53 75 62 72 75 6c 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 41 20 54 3d 22 31 22 20 45 3d 22 54 65 6c 65 6d 65 74 72 79 53 74 61 72 74 75 70 22 20 2f 3e 0d 0a 20 20 20 20 3c 52 20 54 3d 22 32 22 20 52 3d 22 31 32 30 31 30 30 22 20 2f 3e 0d 0a 20 20 20 20 3c 53 53 20 54 3d 22 33 22 20 47 3d 22 7b 62 31 36 37 36 61 63 33 2d 37 66 65 65 2d 34 34 61 39 2d 39 61 30 65 2d 64 62 62 30 62 34 39 36 65 66 61 35 7d 22 20 2f 3e 0d 0a 20 20 3c 2f 53 3e 0d 0a 20 20 3c 43 20 54 3d 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120682" V="0" DC="SM" T="Subrule" DCa="PSU" xmlns=""> <S> <A T="1" E="TelemetryStartup" /> <R T="2" R="120100" /> <SS T="3" G="{b1676ac3-7fee-44a9-9a0e-dbb0b496efa5}" /> </S> <C T="


                          Session IDSource IPSource PortDestination IPDestination Port
                          95192.168.2.44986613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC193OUTGET /rules/rule120602v10s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 2592
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:26:33 GMT
                          ETag: "0x8DC582BB5B890DB"
                          x-ms-request-id: b9a19cb7-401e-0078-068c-154d34000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55kg97hfq5uqyxxaw0000000bvg00000000k070
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC2592INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 30 32 22 20 56 3d 22 31 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 4d 65 74 61 64 61 74 61 41 70 70 6c 69 63 61 74 69 6f 6e 41 6e 64 4c 61 6e 67 75 61 67 65 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 44 43 61 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120602" V="10" DC="SM" EN="Office.System.SystemHealthMetadataApplicationAndLanguage" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalBusinessImpact" DL="A" DCa=


                          Session IDSource IPSource PortDestination IPDestination Port
                          96192.168.2.44986713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC192OUTGET /rules/rule120601v3s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 3342
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:25:34 GMT
                          ETag: "0x8DC582B927E47E9"
                          x-ms-request-id: 1cc30bd5-e01e-0071-1a8c-1508e7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55jdxmppy6cmd24bn0000000470000000006d81
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC3342INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 36 30 31 22 20 56 3d 22 33 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 4d 65 74 61 64 61 74 61 4f 53 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 44 43 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120601" V="3" DC="SM" EN="Office.System.SystemHealthMetadataOS" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalBusinessImpact" DL="A" DCa="DC" xmlns=""> <RI


                          Session IDSource IPSource PortDestination IPDestination Port
                          97192.168.2.44986913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC192OUTGET /rules/rule701201v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 1393
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:51 GMT
                          ETag: "0x8DC582BE3E55B6E"
                          x-ms-request-id: b23951fc-501e-005b-2a8c-15d7f7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55gs96cphvgp5f5vc0000000btg00000000g3z2
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC1393INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 32 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 58 61 6d 6c 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 58 61 6d 6c 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701201" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Xaml.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenXaml"


                          Session IDSource IPSource PortDestination IPDestination Port
                          98192.168.2.44986813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC193OUTGET /rules/rule224901v11s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 2284
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:13 GMT
                          ETag: "0x8DC582BCD58BEEE"
                          x-ms-request-id: 82f8c3b9-c01e-0014-418c-15a6a3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55gq5fmm10nm5qqr80000000c200000000090ez
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC2284INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 32 32 34 39 30 31 22 20 56 3d 22 31 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 4c 69 63 65 6e 73 69 6e 67 2e 4f 66 66 69 63 65 43 6c 69 65 6e 74 4c 69 63 65 6e 73 69 6e 67 2e 44 6f 4c 69 63 65 6e 73 65 56 61 6c 69 64 61 74 69 6f 6e 22 20 41 54 54 3d 22 63 31 61 30 64 62 30 31 32 37 39 36 34 36 37 34 61 30 64 36 32 66 64 65 35 61 62 30 66 65 36 32 2d 36 65 63 34 61 63 34 35 2d 63 65 62 63 2d 34 66 38 30 2d 61 61 38 33 2d 62 36 62 39 64 33 61 38 36 65 64 37 2d 37 37 31 39 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 43 65 6e 73 75 73 22 20 54 3d 22 55 70 6c 6f 61 64 2d 4d 65 64 69 75 6d 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="224901" V="11" DC="SM" EN="Office.Licensing.OfficeClientLicensing.DoLicenseValidation" ATT="c1a0db0127964674a0d62fde5ab0fe62-6ec4ac45-cebc-4f80-aa83-b6b9d3a86ed7-7719" SP="CriticalCensus" T="Upload-Medium"


                          Session IDSource IPSource PortDestination IPDestination Port
                          99192.168.2.44987013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC192OUTGET /rules/rule701200v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 1356
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:38 GMT
                          ETag: "0x8DC582BDC681E17"
                          x-ms-request-id: b9a19e00-401e-0078-388c-154d34000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55d6fcl6x6bw8cpdc0000000bt000000000g13g
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC1356INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 32 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 58 61 6d 6c 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 58 61 6d 6c 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701200" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Xaml" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenXaml" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          100192.168.2.44987113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:12 UTC192OUTGET /rules/rule700201v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:12 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:12 GMT
                          Content-Type: text/xml
                          Content-Length: 1393
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:50 GMT
                          ETag: "0x8DC582BE39DFC9B"
                          x-ms-request-id: 7afec079-601e-000d-468c-152618000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033212Z-15767c5fc55gq5fmm10nm5qqr80000000c50000000002qw2
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:12 UTC1393INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 32 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 57 6f 72 64 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 57 6f 72 64 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700201" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Word.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenWord"


                          Session IDSource IPSource PortDestination IPDestination Port
                          101192.168.2.44987213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:13 UTC192OUTGET /rules/rule700200v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:13 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:13 GMT
                          Content-Type: text/xml
                          Content-Length: 1356
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:43 GMT
                          ETag: "0x8DC582BDF66E42D"
                          x-ms-request-id: 3ef81e2a-f01e-001f-3f8c-155dc8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033213Z-15767c5fc55ncqdn59ub6rndq00000000bkg00000000dpyz
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:13 UTC1356INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 32 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 57 6f 72 64 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 57 6f 72 64 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700200" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Word" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenWord" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          102192.168.2.44987313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:13 UTC192OUTGET /rules/rule702350v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:13 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:13 GMT
                          Content-Type: text/xml
                          Content-Length: 1358
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:54 GMT
                          ETag: "0x8DC582BE6431446"
                          x-ms-request-id: 6a90313a-301e-005d-1a8c-15e448000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033213Z-15767c5fc55rv8zjq9dg0musxg0000000bxg00000000dfb8
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:13 UTC1358INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 33 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 56 6f 69 63 65 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 56 6f 69 63 65 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702350" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Voice" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenVoice" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          103192.168.2.44987413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:13 UTC192OUTGET /rules/rule702351v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:13 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:13 GMT
                          Content-Type: text/xml
                          Content-Length: 1395
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:44 GMT
                          ETag: "0x8DC582BE017CAD3"
                          x-ms-request-id: a68e09c4-f01e-0052-148c-159224000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033213Z-15767c5fc55852fxfeh7csa2dn0000000bw0000000008d1q
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:13 UTC1395INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 33 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 56 6f 69 63 65 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 56 6f 69 63
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702351" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Voice.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenVoic


                          Session IDSource IPSource PortDestination IPDestination Port
                          104192.168.2.44987513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:13 UTC192OUTGET /rules/rule701251v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:13 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:13 GMT
                          Content-Type: text/xml
                          Content-Length: 1395
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:41 GMT
                          ETag: "0x8DC582BDE12A98D"
                          x-ms-request-id: 1392789d-401e-0047-0e8c-158597000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033213Z-15767c5fc55v7j95gq2uzq37a00000000c80000000003gyn
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:13 UTC1395INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 32 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 56 69 73 69 6f 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 56 69 73 69
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701251" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Visio.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenVisi


                          Session IDSource IPSource PortDestination IPDestination Port
                          105192.168.2.44987613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:13 UTC192OUTGET /rules/rule701250v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:13 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:13 GMT
                          Content-Type: text/xml
                          Content-Length: 1358
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:44 GMT
                          ETag: "0x8DC582BE022ECC5"
                          x-ms-request-id: a76247f8-001e-00a2-558c-15d4d5000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033213Z-15767c5fc55kg97hfq5uqyxxaw0000000c1g000000002u5m
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:13 UTC1358INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 32 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 56 69 73 69 6f 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 56 69 73 69 6f 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701250" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Visio" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenVisio" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          106192.168.2.44987713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:13 UTC192OUTGET /rules/rule700051v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:13 GMT
                          Content-Type: text/xml
                          Content-Length: 1389
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:46 GMT
                          ETag: "0x8DC582BE10A6BC1"
                          x-ms-request-id: 7afec1f8-601e-000d-328c-152618000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033213Z-15767c5fc55whfstvfw43u8fp40000000c1g00000000ct9h
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1389INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 30 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 55 58 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 55 58 22 20 53 3d 22
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700051" V="1" DC="SM" EN="Office.Telemetry.Event.Office.UX.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenUX" S="


                          Session IDSource IPSource PortDestination IPDestination Port
                          107192.168.2.44987813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule700050v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1352
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:01 GMT
                          ETag: "0x8DC582BE9DEEE28"
                          x-ms-request-id: 92784c80-801e-002a-088c-1531dc000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc55ncqdn59ub6rndq00000000bpg000000006atk
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1352INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 30 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 55 58 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 55 58 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f 20 54
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700050" V="1" DC="SM" EN="Office.Telemetry.Event.Office.UX" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenUX" S="Medium" /> <F T="2"> <O T


                          Session IDSource IPSource PortDestination IPDestination Port
                          108192.168.2.44987913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule702951v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1405
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:46 GMT
                          ETag: "0x8DC582BE12B5C71"
                          x-ms-request-id: 4a217eb8-401e-00a3-218c-158b09000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc55472x4k7dmphmadg0000000bng000000008nwr
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1405INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 39 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 72 61 6e 73 6c 61 74 6f 72 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702951" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Translator.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantToke


                          Session IDSource IPSource PortDestination IPDestination Port
                          109192.168.2.44988013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule702950v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1368
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:40 GMT
                          ETag: "0x8DC582BDDC22447"
                          x-ms-request-id: c825d9ef-901e-007b-278c-15ac50000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc55d6fcl6x6bw8cpdc0000000bug00000000bpke
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1368INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 39 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 72 61 6e 73 6c 61 74 6f 72 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 54 72 61 6e 73 6c 61 74 6f 72 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702950" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Translator" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenTranslator" S="Medium" /> <F T=


                          Session IDSource IPSource PortDestination IPDestination Port
                          110192.168.2.44988113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule701151v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1401
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:45 GMT
                          ETag: "0x8DC582BE055B528"
                          x-ms-request-id: 6a90350a-301e-005d-348c-15e448000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc554l9xf959gp9cb1s000000064g0000000085m2
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1401INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 31 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 65 78 74 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 54 65 78 74 41
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701151" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Text.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenTextA


                          Session IDSource IPSource PortDestination IPDestination Port
                          111192.168.2.44988213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule701150v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1364
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:46 GMT
                          ETag: "0x8DC582BE1223606"
                          x-ms-request-id: ed356ac5-101e-0046-2b8c-1591b0000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc55whfstvfw43u8fp40000000c1g00000000ctap
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1364INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 31 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 65 78 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 54 65 78 74 41 6e 64 46 6f 6e 74 73 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701150" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Text" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenTextAndFonts" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          112192.168.2.44988313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule702201v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1397
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:56 GMT
                          ETag: "0x8DC582BE7262739"
                          x-ms-request-id: 76616de5-c01e-0082-6f8c-15af72000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc55jdxmppy6cmd24bn000000043g00000000ghe9
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1397INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 32 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 65 6c 6c 4d 65 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 54 65 6c
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702201" V="1" DC="SM" EN="Office.Telemetry.Event.Office.TellMe.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenTel


                          Session IDSource IPSource PortDestination IPDestination Port
                          113192.168.2.44988413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:14 UTC192OUTGET /rules/rule702200v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:14 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:14 GMT
                          Content-Type: text/xml
                          Content-Length: 1360
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:40 GMT
                          ETag: "0x8DC582BDDEB5124"
                          x-ms-request-id: 29534450-901e-0064-768c-15e8a6000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033214Z-15767c5fc55dtdv4d4saq7t47n0000000brg00000000a5nr
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:14 UTC1360INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 32 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 65 6c 6c 4d 65 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 54 65 6c 6c 4d 65 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702200" V="1" DC="SM" EN="Office.Telemetry.Event.Office.TellMe" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenTellMe" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          114192.168.2.44988513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:15 UTC192OUTGET /rules/rule700401v2s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:15 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:15 GMT
                          Content-Type: text/xml
                          Content-Length: 1403
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:38 GMT
                          ETag: "0x8DC582BDCB4853F"
                          x-ms-request-id: 6ec2e3f4-801e-007b-208c-15e7ab000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033215Z-15767c5fc55w69c2zvnrz0gmgw0000000c90000000001rdb
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:15 UTC1403INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 34 30 31 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700401" V="2" DC="SM" EN="Office.Telemetry.Event.Office.Telemetry.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantToken


                          Session IDSource IPSource PortDestination IPDestination Port
                          115192.168.2.44988613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:15 UTC192OUTGET /rules/rule700400v2s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:15 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:15 GMT
                          Content-Type: text/xml
                          Content-Length: 1366
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:36 GMT
                          ETag: "0x8DC582BDB779FC3"
                          x-ms-request-id: 0da95f5c-701e-0097-318c-15b8c1000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033215Z-15767c5fc55qdcd62bsn50hd6s0000000br000000000c3dv
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:15 UTC1366INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 34 30 30 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 54 65 6c 65 6d 65 74 72 79 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700400" V="2" DC="SM" EN="Office.Telemetry.Event.Office.Telemetry" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenTelemetry" S="Medium" /> <F T="2


                          Session IDSource IPSource PortDestination IPDestination Port
                          116192.168.2.44988713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:15 UTC192OUTGET /rules/rule700351v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:15 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:15 GMT
                          Content-Type: text/xml
                          Content-Length: 1397
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:44 GMT
                          ETag: "0x8DC582BDFD43C07"
                          x-ms-request-id: 704395e8-201e-005d-718c-15afb3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033215Z-15767c5fc55rv8zjq9dg0musxg0000000by000000000bxn8
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:15 UTC1397INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 33 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 79 73
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700351" V="1" DC="SM" EN="Office.Telemetry.Event.Office.System.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSys


                          Session IDSource IPSource PortDestination IPDestination Port
                          117192.168.2.44988813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:15 UTC192OUTGET /rules/rule700350v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:15 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:15 GMT
                          Content-Type: text/xml
                          Content-Length: 1360
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:40 GMT
                          ETag: "0x8DC582BDD74D2EC"
                          x-ms-request-id: 8be9c1e7-301e-0052-678c-1565d6000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033215Z-15767c5fc55n4msds84xh4z67w00000005pg000000007u31
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:15 UTC1360INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 33 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 79 73 74 65 6d 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700350" V="1" DC="SM" EN="Office.Telemetry.Event.Office.System" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSystem" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          118192.168.2.44988913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:15 UTC192OUTGET /rules/rule703901v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:15 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:15 GMT
                          Content-Type: text/xml
                          Content-Length: 1427
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:53 GMT
                          ETag: "0x8DC582BE56F6873"
                          x-ms-request-id: dc68e902-201e-006e-0d8c-15bbe3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033215Z-15767c5fc55852fxfeh7csa2dn0000000by00000000032rd
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:15 UTC1427INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 39 30 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 65 72 76 69 63 65 61 62 69 6c 69 74 79 4d 61 6e 61 67 65 72 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703901" V="0" DC="SM" EN="Office.Telemetry.Event.Office.ServiceabilityManager.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="Nexu


                          Session IDSource IPSource PortDestination IPDestination Port
                          119192.168.2.44989013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:15 UTC192OUTGET /rules/rule703900v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:15 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:15 GMT
                          Content-Type: text/xml
                          Content-Length: 1390
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:49 GMT
                          ETag: "0x8DC582BE3002601"
                          x-ms-request-id: 21dfe39b-001e-0049-468c-155bd5000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033215Z-15767c5fc55qkvj6n60pxm9mbw000000012000000000dke0
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:15 UTC1390INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 39 30 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 65 72 76 69 63 65 61 62 69 6c 69 74 79 4d 61 6e 61 67 65 72 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 65 72 76 69 63 65 61 62 69 6c 69 74 79 4d 61 6e 61 67 65 72 22 20 53 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703900" V="0" DC="SM" EN="Office.Telemetry.Event.Office.ServiceabilityManager" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenServiceabilityManager" S=


                          Session IDSource IPSource PortDestination IPDestination Port
                          120192.168.2.44989113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:16 UTC192OUTGET /rules/rule701501v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:16 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:16 GMT
                          Content-Type: text/xml
                          Content-Length: 1401
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:48 GMT
                          ETag: "0x8DC582BE2A9D541"
                          x-ms-request-id: 82f8cc24-c01e-0014-3a8c-15a6a3000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033216Z-15767c5fc55d6fcl6x6bw8cpdc0000000bw00000000082rc
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:16 UTC1401INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 35 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 65 63 75 72 69 74 79 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701501" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Security.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenS


                          Session IDSource IPSource PortDestination IPDestination Port
                          121192.168.2.44989213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:16 UTC192OUTGET /rules/rule701500v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:16 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:16 GMT
                          Content-Type: text/xml
                          Content-Length: 1364
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:03 GMT
                          ETag: "0x8DC582BEB6AD293"
                          x-ms-request-id: ba3c7a68-301e-0099-698c-156683000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033216Z-15767c5fc55n4msds84xh4z67w00000005qg000000004na4
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:16 UTC1364INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 35 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 65 63 75 72 69 74 79 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 65 63 75 72 69 74 79 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701500" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Security" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSecurity" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          122192.168.2.44989313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:16 UTC192OUTGET /rules/rule702801v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:16 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:16 GMT
                          Content-Type: text/xml
                          Content-Length: 1391
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:43 GMT
                          ETag: "0x8DC582BDF58DC7E"
                          x-ms-request-id: 023e591f-a01e-003d-618c-1598d7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033216Z-15767c5fc55472x4k7dmphmadg0000000bk000000000g7ap
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:16 UTC1391INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 38 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 44 58 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 44 58 22 20 53
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702801" V="1" DC="SM" EN="Office.Telemetry.Event.Office.SDX.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSDX" S


                          Session IDSource IPSource PortDestination IPDestination Port
                          123192.168.2.44989413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:16 UTC192OUTGET /rules/rule702800v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:16 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:16 GMT
                          Content-Type: text/xml
                          Content-Length: 1354
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:45 GMT
                          ETag: "0x8DC582BE0662D7C"
                          x-ms-request-id: 76253f94-c01e-0066-328c-15a1ec000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033216Z-15767c5fc55whfstvfw43u8fp40000000c0g00000000gu9d
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:16 UTC1354INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 38 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 44 58 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 44 58 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20 20 20 20 20 3c 4f
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702800" V="1" DC="SM" EN="Office.Telemetry.Event.Office.SDX" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSDX" S="Medium" /> <F T="2"> <O


                          Session IDSource IPSource PortDestination IPDestination Port
                          124192.168.2.44989513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:16 UTC192OUTGET /rules/rule703351v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:16 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:16 GMT
                          Content-Type: text/xml
                          Content-Length: 1403
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:39 GMT
                          ETag: "0x8DC582BDCDD6400"
                          x-ms-request-id: 819d4321-f01e-0020-6e8c-15956b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033216Z-15767c5fc554wklc0x4mc5pq0w0000000c90000000009tgw
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:16 UTC1403INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 33 35 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 63 72 69 70 74 4c 61 62 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703351" V="0" DC="SM" EN="Office.Telemetry.Event.Office.ScriptLab.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantToken


                          Session IDSource IPSource PortDestination IPDestination Port
                          125192.168.2.44989613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:16 UTC192OUTGET /rules/rule703350v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:16 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:16 GMT
                          Content-Type: text/xml
                          Content-Length: 1366
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:42 GMT
                          ETag: "0x8DC582BDF1E2608"
                          x-ms-request-id: fb0d4061-601e-0050-198c-152c9c000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033216Z-15767c5fc55fdfx81a30vtr1fw0000000c6000000000mt2t
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:16 UTC1366INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 33 35 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 63 72 69 70 74 4c 61 62 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 63 72 69 70 74 4c 61 62 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703350" V="0" DC="SM" EN="Office.Telemetry.Event.Office.ScriptLab" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenScriptLab" S="Medium" /> <F T="2


                          Session IDSource IPSource PortDestination IPDestination Port
                          126192.168.2.44989713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule703501v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1399
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:59 GMT
                          ETag: "0x8DC582BE8C605FF"
                          x-ms-request-id: 831f1653-b01e-0098-198c-15cead000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc55qkvj6n60pxm9mbw0000000170000000001e3p
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1399INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 35 30 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 61 6e 64 62 6f 78 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 61
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703501" V="0" DC="SM" EN="Office.Telemetry.Event.Office.Sandbox.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSa


                          Session IDSource IPSource PortDestination IPDestination Port
                          127192.168.2.44989813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule703500v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1362
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:43 GMT
                          ETag: "0x8DC582BDF497570"
                          x-ms-request-id: 7585955c-001e-000b-518c-1515a7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc55qkvj6n60pxm9mbw000000013000000000aztq
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1362INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 35 30 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 53 61 6e 64 62 6f 78 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 53 61 6e 64 62 6f 78 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703500" V="0" DC="SM" EN="Office.Telemetry.Event.Office.Sandbox" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenSandbox" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          128192.168.2.44990013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule701801v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1403
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:38 GMT
                          ETag: "0x8DC582BDC2EEE03"
                          x-ms-request-id: 89fd357a-501e-008f-758c-159054000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc55v7j95gq2uzq37a00000000c4g00000000dnmc
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1403INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 38 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 52 65 73 6f 75 72 63 65 73 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701801" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Resources.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantToken


                          Session IDSource IPSource PortDestination IPDestination Port
                          129192.168.2.44990113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule701800v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1366
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:01 GMT
                          ETag: "0x8DC582BEA414B16"
                          x-ms-request-id: a7582d38-101e-0028-528c-158f64000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc55gq5fmm10nm5qqr80000000bz000000000gtwr
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1366INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 38 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 52 65 73 6f 75 72 63 65 73 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 52 65 73 6f 75 72 63 65 73 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701800" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Resources" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenResources" S="Medium" /> <F T="2


                          Session IDSource IPSource PortDestination IPDestination Port
                          130192.168.2.44990213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule701051v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1399
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:47 GMT
                          ETag: "0x8DC582BE1CC18CD"
                          x-ms-request-id: a68e0dd8-f01e-0052-1d8c-159224000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc55v7j95gq2uzq37a00000000c3g00000000fy1s
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1399INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 30 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 52 65 6c 65 61 73 65 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 52 65
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701051" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Release.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenRe


                          Session IDSource IPSource PortDestination IPDestination Port
                          131192.168.2.44990313.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule701050v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1362
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:03 GMT
                          ETag: "0x8DC582BEB256F43"
                          x-ms-request-id: 757cff4f-401e-000a-528c-154a7b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc5546rn6ch9zv310e000000004z0000000005rwm
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1362INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 30 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 52 65 6c 65 61 73 65 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 52 65 6c 65 61 73 65 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701050" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Release" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenRelease" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          132192.168.2.44990413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule702751v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:17 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1403
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:03 GMT
                          ETag: "0x8DC582BEB866CDB"
                          x-ms-request-id: b2395a75-501e-005b-038c-15d7f7000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc554wklc0x4mc5pq0w0000000c6g00000000gta9
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:17 UTC1403INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 37 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 75 62 6c 69 73 68 65 72 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702751" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Publisher.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantToken


                          Session IDSource IPSource PortDestination IPDestination Port
                          133192.168.2.44990513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:17 UTC192OUTGET /rules/rule702750v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:17 GMT
                          Content-Type: text/xml
                          Content-Length: 1366
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:54 GMT
                          ETag: "0x8DC582BE5B7B174"
                          x-ms-request-id: 9bed7ce1-001e-0046-4f8c-15da4b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033217Z-15767c5fc55lghvzbxktxfqntw0000000bk000000000hraf
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1366INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 37 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 75 62 6c 69 73 68 65 72 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 75 62 6c 69 73 68 65 72 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702750" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Publisher" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPublisher" S="Medium" /> <F T="2


                          Session IDSource IPSource PortDestination IPDestination Port
                          134192.168.2.44990613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:18 UTC192OUTGET /rules/rule702301v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:18 GMT
                          Content-Type: text/xml
                          Content-Length: 1399
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:00 GMT
                          ETag: "0x8DC582BE976026E"
                          x-ms-request-id: 7baaa16d-b01e-0097-4d8c-154f33000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033218Z-15767c5fc55dtdv4d4saq7t47n0000000bv0000000001a0d
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1399INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 33 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 72 6f 6a 65 63 74 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 72
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702301" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Project.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPr


                          Session IDSource IPSource PortDestination IPDestination Port
                          135192.168.2.44990713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:18 UTC192OUTGET /rules/rule702300v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:18 GMT
                          Content-Type: text/xml
                          Content-Length: 1362
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:37 GMT
                          ETag: "0x8DC582BDC13EFEF"
                          x-ms-request-id: 819d44cb-f01e-0020-6f8c-15956b000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033218Z-15767c5fc55d6fcl6x6bw8cpdc0000000brg00000000n3vr
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1362INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 33 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 72 6f 6a 65 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 72 6f 6a 65 63 74 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702300" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Project" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenProject" S="Medium" /> <F T="2">


                          Session IDSource IPSource PortDestination IPDestination Port
                          136192.168.2.44990813.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:18 UTC192OUTGET /rules/rule703401v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:18 GMT
                          Content-Type: text/xml
                          Content-Length: 1425
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:55 GMT
                          ETag: "0x8DC582BE6BD89A1"
                          x-ms-request-id: 89fd37a1-501e-008f-6d8c-159054000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033218Z-15767c5fc55dtdv4d4saq7t47n0000000brg00000000a5qp
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1425INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 34 30 31 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 72 6f 67 72 61 6d 6d 61 62 6c 65 53 75 72 66 61 63 65 73 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703401" V="0" DC="SM" EN="Office.Telemetry.Event.Office.ProgrammableSurfaces.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="Nexus


                          Session IDSource IPSource PortDestination IPDestination Port
                          137192.168.2.44990913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:18 UTC192OUTGET /rules/rule703400v0s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:18 GMT
                          Content-Type: text/xml
                          Content-Length: 1388
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:37 GMT
                          ETag: "0x8DC582BDBD9126E"
                          x-ms-request-id: 9c5056bf-f01e-0003-548c-154453000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033218Z-15767c5fc55rv8zjq9dg0musxg0000000by000000000bxqx
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1388INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 33 34 30 30 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 72 6f 67 72 61 6d 6d 61 62 6c 65 53 75 72 66 61 63 65 73 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 72 6f 67 72 61 6d 6d 61 62 6c 65 53 75 72 66 61 63 65 73 22 20 53 3d 22 4d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="703400" V="0" DC="SM" EN="Office.Telemetry.Event.Office.ProgrammableSurfaces" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenProgrammableSurfaces" S="M


                          Session IDSource IPSource PortDestination IPDestination Port
                          138192.168.2.44991013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:18 UTC192OUTGET /rules/rule702501v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:18 GMT
                          Content-Type: text/xml
                          Content-Length: 1415
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:57 GMT
                          ETag: "0x8DC582BE7C66E85"
                          x-ms-request-id: 42bb1403-701e-005c-578c-15bb94000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033218Z-15767c5fc55jdxmppy6cmd24bn0000000480000000004043
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1415INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 35 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 72 6f 67 72 61 6d 6d 61 62 69 6c 69 74 79 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702501" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Programmability.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenan


                          Session IDSource IPSource PortDestination IPDestination Port
                          139192.168.2.44991113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:18 UTC192OUTGET /rules/rule702500v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:18 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:18 GMT
                          Content-Type: text/xml
                          Content-Length: 1378
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:36 GMT
                          ETag: "0x8DC582BDB813B3F"
                          x-ms-request-id: be019976-401e-0035-5d8c-1582d8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033218Z-15767c5fc55dtdv4d4saq7t47n0000000bq000000000dpp5
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:18 UTC1378INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 35 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 72 6f 67 72 61 6d 6d 61 62 69 6c 69 74 79 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 72 6f 67 72 61 6d 6d 61 62 69 6c 69 74 79 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702500" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Programmability" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenProgrammability" S="Medium" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          140192.168.2.44991213.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC192OUTGET /rules/rule700501v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:19 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Content-Type: text/xml
                          Content-Length: 1405
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:58 GMT
                          ETag: "0x8DC582BE89A8F82"
                          x-ms-request-id: 56c891cb-f01e-0085-428c-1588ea000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033219Z-15767c5fc55tsfp92w7yna557w0000000by000000000bqc7
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:19 UTC1405INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 35 30 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 6f 77 65 72 50 6f 69 6e 74 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700501" V="1" DC="SM" EN="Office.Telemetry.Event.Office.PowerPoint.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantToke


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          141192.168.2.449913142.250.184.2384435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1304
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=UMyTg8vS69D0gYHA3clpZW2IksC__bks30xTMPIhas2foZACIxQidZaVBnvxiT7NDPR2pWdkrvRm5rPTedJbjzePBpcSoH6VdqV6akicn2eYL5_rWB0KXM-SX5_WQbtxo-XsMDc1necGYM0pPrOaOqUgFUx98GgGQIABgv2hb3W45uK8-JttKAB98KA
                          2024-10-04 03:32:19 UTC1304OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 38 30 31 32 37 33 37 35 31 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"31",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1728012737513",null,null,null
                          2024-10-04 03:32:19 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:32:19 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:32:19 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination Port
                          142192.168.2.44991413.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC192OUTGET /rules/rule700500v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:19 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Content-Type: text/xml
                          Content-Length: 1368
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:53 GMT
                          ETag: "0x8DC582BE51CE7B3"
                          x-ms-request-id: 2f845d93-b01e-0070-2f8c-151cc0000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033219Z-15767c5fc55n4msds84xh4z67w00000005rg000000002q4m
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:19 UTC1368INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 30 35 30 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 6f 77 65 72 50 6f 69 6e 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 6f 77 65 72 50 6f 69 6e 74 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="700500" V="1" DC="SM" EN="Office.Telemetry.Event.Office.PowerPoint" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPowerPoint" S="Medium" /> <F T=


                          Session IDSource IPSource PortDestination IPDestination Port
                          143192.168.2.44991513.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC192OUTGET /rules/rule702551v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:19 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Content-Type: text/xml
                          Content-Length: 1415
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:39 GMT
                          ETag: "0x8DC582BDCE9703A"
                          x-ms-request-id: 5f7380a8-801e-0015-7b8c-15f97f000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033219Z-15767c5fc55whfstvfw43u8fp40000000c1000000000e56m
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:19 UTC1415INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 35 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 65 72 73 6f 6e 61 6c 69 7a 61 74 69 6f 6e 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702551" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Personalization.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenan


                          Session IDSource IPSource PortDestination IPDestination Port
                          144192.168.2.44991613.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC192OUTGET /rules/rule702550v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:19 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Content-Type: text/xml
                          Content-Length: 1378
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:53 GMT
                          ETag: "0x8DC582BE584C214"
                          x-ms-request-id: b612907a-401e-008c-278c-1586c2000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033219Z-15767c5fc55d6fcl6x6bw8cpdc0000000bs000000000m1f7
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:19 UTC1378INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 35 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 65 72 73 6f 6e 61 6c 69 7a 61 74 69 6f 6e 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 65 72 73 6f 6e 61 6c 69 7a 61 74 69 6f 6e 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702550" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Personalization" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPersonalization" S="Medium" />


                          Session IDSource IPSource PortDestination IPDestination Port
                          145192.168.2.44991713.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC192OUTGET /rules/rule701351v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:19 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Content-Type: text/xml
                          Content-Length: 1407
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:55 GMT
                          ETag: "0x8DC582BE687B46A"
                          x-ms-request-id: 2d1829d7-b01e-001e-738c-150214000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033219Z-15767c5fc55v7j95gq2uzq37a00000000c4000000000ea3z
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:19 UTC1407INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 33 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 65 72 66 6f 72 6d 61 6e 63 65 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701351" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Performance.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTok


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          146192.168.2.449918142.250.184.2384435856C:\Program Files\Google\Chrome\Application\chrome.exe
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                          Host: play.google.com
                          Connection: keep-alive
                          Content-Length: 1334
                          sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                          sec-ch-ua-mobile: ?0
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                          sec-ch-ua-arch: "x86"
                          Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                          sec-ch-ua-full-version: "117.0.5938.132"
                          sec-ch-ua-platform-version: "10.0.0"
                          X-Goog-AuthUser: 0
                          sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                          sec-ch-ua-bitness: "64"
                          sec-ch-ua-model: ""
                          sec-ch-ua-wow64: ?0
                          sec-ch-ua-platform: "Windows"
                          Accept: */*
                          Origin: https://accounts.google.com
                          X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                          Sec-Fetch-Site: same-site
                          Sec-Fetch-Mode: cors
                          Sec-Fetch-Dest: empty
                          Referer: https://accounts.google.com/
                          Accept-Encoding: gzip, deflate, br
                          Accept-Language: en-US,en;q=0.9
                          Cookie: NID=518=UMyTg8vS69D0gYHA3clpZW2IksC__bks30xTMPIhas2foZACIxQidZaVBnvxiT7NDPR2pWdkrvRm5rPTedJbjzePBpcSoH6VdqV6akicn2eYL5_rWB0KXM-SX5_WQbtxo-XsMDc1necGYM0pPrOaOqUgFUx98GgGQIABgv2hb3W45uK8-JttKAB98KA
                          2024-10-04 03:32:19 UTC1334OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 38 30 31 32 37 33 38 30 30 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                          Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"31",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1728012738005",null,null,null
                          2024-10-04 03:32:19 UTC523INHTTP/1.1 200 OK
                          Access-Control-Allow-Origin: https://accounts.google.com
                          Cross-Origin-Resource-Policy: cross-origin
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Headers: X-Playlog-Web
                          Content-Type: text/plain; charset=UTF-8
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Server: Playlog
                          Cache-Control: private
                          X-XSS-Protection: 0
                          X-Frame-Options: SAMEORIGIN
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Accept-Ranges: none
                          Vary: Accept-Encoding
                          Connection: close
                          Transfer-Encoding: chunked
                          2024-10-04 03:32:19 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                          Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                          2024-10-04 03:32:19 UTC5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination Port
                          147192.168.2.44991913.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:19 UTC192OUTGET /rules/rule701350v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:19 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:19 GMT
                          Content-Type: text/xml
                          Content-Length: 1370
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:41 GMT
                          ETag: "0x8DC582BDE62E0AB"
                          x-ms-request-id: be019a9f-401e-0035-518c-1582d8000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033219Z-15767c5fc55qdcd62bsn50hd6s0000000bs0000000008wh9
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:19 UTC1370INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 31 33 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 65 72 66 6f 72 6d 61 6e 63 65 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 65 72 66 6f 72 6d 61 6e 63 65 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="701350" V="1" DC="SM" EN="Office.Telemetry.Event.Office.Performance" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPerformance" S="Medium" /> <F


                          Session IDSource IPSource PortDestination IPDestination Port
                          148192.168.2.44992013.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:20 UTC192OUTGET /rules/rule702151v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:20 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:20 GMT
                          Content-Type: text/xml
                          Content-Length: 1397
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:27:46 GMT
                          ETag: "0x8DC582BE156D2EE"
                          x-ms-request-id: 36a1620f-001e-0028-0f8c-15c49f000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033220Z-15767c5fc55kg97hfq5uqyxxaw0000000c10000000003qdk
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:20 UTC1397INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 31 35 31 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 65 6f 70 6c 65 2e 43 72 69 74 69 63 61 6c 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 65 6f
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702151" V="1" DC="SM" EN="Office.Telemetry.Event.Office.People.Critical" SP="CriticalBusinessImpact" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPeo


                          Session IDSource IPSource PortDestination IPDestination Port
                          149192.168.2.44992113.107.246.60443
                          TimestampBytes transferredDirectionData
                          2024-10-04 03:32:20 UTC192OUTGET /rules/rule702150v1s19.xml HTTP/1.1
                          Connection: Keep-Alive
                          Accept-Encoding: gzip
                          User-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)
                          Host: otelrules.azureedge.net
                          2024-10-04 03:32:20 UTC563INHTTP/1.1 200 OK
                          Date: Fri, 04 Oct 2024 03:32:20 GMT
                          Content-Type: text/xml
                          Content-Length: 1360
                          Connection: close
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Vary: Accept-Encoding
                          Cache-Control: public, max-age=604800, immutable
                          Last-Modified: Tue, 09 Apr 2024 00:28:07 GMT
                          ETag: "0x8DC582BEDC8193E"
                          x-ms-request-id: e360128a-801e-0083-498c-15f0ae000000
                          x-ms-version: 2018-03-28
                          x-azure-ref: 20241004T033220Z-15767c5fc55v7j95gq2uzq37a00000000c2000000000n5nn
                          x-fd-int-roxy-purgeid: 0
                          X-Cache: TCP_HIT
                          Accept-Ranges: bytes
                          2024-10-04 03:32:20 UTC1360INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 37 30 32 31 35 30 22 20 56 3d 22 31 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 54 65 6c 65 6d 65 74 72 79 2e 45 76 65 6e 74 2e 4f 66 66 69 63 65 2e 50 65 6f 70 6c 65 22 20 44 4c 3d 22 41 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20 20 3c 52 49 20 4e 3d 22 45 76 65 6e 74 22 20 2f 3e 0d 0a 20 20 3c 2f 52 49 53 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 43 53 53 20 54 3d 22 31 22 20 43 3d 22 4e 65 78 75 73 54 65 6e 61 6e 74 54 6f 6b 65 6e 50 65 6f 70 6c 65 22 20 53 3d 22 4d 65 64 69 75 6d 22 20 2f 3e 0d 0a 20 20 20 20 3c 46 20 54 3d 22 32 22 3e 0d 0a 20 20
                          Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="702150" V="1" DC="SM" EN="Office.Telemetry.Event.Office.People" DL="A" xmlns=""> <RIS> <RI N="Event" /> </RIS> <S> <UCSS T="1" C="NexusTenantTokenPeople" S="Medium" /> <F T="2">


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:23:31:00
                          Start date:03/10/2024
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\file.exe"
                          Imagebase:0x9d0000
                          File size:919'040 bytes
                          MD5 hash:1A7DBCFC4C8A85127DB62A70E3A6635A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000002.2935303809.0000000000B88000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Target ID:1
                          Start time:23:31:00
                          Start date:03/10/2024
                          Path:C:\Windows\SysWOW64\taskkill.exe
                          Wow64 process (32bit):true
                          Commandline:taskkill /F /IM chrome.exe /T
                          Imagebase:0x630000
                          File size:74'240 bytes
                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:2
                          Start time:23:31:00
                          Start date:03/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\SysWOW64\taskkill.exe
                          Wow64 process (32bit):true
                          Commandline:taskkill /F /IM msedge.exe /T
                          Imagebase:0x630000
                          File size:74'240 bytes
                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:4
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\SysWOW64\taskkill.exe
                          Wow64 process (32bit):true
                          Commandline:taskkill /F /IM firefox.exe /T
                          Imagebase:0x630000
                          File size:74'240 bytes
                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:6
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\SysWOW64\taskkill.exe
                          Wow64 process (32bit):true
                          Commandline:taskkill /F /IM opera.exe /T
                          Imagebase:0x630000
                          File size:74'240 bytes
                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:8
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:9
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\SysWOW64\taskkill.exe
                          Wow64 process (32bit):true
                          Commandline:taskkill /F /IM brave.exe /T
                          Imagebase:0x630000
                          File size:74'240 bytes
                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:10
                          Start time:23:31:01
                          Start date:03/10/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7699e0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:11
                          Start time:23:31:03
                          Start date:03/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:13
                          Start time:23:31:03
                          Start date:03/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:false

                          Target ID:14
                          Start time:23:31:14
                          Start date:03/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3188 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Has exited:false

                          Target ID:15
                          Start time:23:31:14
                          Start date:03/10/2024
                          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=2060,i,1955067534087792105,7040593399643175823,262144 /prefetch:8
                          Imagebase:0x7ff76e190000
                          File size:3'242'272 bytes
                          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:1.9%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:4.4%
                            Total number of Nodes:1534
                            Total number of Limit Nodes:44
                            execution_graph 94933 9ddddc 94936 9db710 94933->94936 94937 9db72b 94936->94937 94938 a20146 94937->94938 94939 a200f8 94937->94939 94948 9db750 94937->94948 95002 a558a2 349 API calls 2 library calls 94938->95002 94942 a20102 94939->94942 94945 a2010f 94939->94945 94939->94948 95000 a55d33 349 API calls 94942->95000 94963 9dba20 94945->94963 95001 a561d0 349 API calls 2 library calls 94945->95001 94950 9dbbe0 40 API calls 94948->94950 94951 9ed336 40 API calls 94948->94951 94954 9dba4e 94948->94954 94956 a20322 94948->94956 94948->94963 94967 9dec40 94948->94967 94991 9da81b 41 API calls 94948->94991 94992 9ed2f0 40 API calls 94948->94992 94993 9ea01b 349 API calls 94948->94993 94994 9f0242 5 API calls __Init_thread_wait 94948->94994 94995 9eedcd 22 API calls 94948->94995 94996 9f00a3 29 API calls __onexit 94948->94996 94997 9f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94948->94997 94998 9eee53 82 API calls 94948->94998 94999 9ee5ca 349 API calls 94948->94999 95003 9daceb 94948->95003 95013 a2f6bf 23 API calls 94948->95013 95014 9da8c7 22 API calls __fread_nolock 94948->95014 94950->94948 94951->94948 94952 a203d9 94952->94952 95015 a55c0c 82 API calls 94956->95015 94963->94954 95016 a4359c 82 API calls __wsopen_s 94963->95016 94989 9dec76 ISource 94967->94989 94968 9efddb 22 API calls 94968->94989 94969 9dfef7 94983 9ded9d ISource 94969->94983 95020 9da8c7 22 API calls __fread_nolock 94969->95020 94972 a24b0b 95022 a4359c 82 API calls __wsopen_s 94972->95022 94973 a24600 94973->94983 95019 9da8c7 22 API calls __fread_nolock 94973->95019 94977 9f0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94977->94989 94978 9da8c7 22 API calls 94978->94989 94981 9dfbe3 94981->94983 94985 a24bdc 94981->94985 94990 9df3ae ISource 94981->94990 94982 9da961 22 API calls 94982->94989 94983->94948 94984 9f00a3 29 API calls pre_c_initialization 94984->94989 95023 a4359c 82 API calls __wsopen_s 94985->95023 94987 9f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94987->94989 94988 a24beb 95024 a4359c 82 API calls __wsopen_s 94988->95024 94989->94968 94989->94969 94989->94972 94989->94973 94989->94977 94989->94978 94989->94981 94989->94982 94989->94983 94989->94984 94989->94987 94989->94988 94989->94990 95017 9e01e0 349 API calls 2 library calls 94989->95017 95018 9e06a0 41 API calls ISource 94989->95018 94990->94983 95021 a4359c 82 API calls __wsopen_s 94990->95021 94991->94948 94992->94948 94993->94948 94994->94948 94995->94948 94996->94948 94997->94948 94998->94948 94999->94948 95000->94945 95001->94963 95002->94948 95004 9dacf9 95003->95004 95012 9dad2a ISource 95003->95012 95005 9dad55 95004->95005 95006 9dad01 ISource 95004->95006 95005->95012 95025 9da8c7 22 API calls __fread_nolock 95005->95025 95008 a1fa48 95006->95008 95009 9dad21 95006->95009 95006->95012 95008->95012 95026 9ece17 22 API calls ISource 95008->95026 95010 a1fa3a VariantClear 95009->95010 95009->95012 95010->95012 95012->94948 95013->94948 95014->94948 95015->94963 95016->94952 95017->94989 95018->94989 95019->94983 95020->94983 95021->94983 95022->94983 95023->94988 95024->94983 95025->95012 95026->95012 95027 9df7bf 95028 9dfcb6 95027->95028 95029 9df7d3 95027->95029 95030 9daceb 23 API calls 95028->95030 95031 9dfcc2 95029->95031 95062 9efddb 95029->95062 95030->95031 95032 9daceb 23 API calls 95031->95032 95036 9dfd3d 95032->95036 95034 9df7e5 95034->95031 95035 9df83e 95034->95035 95034->95036 95040 9ded9d ISource 95035->95040 95072 9e1310 95035->95072 95130 a41155 22 API calls 95036->95130 95039 a24beb 95136 a4359c 82 API calls __wsopen_s 95039->95136 95041 9dfef7 95041->95040 95132 9da8c7 22 API calls __fread_nolock 95041->95132 95043 9dec76 ISource 95043->95039 95043->95040 95043->95041 95044 9efddb 22 API calls 95043->95044 95046 a24b0b 95043->95046 95047 9da8c7 22 API calls 95043->95047 95048 a24600 95043->95048 95054 9dfbe3 95043->95054 95055 9da961 22 API calls 95043->95055 95058 9f0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95043->95058 95059 9f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95043->95059 95060 9f00a3 29 API calls pre_c_initialization 95043->95060 95061 9df3ae ISource 95043->95061 95128 9e01e0 349 API calls 2 library calls 95043->95128 95129 9e06a0 41 API calls ISource 95043->95129 95044->95043 95134 a4359c 82 API calls __wsopen_s 95046->95134 95047->95043 95048->95040 95131 9da8c7 22 API calls __fread_nolock 95048->95131 95054->95040 95056 a24bdc 95054->95056 95054->95061 95055->95043 95135 a4359c 82 API calls __wsopen_s 95056->95135 95058->95043 95059->95043 95060->95043 95061->95040 95133 a4359c 82 API calls __wsopen_s 95061->95133 95065 9efde0 95062->95065 95064 9efdfa 95064->95034 95065->95064 95068 9efdfc 95065->95068 95137 9fea0c 95065->95137 95144 9f4ead 7 API calls 2 library calls 95065->95144 95067 9f066d 95146 9f32a4 RaiseException 95067->95146 95068->95067 95145 9f32a4 RaiseException 95068->95145 95071 9f068a 95071->95034 95073 9e1376 95072->95073 95074 9e17b0 95072->95074 95075 a26331 95073->95075 95076 9e1390 95073->95076 95217 9f0242 5 API calls __Init_thread_wait 95074->95217 95080 a2633d 95075->95080 95227 a5709c 349 API calls 95075->95227 95079 9e1940 9 API calls 95076->95079 95078 9e17ba 95082 9e17fb 95078->95082 95218 9d9cb3 95078->95218 95083 9e13a0 95079->95083 95080->95043 95087 a26346 95082->95087 95089 9e182c 95082->95089 95085 9e1940 9 API calls 95083->95085 95086 9e13b6 95085->95086 95086->95082 95088 9e13ec 95086->95088 95228 a4359c 82 API calls __wsopen_s 95087->95228 95088->95087 95112 9e1408 __fread_nolock 95088->95112 95091 9daceb 23 API calls 95089->95091 95092 9e1839 95091->95092 95225 9ed217 349 API calls 95092->95225 95093 9e17d4 95224 9f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95093->95224 95096 a2636e 95229 a4359c 82 API calls __wsopen_s 95096->95229 95097 9e152f 95099 9e153c 95097->95099 95100 a263d1 95097->95100 95102 9e1940 9 API calls 95099->95102 95231 a55745 54 API calls _wcslen 95100->95231 95104 9e1549 95102->95104 95103 9efddb 22 API calls 95103->95112 95109 9e1940 9 API calls 95104->95109 95111 9e15c7 ISource 95104->95111 95105 9e1872 95226 9efaeb 23 API calls 95105->95226 95107 9e171d 95107->95043 95114 9e1563 95109->95114 95111->95105 95115 9e167b ISource 95111->95115 95149 9e1940 95111->95149 95159 a5abf7 95111->95159 95164 9ef645 95111->95164 95171 a629bf 95111->95171 95175 a5ab67 95111->95175 95178 a619bc 95111->95178 95181 a5a67c CreateToolhelp32Snapshot Process32FirstW 95111->95181 95201 a45c5a 95111->95201 95233 a4359c 82 API calls __wsopen_s 95111->95233 95112->95092 95112->95096 95112->95097 95112->95103 95112->95111 95113 9dec40 349 API calls 95112->95113 95117 a263b2 95112->95117 95206 9efe0b 95112->95206 95113->95112 95114->95111 95232 9da8c7 22 API calls __fread_nolock 95114->95232 95115->95107 95216 9ece17 22 API calls ISource 95115->95216 95230 a4359c 82 API calls __wsopen_s 95117->95230 95128->95043 95129->95043 95130->95040 95131->95040 95132->95040 95133->95040 95134->95040 95135->95039 95136->95040 95142 a03820 _abort 95137->95142 95138 a0385e 95148 9ff2d9 20 API calls _abort 95138->95148 95139 a03849 RtlAllocateHeap 95141 a0385c 95139->95141 95139->95142 95141->95065 95142->95138 95142->95139 95147 9f4ead 7 API calls 2 library calls 95142->95147 95144->95065 95145->95067 95146->95071 95147->95142 95148->95141 95150 9e195d 95149->95150 95151 9e1981 95149->95151 95158 9e196e 95150->95158 95236 9f0242 5 API calls __Init_thread_wait 95150->95236 95234 9f0242 5 API calls __Init_thread_wait 95151->95234 95153 9e198b 95153->95150 95235 9f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95153->95235 95156 9e8727 95156->95158 95237 9f01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95156->95237 95158->95111 95238 a5aff9 95159->95238 95161 a5ac0c 95162 a5ac54 95161->95162 95163 9daceb 23 API calls 95161->95163 95162->95111 95163->95162 95165 9db567 39 API calls 95164->95165 95166 9ef659 95165->95166 95167 a2f2dc Sleep 95166->95167 95168 9ef661 timeGetTime 95166->95168 95169 9db567 39 API calls 95168->95169 95170 9ef677 95169->95170 95170->95111 95172 a629cb 95171->95172 95173 a62a01 GetForegroundWindow 95172->95173 95174 a629d1 95172->95174 95173->95174 95174->95111 95176 a5aff9 217 API calls 95175->95176 95177 a5ab79 95176->95177 95177->95111 95393 a62ad8 95178->95393 95180 a619cb 95180->95111 95185 a5a6c3 95181->95185 95182 9da961 22 API calls 95182->95185 95183 9d9cb3 22 API calls 95183->95185 95185->95182 95185->95183 95188 9d7510 53 API calls 95185->95188 95190 a5a796 Process32NextW 95185->95190 95427 9d525f 95185->95427 95469 9d6350 95185->95469 95484 9ece60 41 API calls 95185->95484 95485 a5b574 22 API calls __fread_nolock 95185->95485 95188->95185 95190->95185 95191 a5a7aa CloseHandle 95190->95191 95478 9d63eb 95191->95478 95195 a5a7cd 95487 9e04f0 22 API calls 95195->95487 95197 a5a87d 95197->95111 95199 9e04f0 22 API calls 95200 a5a7d9 95199->95200 95200->95197 95200->95199 95488 9d62b5 22 API calls 95200->95488 95202 9d7510 53 API calls 95201->95202 95203 a45c6d 95202->95203 95541 a3dbbe lstrlenW 95203->95541 95205 a45c77 95205->95111 95209 9efddb 95206->95209 95207 9fea0c ___std_exception_copy 21 API calls 95207->95209 95208 9efdfa 95208->95112 95209->95207 95209->95208 95211 9efdfc 95209->95211 95546 9f4ead 7 API calls 2 library calls 95209->95546 95215 9f066d 95211->95215 95547 9f32a4 RaiseException 95211->95547 95214 9f068a 95214->95112 95548 9f32a4 RaiseException 95215->95548 95216->95115 95217->95078 95219 9d9cc2 _wcslen 95218->95219 95220 9efe0b 22 API calls 95219->95220 95221 9d9cea __fread_nolock 95220->95221 95222 9efddb 22 API calls 95221->95222 95223 9d9d00 95222->95223 95223->95093 95224->95082 95225->95105 95226->95105 95227->95080 95228->95111 95229->95111 95230->95111 95231->95114 95232->95111 95233->95111 95234->95153 95235->95150 95236->95156 95237->95158 95239 a5b01d ___scrt_fastfail 95238->95239 95240 a5b094 95239->95240 95241 a5b058 95239->95241 95243 9db567 39 API calls 95240->95243 95248 a5b08b 95240->95248 95359 9db567 95241->95359 95247 a5b0a5 95243->95247 95244 a5b063 95244->95248 95251 9db567 39 API calls 95244->95251 95245 a5b0ed 95329 9d7510 95245->95329 95250 9db567 39 API calls 95247->95250 95248->95245 95252 9db567 39 API calls 95248->95252 95250->95248 95254 a5b078 95251->95254 95252->95245 95256 9db567 39 API calls 95254->95256 95255 a5b115 95257 a5b11f 95255->95257 95258 a5b1d8 95255->95258 95256->95248 95259 9d7510 53 API calls 95257->95259 95260 a5b20a GetCurrentDirectoryW 95258->95260 95261 9d7510 53 API calls 95258->95261 95262 a5b130 95259->95262 95263 9efe0b 22 API calls 95260->95263 95264 a5b1ef 95261->95264 95265 9d7620 22 API calls 95262->95265 95266 a5b22f GetCurrentDirectoryW 95263->95266 95267 9d7620 22 API calls 95264->95267 95268 a5b13a 95265->95268 95269 a5b23c 95266->95269 95270 a5b1f9 _wcslen 95267->95270 95271 9d7510 53 API calls 95268->95271 95273 a5b275 95269->95273 95364 9d9c6e 22 API calls 95269->95364 95270->95260 95270->95273 95272 a5b14b 95271->95272 95274 9d7620 22 API calls 95272->95274 95278 a5b287 95273->95278 95279 a5b28b 95273->95279 95276 a5b155 95274->95276 95280 9d7510 53 API calls 95276->95280 95277 a5b255 95365 9d9c6e 22 API calls 95277->95365 95288 a5b2f8 95278->95288 95289 a5b39a CreateProcessW 95278->95289 95367 a407c0 10 API calls 95279->95367 95282 a5b166 95280->95282 95285 9d7620 22 API calls 95282->95285 95283 a5b265 95366 9d9c6e 22 API calls 95283->95366 95291 a5b170 95285->95291 95287 a5b294 95368 a406e6 10 API calls 95287->95368 95370 a311c8 39 API calls 95288->95370 95308 a5b32f _wcslen 95289->95308 95294 a5b1a6 GetSystemDirectoryW 95291->95294 95298 9d7510 53 API calls 95291->95298 95293 a5b2fd 95296 a5b323 95293->95296 95297 a5b32a 95293->95297 95300 9efe0b 22 API calls 95294->95300 95295 a5b2aa 95369 a405a7 8 API calls 95295->95369 95371 a31201 128 API calls 2 library calls 95296->95371 95372 a314ce 6 API calls 95297->95372 95302 a5b187 95298->95302 95305 a5b1cb GetSystemDirectoryW 95300->95305 95307 9d7620 22 API calls 95302->95307 95304 a5b2d0 95304->95278 95305->95269 95306 a5b328 95306->95308 95311 a5b191 _wcslen 95307->95311 95309 a5b3d6 GetLastError 95308->95309 95310 a5b42f CloseHandle 95308->95310 95319 a5b41a 95309->95319 95312 a5b43f 95310->95312 95320 a5b49a 95310->95320 95311->95269 95311->95294 95314 a5b446 CloseHandle 95312->95314 95315 a5b451 95312->95315 95314->95315 95317 a5b463 95315->95317 95318 a5b458 CloseHandle 95315->95318 95316 a5b4a6 95316->95319 95321 a5b475 95317->95321 95322 a5b46a CloseHandle 95317->95322 95318->95317 95356 a40175 95319->95356 95320->95316 95326 a5b4d2 CloseHandle 95320->95326 95373 a409d9 34 API calls 95321->95373 95322->95321 95325 a5b486 95374 a5b536 25 API calls 95325->95374 95326->95319 95330 9d7525 95329->95330 95331 9d7522 95329->95331 95332 9d752d 95330->95332 95333 9d755b 95330->95333 95352 9d7620 95331->95352 95375 9f51c6 26 API calls 95332->95375 95334 a150f6 95333->95334 95337 9d756d 95333->95337 95344 a1500f 95333->95344 95378 9f5183 26 API calls 95334->95378 95376 9efb21 51 API calls 95337->95376 95338 9d753d 95341 9efddb 22 API calls 95338->95341 95339 a1510e 95339->95339 95343 9d7547 95341->95343 95345 9d9cb3 22 API calls 95343->95345 95346 9efe0b 22 API calls 95344->95346 95351 a15088 95344->95351 95345->95331 95347 a15058 95346->95347 95348 9efddb 22 API calls 95347->95348 95349 a1507f 95348->95349 95350 9d9cb3 22 API calls 95349->95350 95350->95351 95377 9efb21 51 API calls 95351->95377 95353 9d762a _wcslen 95352->95353 95354 9efe0b 22 API calls 95353->95354 95355 9d763f 95354->95355 95355->95255 95379 a4030f 95356->95379 95360 9db578 95359->95360 95361 9db57f 95359->95361 95360->95361 95392 9f62d1 39 API calls 95360->95392 95361->95244 95363 9db5c2 95363->95244 95364->95277 95365->95283 95366->95273 95367->95287 95368->95295 95369->95304 95370->95293 95371->95306 95372->95308 95373->95325 95374->95320 95375->95338 95376->95338 95377->95334 95378->95339 95380 a40321 CloseHandle 95379->95380 95381 a40329 95379->95381 95380->95381 95382 a40336 95381->95382 95383 a4032e CloseHandle 95381->95383 95384 a40343 95382->95384 95385 a4033b CloseHandle 95382->95385 95383->95382 95386 a40350 95384->95386 95387 a40348 CloseHandle 95384->95387 95385->95384 95388 a40355 CloseHandle 95386->95388 95389 a4035d 95386->95389 95387->95386 95388->95389 95390 a40362 CloseHandle 95389->95390 95391 a4017d 95389->95391 95390->95391 95391->95161 95392->95363 95394 9daceb 23 API calls 95393->95394 95395 a62af3 95394->95395 95396 a62aff 95395->95396 95397 a62b1d 95395->95397 95399 9d7510 53 API calls 95396->95399 95404 9d6b57 95397->95404 95400 a62b0c 95399->95400 95401 a62b1b 95400->95401 95403 9da8c7 22 API calls __fread_nolock 95400->95403 95401->95180 95403->95401 95405 a14ba1 95404->95405 95406 9d6b67 _wcslen 95404->95406 95417 9d93b2 95405->95417 95409 9d6b7d 95406->95409 95410 9d6ba2 95406->95410 95408 a14baa 95408->95408 95416 9d6f34 22 API calls 95409->95416 95411 9efddb 22 API calls 95410->95411 95413 9d6bae 95411->95413 95415 9efe0b 22 API calls 95413->95415 95414 9d6b85 __fread_nolock 95414->95401 95415->95414 95416->95414 95418 9d93c0 95417->95418 95420 9d93c9 __fread_nolock 95417->95420 95418->95420 95421 9daec9 95418->95421 95420->95408 95422 9daedc 95421->95422 95423 9daed9 __fread_nolock 95421->95423 95424 9efddb 22 API calls 95422->95424 95423->95420 95425 9daee7 95424->95425 95426 9efe0b 22 API calls 95425->95426 95426->95423 95489 9da961 95427->95489 95430 9da961 22 API calls 95431 9d527d 95430->95431 95432 9da961 22 API calls 95431->95432 95433 9d5285 95432->95433 95434 9da961 22 API calls 95433->95434 95435 9d528d 95434->95435 95436 a13df5 95435->95436 95437 9d52c1 95435->95437 95512 9da8c7 22 API calls __fread_nolock 95436->95512 95439 9d6d25 22 API calls 95437->95439 95441 9d52cf 95439->95441 95440 a13dfe 95513 9da6c3 95440->95513 95443 9d93b2 22 API calls 95441->95443 95444 9d52d9 95443->95444 95445 9d5304 95444->95445 95446 9d6d25 22 API calls 95444->95446 95447 9d5349 95445->95447 95448 9d5325 95445->95448 95458 a13e20 95445->95458 95450 9d52fa 95446->95450 95494 9d6d25 95447->95494 95448->95447 95507 9d4c6d 95448->95507 95452 9d93b2 22 API calls 95450->95452 95451 9d535a 95454 9d5370 95451->95454 95510 9da8c7 22 API calls __fread_nolock 95451->95510 95452->95445 95455 9d5384 95454->95455 95511 9da8c7 22 API calls __fread_nolock 95454->95511 95459 9d538f 95455->95459 95520 9da8c7 22 API calls __fread_nolock 95455->95520 95457 9d6b57 22 API calls 95467 a13ee0 95457->95467 95458->95457 95465 9d539a 95459->95465 95521 9da8c7 22 API calls __fread_nolock 95459->95521 95462 9d6d25 22 API calls 95462->95447 95465->95185 95466 9d4c6d 22 API calls 95466->95467 95467->95447 95467->95466 95519 9d49bd 22 API calls __fread_nolock 95467->95519 95470 a14a51 95469->95470 95471 9d6362 95469->95471 95533 9d4a88 22 API calls __fread_nolock 95470->95533 95523 9d6373 95471->95523 95474 a14a5b 95476 a14a67 95474->95476 95534 9da8c7 22 API calls __fread_nolock 95474->95534 95475 9d636e 95475->95185 95479 9d63f3 95478->95479 95480 9efddb 22 API calls 95479->95480 95481 9d6401 95480->95481 95540 9d6a26 22 API calls 95481->95540 95483 9d6409 95486 9d6a50 22 API calls 95483->95486 95484->95185 95485->95185 95486->95195 95487->95200 95488->95200 95490 9efe0b 22 API calls 95489->95490 95491 9da976 95490->95491 95492 9efddb 22 API calls 95491->95492 95493 9d5275 95492->95493 95493->95430 95495 9d6d34 95494->95495 95496 9d6d91 95494->95496 95495->95496 95497 9d6d3f 95495->95497 95498 9d93b2 22 API calls 95496->95498 95499 9d6d5a 95497->95499 95500 a14c9d 95497->95500 95504 9d6d62 __fread_nolock 95498->95504 95522 9d6f34 22 API calls 95499->95522 95501 9efddb 22 API calls 95500->95501 95503 a14ca7 95501->95503 95505 9efe0b 22 API calls 95503->95505 95504->95451 95506 a14cda 95505->95506 95508 9daec9 22 API calls 95507->95508 95509 9d4c78 95508->95509 95509->95447 95509->95462 95510->95454 95511->95455 95512->95440 95514 9da6dd 95513->95514 95515 9da6d0 95513->95515 95516 9efddb 22 API calls 95514->95516 95515->95445 95517 9da6e7 95516->95517 95518 9efe0b 22 API calls 95517->95518 95518->95515 95519->95467 95520->95459 95521->95465 95522->95504 95525 9d6382 95523->95525 95530 9d63b6 __fread_nolock 95523->95530 95524 a14a82 95527 9efddb 22 API calls 95524->95527 95525->95524 95526 9d63a9 95525->95526 95525->95530 95535 9da587 95526->95535 95529 a14a91 95527->95529 95531 9efe0b 22 API calls 95529->95531 95530->95475 95532 a14ac5 __fread_nolock 95531->95532 95533->95474 95534->95476 95536 9da59d 95535->95536 95539 9da598 __fread_nolock 95535->95539 95537 a1f80f 95536->95537 95538 9efe0b 22 API calls 95536->95538 95538->95539 95539->95530 95540->95483 95542 a3dc06 95541->95542 95543 a3dbdc GetFileAttributesW 95541->95543 95542->95205 95543->95542 95544 a3dbe8 FindFirstFileW 95543->95544 95544->95542 95545 a3dbf9 FindClose 95544->95545 95545->95542 95546->95209 95547->95215 95548->95214 95549 a22a00 95565 9dd7b0 ISource 95549->95565 95550 9ddb11 PeekMessageW 95550->95565 95551 9dd807 GetInputState 95551->95550 95551->95565 95553 a21cbe TranslateAcceleratorW 95553->95565 95554 9dda04 timeGetTime 95554->95565 95555 9ddb8f PeekMessageW 95555->95565 95556 9ddb73 TranslateMessage DispatchMessageW 95556->95555 95557 9ddbaf Sleep 95557->95565 95558 a22b74 Sleep 95571 a22aea 95558->95571 95561 a21dda timeGetTime 95653 9ee300 23 API calls 95561->95653 95564 a22c0b GetExitCodeProcess 95567 a22c21 WaitForSingleObject 95564->95567 95568 a22c37 CloseHandle 95564->95568 95565->95550 95565->95551 95565->95553 95565->95554 95565->95555 95565->95556 95565->95557 95565->95558 95565->95561 95569 9dd9d5 95565->95569 95570 a629bf GetForegroundWindow 95565->95570 95565->95571 95577 9dec40 349 API calls 95565->95577 95578 9e1310 349 API calls 95565->95578 95581 9ddd50 95565->95581 95588 9dbf40 95565->95588 95646 9eedf6 95565->95646 95651 9ddfd0 349 API calls 3 library calls 95565->95651 95652 9ee551 timeGetTime 95565->95652 95654 a43a2a 23 API calls 95565->95654 95655 a4359c 82 API calls __wsopen_s 95565->95655 95567->95565 95567->95568 95568->95571 95570->95565 95571->95564 95571->95565 95571->95569 95572 a22ca9 Sleep 95571->95572 95656 a55658 23 API calls 95571->95656 95657 a3e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95571->95657 95658 9ee551 timeGetTime 95571->95658 95659 a3d4dc 47 API calls 95571->95659 95572->95565 95577->95565 95578->95565 95582 9ddd6f 95581->95582 95583 9ddd83 95581->95583 95660 9dd260 95582->95660 95692 a4359c 82 API calls __wsopen_s 95583->95692 95586 9ddd7a 95586->95565 95587 a22f75 95587->95587 95700 9dadf0 95588->95700 95590 9dbf9d 95591 a204b6 95590->95591 95592 9dbfa9 95590->95592 95718 a4359c 82 API calls __wsopen_s 95591->95718 95594 9dc01e 95592->95594 95595 a204c6 95592->95595 95705 9dac91 95594->95705 95719 a4359c 82 API calls __wsopen_s 95595->95719 95599 a37120 22 API calls 95643 9dc039 ISource __fread_nolock 95599->95643 95600 9dc7da 95603 9efe0b 22 API calls 95600->95603 95608 9dc808 __fread_nolock 95603->95608 95605 a204f5 95609 a2055a 95605->95609 95720 9ed217 349 API calls 95605->95720 95611 9efe0b 22 API calls 95608->95611 95632 9dc603 95609->95632 95721 a4359c 82 API calls __wsopen_s 95609->95721 95610 9dec40 349 API calls 95610->95643 95644 9dc350 ISource __fread_nolock 95611->95644 95612 9daf8a 22 API calls 95612->95643 95613 a2091a 95730 a43209 23 API calls 95613->95730 95614 9efddb 22 API calls 95614->95643 95617 a208a5 95618 9dec40 349 API calls 95617->95618 95619 a208cf 95618->95619 95619->95632 95728 9da81b 41 API calls 95619->95728 95621 a20591 95722 a4359c 82 API calls __wsopen_s 95621->95722 95625 a208f6 95729 a4359c 82 API calls __wsopen_s 95625->95729 95627 9dc237 95629 9dc253 95627->95629 95731 9da8c7 22 API calls __fread_nolock 95627->95731 95628 9daceb 23 API calls 95628->95643 95634 a20976 95629->95634 95637 9dc297 ISource 95629->95637 95630 9efe0b 22 API calls 95630->95643 95632->95565 95635 9daceb 23 API calls 95634->95635 95636 a209bf 95635->95636 95636->95632 95732 a4359c 82 API calls __wsopen_s 95636->95732 95637->95636 95638 9daceb 23 API calls 95637->95638 95639 9dc335 95638->95639 95639->95636 95640 9dc342 95639->95640 95716 9da704 22 API calls ISource 95640->95716 95641 9dbbe0 40 API calls 95641->95643 95643->95599 95643->95600 95643->95605 95643->95608 95643->95609 95643->95610 95643->95612 95643->95613 95643->95614 95643->95617 95643->95621 95643->95625 95643->95627 95643->95628 95643->95630 95643->95632 95643->95636 95643->95641 95709 9dad81 95643->95709 95723 a37099 22 API calls __fread_nolock 95643->95723 95724 a55745 54 API calls _wcslen 95643->95724 95725 9eaa42 22 API calls ISource 95643->95725 95726 a3f05c 40 API calls 95643->95726 95727 9da993 41 API calls 95643->95727 95645 9dc3ac 95644->95645 95717 9ece17 22 API calls ISource 95644->95717 95645->95565 95648 9eee09 95646->95648 95649 9eee12 95646->95649 95647 9eee36 IsDialogMessageW 95647->95648 95647->95649 95648->95565 95649->95647 95649->95648 95650 a2efaf GetClassLongW 95649->95650 95650->95647 95650->95649 95651->95565 95652->95565 95653->95565 95654->95565 95655->95565 95656->95571 95657->95571 95658->95571 95659->95571 95661 9dec40 349 API calls 95660->95661 95664 9dd29d 95661->95664 95662 a21bc4 95699 a4359c 82 API calls __wsopen_s 95662->95699 95664->95662 95665 9dd30b ISource 95664->95665 95666 9dd3c3 95664->95666 95669 9dd6d5 95664->95669 95673 9dd4b8 95664->95673 95677 9efddb 22 API calls 95664->95677 95687 9dd429 ISource __fread_nolock 95664->95687 95665->95586 95668 9dd3ce 95666->95668 95666->95669 95667 9dd5ff 95671 a21bb5 95667->95671 95672 9dd614 95667->95672 95670 9efddb 22 API calls 95668->95670 95669->95665 95674 9efe0b 22 API calls 95669->95674 95680 9dd3d5 __fread_nolock 95670->95680 95698 a55705 23 API calls 95671->95698 95676 9efddb 22 API calls 95672->95676 95678 9efe0b 22 API calls 95673->95678 95674->95680 95685 9dd46a 95676->95685 95677->95664 95678->95687 95679 9efddb 22 API calls 95681 9dd3f6 95679->95681 95680->95679 95680->95681 95681->95687 95693 9dbec0 349 API calls 95681->95693 95683 a21ba4 95697 a4359c 82 API calls __wsopen_s 95683->95697 95685->95586 95687->95667 95687->95683 95687->95685 95688 a21b7f 95687->95688 95690 a21b5d 95687->95690 95694 9d1f6f 349 API calls 95687->95694 95696 a4359c 82 API calls __wsopen_s 95688->95696 95695 a4359c 82 API calls __wsopen_s 95690->95695 95692->95587 95693->95687 95694->95687 95695->95685 95696->95685 95697->95685 95698->95662 95699->95665 95701 9dae01 95700->95701 95704 9dae1c ISource 95700->95704 95702 9daec9 22 API calls 95701->95702 95703 9dae09 CharUpperBuffW 95702->95703 95703->95704 95704->95590 95706 9dacae 95705->95706 95707 9dacd1 95706->95707 95733 a4359c 82 API calls __wsopen_s 95706->95733 95707->95643 95710 a1fadb 95709->95710 95711 9dad92 95709->95711 95712 9efddb 22 API calls 95711->95712 95713 9dad99 95712->95713 95734 9dadcd 95713->95734 95716->95644 95717->95644 95718->95595 95719->95632 95720->95609 95721->95632 95722->95632 95723->95643 95724->95643 95725->95643 95726->95643 95727->95643 95728->95625 95729->95632 95730->95627 95731->95629 95732->95632 95733->95707 95737 9daddd 95734->95737 95735 9dadb6 95735->95643 95736 9efddb 22 API calls 95736->95737 95737->95735 95737->95736 95738 9da961 22 API calls 95737->95738 95740 9dadcd 22 API calls 95737->95740 95741 9da8c7 22 API calls __fread_nolock 95737->95741 95738->95737 95740->95737 95741->95737 95742 a08402 95747 a081be 95742->95747 95745 a0842a 95748 a081ef try_get_first_available_module 95747->95748 95758 a08338 95748->95758 95762 9f8e0b 40 API calls 2 library calls 95748->95762 95750 a083ee 95766 a027ec 26 API calls _abort 95750->95766 95752 a08343 95752->95745 95759 a10984 95752->95759 95754 a0838c 95754->95758 95763 9f8e0b 40 API calls 2 library calls 95754->95763 95756 a083ab 95756->95758 95764 9f8e0b 40 API calls 2 library calls 95756->95764 95758->95752 95765 9ff2d9 20 API calls _abort 95758->95765 95767 a10081 95759->95767 95761 a1099f 95761->95745 95762->95754 95763->95756 95764->95758 95765->95750 95766->95752 95769 a1008d __FrameHandler3::FrameUnwindToState 95767->95769 95768 a1009b 95824 9ff2d9 20 API calls _abort 95768->95824 95769->95768 95772 a100d4 95769->95772 95771 a100a0 95825 a027ec 26 API calls _abort 95771->95825 95778 a1065b 95772->95778 95777 a100aa __fread_nolock 95777->95761 95779 a10678 95778->95779 95780 a106a6 95779->95780 95781 a1068d 95779->95781 95827 a05221 95780->95827 95841 9ff2c6 20 API calls _abort 95781->95841 95784 a106ab 95786 a106b4 95784->95786 95787 a106cb 95784->95787 95785 a10692 95842 9ff2d9 20 API calls _abort 95785->95842 95843 9ff2c6 20 API calls _abort 95786->95843 95840 a1039a CreateFileW 95787->95840 95791 a106b9 95844 9ff2d9 20 API calls _abort 95791->95844 95793 a10781 GetFileType 95794 a107d3 95793->95794 95795 a1078c GetLastError 95793->95795 95849 a0516a 21 API calls 2 library calls 95794->95849 95847 9ff2a3 20 API calls __dosmaperr 95795->95847 95796 a10756 GetLastError 95846 9ff2a3 20 API calls __dosmaperr 95796->95846 95799 a10704 95799->95793 95799->95796 95845 a1039a CreateFileW 95799->95845 95800 a1079a CloseHandle 95800->95785 95802 a107c3 95800->95802 95848 9ff2d9 20 API calls _abort 95802->95848 95804 a10749 95804->95793 95804->95796 95806 a107f4 95807 a10840 95806->95807 95850 a105ab 72 API calls 3 library calls 95806->95850 95812 a1086d 95807->95812 95851 a1014d 72 API calls 4 library calls 95807->95851 95808 a107c8 95808->95785 95811 a10866 95811->95812 95813 a1087e 95811->95813 95852 a086ae 95812->95852 95815 a100f8 95813->95815 95816 a108fc CloseHandle 95813->95816 95826 a10121 LeaveCriticalSection __wsopen_s 95815->95826 95867 a1039a CreateFileW 95816->95867 95818 a10927 95819 a10931 GetLastError 95818->95819 95820 a1095d 95818->95820 95868 9ff2a3 20 API calls __dosmaperr 95819->95868 95820->95815 95822 a1093d 95869 a05333 21 API calls 2 library calls 95822->95869 95824->95771 95825->95777 95826->95777 95828 a0522d __FrameHandler3::FrameUnwindToState 95827->95828 95870 a02f5e EnterCriticalSection 95828->95870 95830 a0527b 95871 a0532a 95830->95871 95832 a05259 95874 a05000 95832->95874 95833 a05234 95833->95830 95833->95832 95837 a052c7 EnterCriticalSection 95833->95837 95834 a052a4 __fread_nolock 95834->95784 95837->95830 95839 a052d4 LeaveCriticalSection 95837->95839 95839->95833 95840->95799 95841->95785 95842->95815 95843->95791 95844->95785 95845->95804 95846->95785 95847->95800 95848->95808 95849->95806 95850->95807 95851->95811 95894 a053c4 95852->95894 95854 a086c4 95907 a05333 21 API calls 2 library calls 95854->95907 95856 a086be 95856->95854 95857 a053c4 __wsopen_s 26 API calls 95856->95857 95866 a086f6 95856->95866 95862 a086ed 95857->95862 95858 a053c4 __wsopen_s 26 API calls 95859 a08702 CloseHandle 95858->95859 95859->95854 95863 a0870e GetLastError 95859->95863 95860 a0873e 95860->95815 95861 a0871c 95861->95860 95908 9ff2a3 20 API calls __dosmaperr 95861->95908 95865 a053c4 __wsopen_s 26 API calls 95862->95865 95863->95854 95865->95866 95866->95854 95866->95858 95867->95818 95868->95822 95869->95820 95870->95833 95882 a02fa6 LeaveCriticalSection 95871->95882 95873 a05331 95873->95834 95883 a04c7d 95874->95883 95876 a05012 95880 a0501f 95876->95880 95890 a03405 11 API calls 2 library calls 95876->95890 95879 a05071 95879->95830 95881 a05147 EnterCriticalSection 95879->95881 95891 a029c8 20 API calls __dosmaperr 95880->95891 95881->95830 95882->95873 95888 a04c8a _abort 95883->95888 95884 a04cca 95893 9ff2d9 20 API calls _abort 95884->95893 95885 a04cb5 RtlAllocateHeap 95886 a04cc8 95885->95886 95885->95888 95886->95876 95888->95884 95888->95885 95892 9f4ead 7 API calls 2 library calls 95888->95892 95890->95876 95891->95879 95892->95888 95893->95886 95895 a053d1 95894->95895 95896 a053e6 95894->95896 95909 9ff2c6 20 API calls _abort 95895->95909 95900 a0540b 95896->95900 95911 9ff2c6 20 API calls _abort 95896->95911 95899 a053d6 95910 9ff2d9 20 API calls _abort 95899->95910 95900->95856 95901 a05416 95912 9ff2d9 20 API calls _abort 95901->95912 95904 a053de 95904->95856 95905 a0541e 95913 a027ec 26 API calls _abort 95905->95913 95907->95861 95908->95860 95909->95899 95910->95904 95911->95901 95912->95905 95913->95904 95914 a12ba5 95915 9d2b25 95914->95915 95916 a12baf 95914->95916 95942 9d2b83 7 API calls 95915->95942 95957 9d3a5a 95916->95957 95920 a12bb8 95922 9d9cb3 22 API calls 95920->95922 95923 a12bc6 95922->95923 95925 a12bf5 95923->95925 95926 a12bce 95923->95926 95924 9d2b2f 95933 9d2b44 95924->95933 95946 9d3837 95924->95946 95928 9d33c6 22 API calls 95925->95928 95964 9d33c6 95926->95964 95931 a12bf1 GetForegroundWindow ShellExecuteW 95928->95931 95938 a12c26 95931->95938 95932 9d2b5f 95940 9d2b66 SetCurrentDirectoryW 95932->95940 95933->95932 95956 9d30f2 Shell_NotifyIconW ___scrt_fastfail 95933->95956 95934 9d6350 22 API calls 95937 a12be7 95934->95937 95939 9d33c6 22 API calls 95937->95939 95938->95932 95939->95931 95941 9d2b7a 95940->95941 95973 9d2cd4 7 API calls 95942->95973 95944 9d2b2a 95945 9d2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95944->95945 95945->95924 95947 9d3862 ___scrt_fastfail 95946->95947 95974 9d4212 95947->95974 95950 9d38e8 95952 a13386 Shell_NotifyIconW 95950->95952 95953 9d3906 Shell_NotifyIconW 95950->95953 95978 9d3923 95953->95978 95955 9d391c 95955->95933 95956->95932 96007 a11f50 95957->96007 95960 9d9cb3 22 API calls 95961 9d3a8d 95960->95961 96009 9d3aa2 95961->96009 95963 9d3a97 95963->95920 95965 9d33dd 95964->95965 95966 a130bb 95964->95966 96023 9d33ee 95965->96023 95968 9efddb 22 API calls 95966->95968 95970 a130c5 _wcslen 95968->95970 95969 9d33e8 95969->95934 95971 9efe0b 22 API calls 95970->95971 95972 a130fe __fread_nolock 95971->95972 95973->95944 95975 a135a4 95974->95975 95976 9d38b7 95974->95976 95975->95976 95977 a135ad DestroyIcon 95975->95977 95976->95950 96000 a3c874 42 API calls _strftime 95976->96000 95977->95976 95979 9d393f 95978->95979 95998 9d3a13 95978->95998 96001 9d6270 95979->96001 95982 a13393 LoadStringW 95985 a133ad 95982->95985 95983 9d395a 95984 9d6b57 22 API calls 95983->95984 95986 9d396f 95984->95986 95993 9d3994 ___scrt_fastfail 95985->95993 96006 9da8c7 22 API calls __fread_nolock 95985->96006 95987 9d397c 95986->95987 95988 a133c9 95986->95988 95987->95985 95990 9d3986 95987->95990 95991 9d6350 22 API calls 95988->95991 95992 9d6350 22 API calls 95990->95992 95994 a133d7 95991->95994 95992->95993 95996 9d39f9 Shell_NotifyIconW 95993->95996 95994->95993 95995 9d33c6 22 API calls 95994->95995 95997 a133f9 95995->95997 95996->95998 95999 9d33c6 22 API calls 95997->95999 95998->95955 95999->95993 96000->95950 96002 9efe0b 22 API calls 96001->96002 96003 9d6295 96002->96003 96004 9efddb 22 API calls 96003->96004 96005 9d394d 96004->96005 96005->95982 96005->95983 96006->95993 96008 9d3a67 GetModuleFileNameW 96007->96008 96008->95960 96010 a11f50 __wsopen_s 96009->96010 96011 9d3aaf GetFullPathNameW 96010->96011 96012 9d3ace 96011->96012 96013 9d3ae9 96011->96013 96014 9d6b57 22 API calls 96012->96014 96015 9da6c3 22 API calls 96013->96015 96016 9d3ada 96014->96016 96015->96016 96019 9d37a0 96016->96019 96020 9d37ae 96019->96020 96021 9d93b2 22 API calls 96020->96021 96022 9d37c2 96021->96022 96022->95963 96024 9d33fe _wcslen 96023->96024 96025 a1311d 96024->96025 96026 9d3411 96024->96026 96028 9efddb 22 API calls 96025->96028 96027 9da587 22 API calls 96026->96027 96030 9d341e __fread_nolock 96027->96030 96029 a13127 96028->96029 96031 9efe0b 22 API calls 96029->96031 96030->95969 96032 a13157 __fread_nolock 96031->96032 96033 9f03fb 96034 9f0407 __FrameHandler3::FrameUnwindToState 96033->96034 96062 9efeb1 96034->96062 96036 9f040e 96037 9f0561 96036->96037 96040 9f0438 96036->96040 96089 9f083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96037->96089 96039 9f0568 96090 9f4e52 28 API calls _abort 96039->96090 96051 9f0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96040->96051 96073 a0247d 96040->96073 96042 9f056e 96091 9f4e04 28 API calls _abort 96042->96091 96046 9f0576 96047 9f0457 96049 9f04d8 96081 9f0959 96049->96081 96051->96049 96085 9f4e1a 38 API calls 2 library calls 96051->96085 96053 9f04de 96054 9f04f3 96053->96054 96086 9f0992 GetModuleHandleW 96054->96086 96056 9f04fa 96056->96039 96057 9f04fe 96056->96057 96058 9f0507 96057->96058 96087 9f4df5 28 API calls _abort 96057->96087 96088 9f0040 13 API calls 2 library calls 96058->96088 96061 9f050f 96061->96047 96063 9efeba 96062->96063 96092 9f0698 IsProcessorFeaturePresent 96063->96092 96065 9efec6 96093 9f2c94 10 API calls 3 library calls 96065->96093 96067 9efecb 96068 9efecf 96067->96068 96094 a02317 96067->96094 96068->96036 96071 9efee6 96071->96036 96075 a02494 96073->96075 96074 9f0a8c CatchGuardHandler 5 API calls 96076 9f0451 96074->96076 96075->96074 96076->96047 96077 a02421 96076->96077 96078 a02450 96077->96078 96079 9f0a8c CatchGuardHandler 5 API calls 96078->96079 96080 a02479 96079->96080 96080->96051 96145 9f2340 96081->96145 96084 9f097f 96084->96053 96085->96049 96086->96056 96087->96058 96088->96061 96089->96039 96090->96042 96091->96046 96092->96065 96093->96067 96098 a0d1f6 96094->96098 96097 9f2cbd 8 API calls 3 library calls 96097->96068 96099 a0d213 96098->96099 96101 a0d20f 96098->96101 96099->96101 96104 a04bfb 96099->96104 96116 9f0a8c 96101->96116 96102 9efed8 96102->96071 96102->96097 96105 a04c07 __FrameHandler3::FrameUnwindToState 96104->96105 96123 a02f5e EnterCriticalSection 96105->96123 96107 a04c0e 96124 a050af 96107->96124 96109 a04c1d 96115 a04c2c 96109->96115 96137 a04a8f 29 API calls 96109->96137 96112 a04c27 96138 a04b45 GetStdHandle GetFileType 96112->96138 96113 a04c3d __fread_nolock 96113->96099 96139 a04c48 LeaveCriticalSection _abort 96115->96139 96117 9f0a97 IsProcessorFeaturePresent 96116->96117 96118 9f0a95 96116->96118 96120 9f0c5d 96117->96120 96118->96102 96144 9f0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96120->96144 96122 9f0d40 96122->96102 96123->96107 96125 a050bb __FrameHandler3::FrameUnwindToState 96124->96125 96126 a050c8 96125->96126 96127 a050df 96125->96127 96141 9ff2d9 20 API calls _abort 96126->96141 96140 a02f5e EnterCriticalSection 96127->96140 96130 a050eb 96134 a05000 __wsopen_s 21 API calls 96130->96134 96136 a05117 96130->96136 96131 a050cd 96142 a027ec 26 API calls _abort 96131->96142 96134->96130 96135 a050d7 __fread_nolock 96135->96109 96143 a0513e LeaveCriticalSection _abort 96136->96143 96137->96112 96138->96115 96139->96113 96140->96130 96141->96131 96142->96135 96143->96135 96144->96122 96146 9f096c GetStartupInfoW 96145->96146 96146->96084 96147 9d1098 96152 9d42de 96147->96152 96151 9d10a7 96153 9da961 22 API calls 96152->96153 96154 9d42f5 GetVersionExW 96153->96154 96155 9d6b57 22 API calls 96154->96155 96156 9d4342 96155->96156 96157 9d93b2 22 API calls 96156->96157 96160 9d4378 96156->96160 96158 9d436c 96157->96158 96159 9d37a0 22 API calls 96158->96159 96159->96160 96161 9d441b GetCurrentProcess IsWow64Process 96160->96161 96163 a137df 96160->96163 96162 9d4437 96161->96162 96164 9d444f LoadLibraryA 96162->96164 96165 a13824 GetSystemInfo 96162->96165 96166 9d449c GetSystemInfo 96164->96166 96167 9d4460 GetProcAddress 96164->96167 96168 9d4476 96166->96168 96167->96166 96169 9d4470 GetNativeSystemInfo 96167->96169 96170 9d447a FreeLibrary 96168->96170 96171 9d109d 96168->96171 96169->96168 96170->96171 96172 9f00a3 29 API calls __onexit 96171->96172 96172->96151 96173 9d105b 96178 9d344d 96173->96178 96175 9d106a 96209 9f00a3 29 API calls __onexit 96175->96209 96177 9d1074 96179 9d345d __wsopen_s 96178->96179 96180 9da961 22 API calls 96179->96180 96181 9d3513 96180->96181 96182 9d3a5a 24 API calls 96181->96182 96183 9d351c 96182->96183 96210 9d3357 96183->96210 96186 9d33c6 22 API calls 96187 9d3535 96186->96187 96216 9d515f 96187->96216 96190 9da961 22 API calls 96191 9d354d 96190->96191 96192 9da6c3 22 API calls 96191->96192 96193 9d3556 RegOpenKeyExW 96192->96193 96194 a13176 RegQueryValueExW 96193->96194 96198 9d3578 96193->96198 96195 a13193 96194->96195 96196 a1320c RegCloseKey 96194->96196 96197 9efe0b 22 API calls 96195->96197 96196->96198 96208 a1321e _wcslen 96196->96208 96199 a131ac 96197->96199 96198->96175 96222 9d5722 96199->96222 96202 9d4c6d 22 API calls 96202->96208 96203 a131d4 96204 9d6b57 22 API calls 96203->96204 96205 a131ee ISource 96204->96205 96205->96196 96206 9d9cb3 22 API calls 96206->96208 96207 9d515f 22 API calls 96207->96208 96208->96198 96208->96202 96208->96206 96208->96207 96209->96177 96211 a11f50 __wsopen_s 96210->96211 96212 9d3364 GetFullPathNameW 96211->96212 96213 9d3386 96212->96213 96214 9d6b57 22 API calls 96213->96214 96215 9d33a4 96214->96215 96215->96186 96217 9d516e 96216->96217 96221 9d518f __fread_nolock 96216->96221 96219 9efe0b 22 API calls 96217->96219 96218 9efddb 22 API calls 96220 9d3544 96218->96220 96219->96221 96220->96190 96221->96218 96223 9efddb 22 API calls 96222->96223 96224 9d5734 RegQueryValueExW 96223->96224 96224->96203 96224->96205 96225 9d2e37 96226 9da961 22 API calls 96225->96226 96227 9d2e4d 96226->96227 96304 9d4ae3 96227->96304 96229 9d2e6b 96230 9d3a5a 24 API calls 96229->96230 96231 9d2e7f 96230->96231 96232 9d9cb3 22 API calls 96231->96232 96233 9d2e8c 96232->96233 96318 9d4ecb 96233->96318 96236 9d2ead 96340 9da8c7 22 API calls __fread_nolock 96236->96340 96237 a12cb0 96357 a42cf9 96237->96357 96239 a12cc3 96241 a12ccf 96239->96241 96383 9d4f39 96239->96383 96245 9d4f39 68 API calls 96241->96245 96242 9d2ec3 96341 9d6f88 22 API calls 96242->96341 96247 a12ce5 96245->96247 96246 9d2ecf 96248 9d9cb3 22 API calls 96246->96248 96389 9d3084 22 API calls 96247->96389 96249 9d2edc 96248->96249 96342 9da81b 41 API calls 96249->96342 96252 9d2eec 96254 9d9cb3 22 API calls 96252->96254 96253 a12d02 96390 9d3084 22 API calls 96253->96390 96255 9d2f12 96254->96255 96343 9da81b 41 API calls 96255->96343 96258 a12d1e 96259 9d3a5a 24 API calls 96258->96259 96260 a12d44 96259->96260 96391 9d3084 22 API calls 96260->96391 96261 9d2f21 96264 9da961 22 API calls 96261->96264 96263 a12d50 96392 9da8c7 22 API calls __fread_nolock 96263->96392 96266 9d2f3f 96264->96266 96344 9d3084 22 API calls 96266->96344 96267 a12d5e 96393 9d3084 22 API calls 96267->96393 96270 9d2f4b 96345 9f4a28 40 API calls 3 library calls 96270->96345 96272 9d2f59 96272->96247 96274 9d2f63 96272->96274 96273 a12d6d 96394 9da8c7 22 API calls __fread_nolock 96273->96394 96346 9f4a28 40 API calls 3 library calls 96274->96346 96277 9d2f6e 96277->96253 96279 9d2f78 96277->96279 96278 a12d83 96395 9d3084 22 API calls 96278->96395 96347 9f4a28 40 API calls 3 library calls 96279->96347 96282 a12d90 96283 9d2f83 96283->96258 96284 9d2f8d 96283->96284 96348 9f4a28 40 API calls 3 library calls 96284->96348 96286 9d2f98 96287 9d2fdc 96286->96287 96349 9d3084 22 API calls 96286->96349 96287->96273 96288 9d2fe8 96287->96288 96288->96282 96290 9d63eb 22 API calls 96288->96290 96292 9d2ff8 96290->96292 96291 9d2fbf 96350 9da8c7 22 API calls __fread_nolock 96291->96350 96352 9d6a50 22 API calls 96292->96352 96295 9d2fcd 96351 9d3084 22 API calls 96295->96351 96296 9d3006 96353 9d70b0 23 API calls 96296->96353 96301 9d3021 96302 9d3065 96301->96302 96354 9d6f88 22 API calls 96301->96354 96355 9d70b0 23 API calls 96301->96355 96356 9d3084 22 API calls 96301->96356 96305 9d4af0 __wsopen_s 96304->96305 96306 9d6b57 22 API calls 96305->96306 96307 9d4b22 96305->96307 96306->96307 96308 9d4c6d 22 API calls 96307->96308 96316 9d4b58 96307->96316 96308->96307 96309 9d9cb3 22 API calls 96310 9d4c52 96309->96310 96312 9d515f 22 API calls 96310->96312 96311 9d9cb3 22 API calls 96311->96316 96315 9d4c5e 96312->96315 96313 9d4c6d 22 API calls 96313->96316 96314 9d515f 22 API calls 96314->96316 96315->96229 96316->96311 96316->96313 96316->96314 96317 9d4c29 96316->96317 96317->96309 96317->96315 96396 9d4e90 LoadLibraryA 96318->96396 96323 9d4ef6 LoadLibraryExW 96404 9d4e59 LoadLibraryA 96323->96404 96324 a13ccf 96325 9d4f39 68 API calls 96324->96325 96327 a13cd6 96325->96327 96329 9d4e59 3 API calls 96327->96329 96331 a13cde 96329->96331 96426 9d50f5 40 API calls __fread_nolock 96331->96426 96332 9d4f20 96332->96331 96333 9d4f2c 96332->96333 96335 9d4f39 68 API calls 96333->96335 96337 9d2ea5 96335->96337 96336 a13cf5 96427 a428fe 27 API calls 96336->96427 96337->96236 96337->96237 96339 a13d05 96340->96242 96341->96246 96342->96252 96343->96261 96344->96270 96345->96272 96346->96277 96347->96283 96348->96286 96349->96291 96350->96295 96351->96287 96352->96296 96353->96301 96354->96301 96355->96301 96356->96301 96358 a42d15 96357->96358 96492 9d511f 64 API calls 96358->96492 96360 a42d29 96493 a42e66 75 API calls 96360->96493 96362 a42d3b 96380 a42d3f 96362->96380 96494 9d50f5 40 API calls __fread_nolock 96362->96494 96364 a42d56 96495 9d50f5 40 API calls __fread_nolock 96364->96495 96366 a42d66 96496 9d50f5 40 API calls __fread_nolock 96366->96496 96368 a42d81 96497 9d50f5 40 API calls __fread_nolock 96368->96497 96370 a42d9c 96498 9d511f 64 API calls 96370->96498 96372 a42db3 96373 9fea0c ___std_exception_copy 21 API calls 96372->96373 96374 a42dba 96373->96374 96375 9fea0c ___std_exception_copy 21 API calls 96374->96375 96376 a42dc4 96375->96376 96499 9d50f5 40 API calls __fread_nolock 96376->96499 96378 a42dd8 96500 a428fe 27 API calls 96378->96500 96380->96239 96381 a42dee 96381->96380 96501 a422ce 96381->96501 96384 9d4f43 96383->96384 96386 9d4f4a 96383->96386 96385 9fe678 67 API calls 96384->96385 96385->96386 96387 9d4f59 96386->96387 96388 9d4f6a FreeLibrary 96386->96388 96387->96241 96388->96387 96389->96253 96390->96258 96391->96263 96392->96267 96393->96273 96394->96278 96395->96282 96397 9d4ea8 GetProcAddress 96396->96397 96398 9d4ec6 96396->96398 96399 9d4eb8 96397->96399 96401 9fe5eb 96398->96401 96399->96398 96400 9d4ebf FreeLibrary 96399->96400 96400->96398 96428 9fe52a 96401->96428 96403 9d4eea 96403->96323 96403->96324 96405 9d4e8d 96404->96405 96406 9d4e6e GetProcAddress 96404->96406 96409 9d4f80 96405->96409 96407 9d4e7e 96406->96407 96407->96405 96408 9d4e86 FreeLibrary 96407->96408 96408->96405 96410 9efe0b 22 API calls 96409->96410 96411 9d4f95 96410->96411 96412 9d5722 22 API calls 96411->96412 96413 9d4fa1 __fread_nolock 96412->96413 96414 9d50a5 96413->96414 96415 a13d1d 96413->96415 96425 9d4fdc 96413->96425 96481 9d42a2 CreateStreamOnHGlobal 96414->96481 96489 a4304d 74 API calls 96415->96489 96418 a13d22 96490 9d511f 64 API calls 96418->96490 96421 a13d45 96491 9d50f5 40 API calls __fread_nolock 96421->96491 96424 9d506e ISource 96424->96332 96425->96418 96425->96424 96487 9d50f5 40 API calls __fread_nolock 96425->96487 96488 9d511f 64 API calls 96425->96488 96426->96336 96427->96339 96430 9fe536 __FrameHandler3::FrameUnwindToState 96428->96430 96429 9fe544 96453 9ff2d9 20 API calls _abort 96429->96453 96430->96429 96432 9fe574 96430->96432 96434 9fe579 96432->96434 96435 9fe586 96432->96435 96433 9fe549 96454 a027ec 26 API calls _abort 96433->96454 96455 9ff2d9 20 API calls _abort 96434->96455 96445 a08061 96435->96445 96439 9fe58f 96440 9fe595 96439->96440 96441 9fe5a2 96439->96441 96456 9ff2d9 20 API calls _abort 96440->96456 96457 9fe5d4 LeaveCriticalSection __fread_nolock 96441->96457 96442 9fe554 __fread_nolock 96442->96403 96446 a0806d __FrameHandler3::FrameUnwindToState 96445->96446 96458 a02f5e EnterCriticalSection 96446->96458 96448 a0807b 96459 a080fb 96448->96459 96452 a080ac __fread_nolock 96452->96439 96453->96433 96454->96442 96455->96442 96456->96442 96457->96442 96458->96448 96468 a0811e 96459->96468 96460 a08177 96462 a04c7d _abort 20 API calls 96460->96462 96461 a08088 96472 a080b7 96461->96472 96463 a08180 96462->96463 96477 a029c8 20 API calls __dosmaperr 96463->96477 96466 a08189 96466->96461 96478 a03405 11 API calls 2 library calls 96466->96478 96468->96460 96468->96461 96475 9f918d EnterCriticalSection 96468->96475 96476 9f91a1 LeaveCriticalSection 96468->96476 96469 a081a8 96479 9f918d EnterCriticalSection 96469->96479 96480 a02fa6 LeaveCriticalSection 96472->96480 96474 a080be 96474->96452 96475->96468 96476->96468 96477->96466 96478->96469 96479->96461 96480->96474 96482 9d42bc FindResourceExW 96481->96482 96486 9d42d9 96481->96486 96483 a135ba LoadResource 96482->96483 96482->96486 96484 a135cf SizeofResource 96483->96484 96483->96486 96485 a135e3 LockResource 96484->96485 96484->96486 96485->96486 96486->96425 96487->96425 96488->96425 96489->96418 96490->96421 96491->96424 96492->96360 96493->96362 96494->96364 96495->96366 96496->96368 96497->96370 96498->96372 96499->96378 96500->96381 96502 a422d9 96501->96502 96503 a422e7 96501->96503 96504 9fe5eb 29 API calls 96502->96504 96505 a4232c 96503->96505 96506 9fe5eb 29 API calls 96503->96506 96529 a422f0 96503->96529 96504->96503 96530 a42557 40 API calls __fread_nolock 96505->96530 96507 a42311 96506->96507 96507->96505 96509 a4231a 96507->96509 96509->96529 96538 9fe678 96509->96538 96510 a42370 96511 a42374 96510->96511 96512 a42395 96510->96512 96513 a42381 96511->96513 96516 9fe678 67 API calls 96511->96516 96531 a42171 96512->96531 96518 9fe678 67 API calls 96513->96518 96513->96529 96516->96513 96517 a4239d 96519 a423c3 96517->96519 96520 a423a3 96517->96520 96518->96529 96551 a423f3 74 API calls 96519->96551 96522 a423b0 96520->96522 96523 9fe678 67 API calls 96520->96523 96524 9fe678 67 API calls 96522->96524 96522->96529 96523->96522 96524->96529 96525 a423ca 96526 a423de 96525->96526 96527 9fe678 67 API calls 96525->96527 96528 9fe678 67 API calls 96526->96528 96526->96529 96527->96526 96528->96529 96529->96380 96530->96510 96532 9fea0c ___std_exception_copy 21 API calls 96531->96532 96533 a4217f 96532->96533 96534 9fea0c ___std_exception_copy 21 API calls 96533->96534 96535 a42190 96534->96535 96536 9fea0c ___std_exception_copy 21 API calls 96535->96536 96537 a4219c 96536->96537 96537->96517 96539 9fe684 __FrameHandler3::FrameUnwindToState 96538->96539 96540 9fe6aa 96539->96540 96541 9fe695 96539->96541 96550 9fe6a5 __fread_nolock 96540->96550 96552 9f918d EnterCriticalSection 96540->96552 96569 9ff2d9 20 API calls _abort 96541->96569 96544 9fe69a 96570 a027ec 26 API calls _abort 96544->96570 96545 9fe6c6 96553 9fe602 96545->96553 96548 9fe6d1 96571 9fe6ee LeaveCriticalSection __fread_nolock 96548->96571 96550->96529 96551->96525 96552->96545 96554 9fe60f 96553->96554 96555 9fe624 96553->96555 96604 9ff2d9 20 API calls _abort 96554->96604 96560 9fe61f 96555->96560 96572 9fdc0b 96555->96572 96557 9fe614 96605 a027ec 26 API calls _abort 96557->96605 96560->96548 96565 9fe646 96589 a0862f 96565->96589 96569->96544 96570->96550 96571->96550 96573 9fdc1f 96572->96573 96574 9fdc23 96572->96574 96578 a04d7a 96573->96578 96574->96573 96575 9fd955 __fread_nolock 26 API calls 96574->96575 96576 9fdc43 96575->96576 96607 a059be 62 API calls 5 library calls 96576->96607 96579 a04d90 96578->96579 96580 9fe640 96578->96580 96579->96580 96608 a029c8 20 API calls __dosmaperr 96579->96608 96582 9fd955 96580->96582 96583 9fd976 96582->96583 96584 9fd961 96582->96584 96583->96565 96609 9ff2d9 20 API calls _abort 96584->96609 96586 9fd966 96610 a027ec 26 API calls _abort 96586->96610 96588 9fd971 96588->96565 96590 a08653 96589->96590 96591 a0863e 96589->96591 96592 a0868e 96590->96592 96596 a0867a 96590->96596 96614 9ff2c6 20 API calls _abort 96591->96614 96616 9ff2c6 20 API calls _abort 96592->96616 96595 a08643 96615 9ff2d9 20 API calls _abort 96595->96615 96611 a08607 96596->96611 96597 a08693 96617 9ff2d9 20 API calls _abort 96597->96617 96601 9fe64c 96601->96560 96606 a029c8 20 API calls __dosmaperr 96601->96606 96602 a0869b 96618 a027ec 26 API calls _abort 96602->96618 96604->96557 96605->96560 96606->96560 96607->96573 96608->96580 96609->96586 96610->96588 96619 a08585 96611->96619 96613 a0862b 96613->96601 96614->96595 96615->96601 96616->96597 96617->96602 96618->96601 96620 a08591 __FrameHandler3::FrameUnwindToState 96619->96620 96630 a05147 EnterCriticalSection 96620->96630 96622 a0859f 96623 a085d1 96622->96623 96624 a085c6 96622->96624 96631 9ff2d9 20 API calls _abort 96623->96631 96625 a086ae __wsopen_s 29 API calls 96624->96625 96627 a085cc 96625->96627 96632 a085fb LeaveCriticalSection __wsopen_s 96627->96632 96629 a085ee __fread_nolock 96629->96613 96630->96622 96631->96627 96632->96629 96633 9d3156 96636 9d3170 96633->96636 96637 9d3187 96636->96637 96638 9d318c 96637->96638 96639 9d31eb 96637->96639 96676 9d31e9 96637->96676 96642 9d3199 96638->96642 96643 9d3265 PostQuitMessage 96638->96643 96640 a12dfb 96639->96640 96641 9d31f1 96639->96641 96692 9d18e2 10 API calls 96640->96692 96645 9d321d SetTimer RegisterWindowMessageW 96641->96645 96646 9d31f8 96641->96646 96648 9d31a4 96642->96648 96649 a12e7c 96642->96649 96665 9d316a 96643->96665 96644 9d31d0 DefWindowProcW 96644->96665 96653 9d3246 CreatePopupMenu 96645->96653 96645->96665 96650 9d3201 KillTimer 96646->96650 96651 a12d9c 96646->96651 96654 9d31ae 96648->96654 96655 a12e68 96648->96655 96696 a3bf30 34 API calls ___scrt_fastfail 96649->96696 96688 9d30f2 Shell_NotifyIconW ___scrt_fastfail 96650->96688 96662 a12da1 96651->96662 96663 a12dd7 MoveWindow 96651->96663 96652 a12e1c 96693 9ee499 42 API calls 96652->96693 96653->96665 96660 9d31b9 96654->96660 96661 a12e4d 96654->96661 96681 a3c161 96655->96681 96666 9d31c4 96660->96666 96667 9d3253 96660->96667 96661->96644 96695 a30ad7 22 API calls 96661->96695 96669 a12da7 96662->96669 96670 a12dc6 SetFocus 96662->96670 96663->96665 96664 9d3214 96689 9d3c50 DeleteObject DestroyWindow 96664->96689 96666->96644 96694 9d30f2 Shell_NotifyIconW ___scrt_fastfail 96666->96694 96690 9d326f 44 API calls ___scrt_fastfail 96667->96690 96668 a12e8e 96668->96644 96668->96665 96669->96666 96671 a12db0 96669->96671 96670->96665 96691 9d18e2 10 API calls 96671->96691 96676->96644 96677 9d3263 96677->96665 96679 a12e41 96680 9d3837 49 API calls 96679->96680 96680->96676 96682 a3c276 96681->96682 96683 a3c179 ___scrt_fastfail 96681->96683 96682->96665 96684 9d3923 24 API calls 96683->96684 96686 a3c1a0 96684->96686 96685 a3c25f KillTimer SetTimer 96685->96682 96686->96685 96687 a3c251 Shell_NotifyIconW 96686->96687 96687->96685 96688->96664 96689->96665 96690->96677 96691->96665 96692->96652 96693->96666 96694->96679 96695->96676 96696->96668 96697 9d1033 96702 9d4c91 96697->96702 96701 9d1042 96703 9da961 22 API calls 96702->96703 96704 9d4cff 96703->96704 96710 9d3af0 96704->96710 96706 9d4d9c 96708 9d1038 96706->96708 96713 9d51f7 22 API calls __fread_nolock 96706->96713 96709 9f00a3 29 API calls __onexit 96708->96709 96709->96701 96714 9d3b1c 96710->96714 96713->96706 96715 9d3b0f 96714->96715 96716 9d3b29 96714->96716 96715->96706 96716->96715 96717 9d3b30 RegOpenKeyExW 96716->96717 96717->96715 96718 9d3b4a RegQueryValueExW 96717->96718 96719 9d3b6b 96718->96719 96720 9d3b80 RegCloseKey 96718->96720 96719->96720 96720->96715 96721 9d1cad SystemParametersInfoW 96722 a62a55 96730 a41ebc 96722->96730 96725 a62a70 96732 a339c0 22 API calls 96725->96732 96726 a62a87 96728 a62a7c 96733 a3417d 22 API calls __fread_nolock 96728->96733 96731 a41ec3 IsWindow 96730->96731 96731->96725 96731->96726 96732->96728 96733->96726 96734 a23f75 96745 9eceb1 96734->96745 96736 a23f8b 96738 a24006 96736->96738 96754 9ee300 23 API calls 96736->96754 96739 9dbf40 349 API calls 96738->96739 96740 a24052 96739->96740 96743 a24a88 96740->96743 96756 a4359c 82 API calls __wsopen_s 96740->96756 96742 a23fe6 96742->96740 96755 a41abf 22 API calls 96742->96755 96746 9ecebf 96745->96746 96747 9eced2 96745->96747 96748 9daceb 23 API calls 96746->96748 96749 9eced7 96747->96749 96750 9ecf05 96747->96750 96753 9ecec9 96748->96753 96752 9efddb 22 API calls 96749->96752 96751 9daceb 23 API calls 96750->96751 96751->96753 96752->96753 96753->96736 96754->96742 96755->96738 96756->96743 96757 9d1044 96762 9d10f3 96757->96762 96759 9d104a 96798 9f00a3 29 API calls __onexit 96759->96798 96761 9d1054 96799 9d1398 96762->96799 96766 9d116a 96767 9da961 22 API calls 96766->96767 96768 9d1174 96767->96768 96769 9da961 22 API calls 96768->96769 96770 9d117e 96769->96770 96771 9da961 22 API calls 96770->96771 96772 9d1188 96771->96772 96773 9da961 22 API calls 96772->96773 96774 9d11c6 96773->96774 96775 9da961 22 API calls 96774->96775 96776 9d1292 96775->96776 96809 9d171c 96776->96809 96780 9d12c4 96781 9da961 22 API calls 96780->96781 96782 9d12ce 96781->96782 96783 9e1940 9 API calls 96782->96783 96784 9d12f9 96783->96784 96830 9d1aab 96784->96830 96786 9d1315 96787 9d1325 GetStdHandle 96786->96787 96788 a12485 96787->96788 96789 9d137a 96787->96789 96788->96789 96790 a1248e 96788->96790 96793 9d1387 OleInitialize 96789->96793 96791 9efddb 22 API calls 96790->96791 96792 a12495 96791->96792 96837 a4011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96792->96837 96793->96759 96795 a1249e 96838 a40944 CreateThread 96795->96838 96797 a124aa CloseHandle 96797->96789 96798->96761 96839 9d13f1 96799->96839 96802 9d13f1 22 API calls 96803 9d13d0 96802->96803 96804 9da961 22 API calls 96803->96804 96805 9d13dc 96804->96805 96806 9d6b57 22 API calls 96805->96806 96807 9d1129 96806->96807 96808 9d1bc3 6 API calls 96807->96808 96808->96766 96810 9da961 22 API calls 96809->96810 96811 9d172c 96810->96811 96812 9da961 22 API calls 96811->96812 96813 9d1734 96812->96813 96814 9da961 22 API calls 96813->96814 96815 9d174f 96814->96815 96816 9efddb 22 API calls 96815->96816 96817 9d129c 96816->96817 96818 9d1b4a 96817->96818 96819 9d1b58 96818->96819 96820 9da961 22 API calls 96819->96820 96821 9d1b63 96820->96821 96822 9da961 22 API calls 96821->96822 96823 9d1b6e 96822->96823 96824 9da961 22 API calls 96823->96824 96825 9d1b79 96824->96825 96826 9da961 22 API calls 96825->96826 96827 9d1b84 96826->96827 96828 9efddb 22 API calls 96827->96828 96829 9d1b96 RegisterWindowMessageW 96828->96829 96829->96780 96831 9d1abb 96830->96831 96832 a1272d 96830->96832 96833 9efddb 22 API calls 96831->96833 96846 a43209 23 API calls 96832->96846 96835 9d1ac3 96833->96835 96835->96786 96836 a12738 96837->96795 96838->96797 96847 a4092a 28 API calls 96838->96847 96840 9da961 22 API calls 96839->96840 96841 9d13fc 96840->96841 96842 9da961 22 API calls 96841->96842 96843 9d1404 96842->96843 96844 9da961 22 API calls 96843->96844 96845 9d13c6 96844->96845 96845->96802 96846->96836 96848 9d2de3 96849 9d2df0 __wsopen_s 96848->96849 96850 9d2e09 96849->96850 96851 a12c2b ___scrt_fastfail 96849->96851 96852 9d3aa2 23 API calls 96850->96852 96853 a12c47 GetOpenFileNameW 96851->96853 96854 9d2e12 96852->96854 96855 a12c96 96853->96855 96864 9d2da5 96854->96864 96858 9d6b57 22 API calls 96855->96858 96860 a12cab 96858->96860 96860->96860 96861 9d2e27 96882 9d44a8 96861->96882 96865 a11f50 __wsopen_s 96864->96865 96866 9d2db2 GetLongPathNameW 96865->96866 96867 9d6b57 22 API calls 96866->96867 96868 9d2dda 96867->96868 96869 9d3598 96868->96869 96870 9da961 22 API calls 96869->96870 96871 9d35aa 96870->96871 96872 9d3aa2 23 API calls 96871->96872 96873 9d35b5 96872->96873 96874 a132eb 96873->96874 96875 9d35c0 96873->96875 96881 a1330d 96874->96881 96917 9ece60 41 API calls 96874->96917 96876 9d515f 22 API calls 96875->96876 96878 9d35cc 96876->96878 96911 9d35f3 96878->96911 96880 9d35df 96880->96861 96883 9d4ecb 94 API calls 96882->96883 96884 9d44cd 96883->96884 96885 a13833 96884->96885 96886 9d4ecb 94 API calls 96884->96886 96887 a42cf9 80 API calls 96885->96887 96888 9d44e1 96886->96888 96889 a13848 96887->96889 96888->96885 96892 9d44e9 96888->96892 96890 a13869 96889->96890 96891 a1384c 96889->96891 96894 9efe0b 22 API calls 96890->96894 96893 9d4f39 68 API calls 96891->96893 96895 a13854 96892->96895 96896 9d44f5 96892->96896 96893->96895 96898 a138ae 96894->96898 96919 a3da5a 82 API calls 96895->96919 96918 9d940c 136 API calls 2 library calls 96896->96918 96902 a13a5f 96898->96902 96908 9d9cb3 22 API calls 96898->96908 96920 a3967e 22 API calls __fread_nolock 96898->96920 96921 a395ad 42 API calls _wcslen 96898->96921 96922 a40b5a 22 API calls 96898->96922 96923 9da4a1 22 API calls __fread_nolock 96898->96923 96924 9d3ff7 22 API calls 96898->96924 96900 a13862 96900->96890 96901 9d2e31 96903 9d4f39 68 API calls 96902->96903 96925 a3989b 82 API calls __wsopen_s 96902->96925 96903->96902 96908->96898 96912 9d3624 __fread_nolock 96911->96912 96913 9d3605 96911->96913 96914 9efddb 22 API calls 96912->96914 96915 9efe0b 22 API calls 96913->96915 96916 9d363b 96914->96916 96915->96912 96916->96880 96917->96874 96918->96901 96919->96900 96920->96898 96921->96898 96922->96898 96923->96898 96924->96898 96925->96902

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 389 9d42de-9d434d call 9da961 GetVersionExW call 9d6b57 394 a13617-a1362a 389->394 395 9d4353 389->395 396 a1362b-a1362f 394->396 397 9d4355-9d4357 395->397 398 a13631 396->398 399 a13632-a1363e 396->399 400 9d435d-9d43bc call 9d93b2 call 9d37a0 397->400 401 a13656 397->401 398->399 399->396 402 a13640-a13642 399->402 417 a137df-a137e6 400->417 418 9d43c2-9d43c4 400->418 406 a1365d-a13660 401->406 402->397 405 a13648-a1364f 402->405 405->394 408 a13651 405->408 409 9d441b-9d4435 GetCurrentProcess IsWow64Process 406->409 410 a13666-a136a8 406->410 408->401 413 9d4494-9d449a 409->413 414 9d4437 409->414 410->409 411 a136ae-a136b1 410->411 415 a136b3-a136bd 411->415 416 a136db-a136e5 411->416 419 9d443d-9d4449 413->419 414->419 420 a136ca-a136d6 415->420 421 a136bf-a136c5 415->421 423 a136e7-a136f3 416->423 424 a136f8-a13702 416->424 425 a13806-a13809 417->425 426 a137e8 417->426 418->406 422 9d43ca-9d43dd 418->422 427 9d444f-9d445e LoadLibraryA 419->427 428 a13824-a13828 GetSystemInfo 419->428 420->409 421->409 429 a13726-a1372f 422->429 430 9d43e3-9d43e5 422->430 423->409 432 a13715-a13721 424->432 433 a13704-a13710 424->433 434 a137f4-a137fc 425->434 435 a1380b-a1381a 425->435 431 a137ee 426->431 436 9d449c-9d44a6 GetSystemInfo 427->436 437 9d4460-9d446e GetProcAddress 427->437 441 a13731-a13737 429->441 442 a1373c-a13748 429->442 439 9d43eb-9d43ee 430->439 440 a1374d-a13762 430->440 431->434 432->409 433->409 434->425 435->431 443 a1381c-a13822 435->443 438 9d4476-9d4478 436->438 437->436 444 9d4470-9d4474 GetNativeSystemInfo 437->444 445 9d447a-9d447b FreeLibrary 438->445 446 9d4481-9d4493 438->446 447 a13791-a13794 439->447 448 9d43f4-9d440f 439->448 449 a13764-a1376a 440->449 450 a1376f-a1377b 440->450 441->409 442->409 443->434 444->438 445->446 447->409 451 a1379a-a137c1 447->451 452 a13780-a1378c 448->452 453 9d4415 448->453 449->409 450->409 454 a137c3-a137c9 451->454 455 a137ce-a137da 451->455 452->409 453->409 454->409 455->409
                            APIs
                            • GetVersionExW.KERNEL32(?), ref: 009D430D
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            • GetCurrentProcess.KERNEL32(?,00A6CB64,00000000,?,?), ref: 009D4422
                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 009D4429
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 009D4454
                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 009D4466
                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 009D4474
                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 009D447B
                            • GetSystemInfo.KERNEL32(?,?,?), ref: 009D44A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                            • API String ID: 3290436268-3101561225
                            • Opcode ID: 623e3441ac6397fc8fb1c4753f8db3148327e9ac787b9da19cefab4d2739a826
                            • Instruction ID: 1b11a899006ae0dd0469176f662f37282baf3072b99e507cabfe2dac6edff111
                            • Opcode Fuzzy Hash: 623e3441ac6397fc8fb1c4753f8db3148327e9ac787b9da19cefab4d2739a826
                            • Instruction Fuzzy Hash: 14A1426690E2D2FFCF52CFE968411A57EE46B27340F088C9AD0819B7A1D774454BDB31

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 654 9d42a2-9d42ba CreateStreamOnHGlobal 655 9d42bc-9d42d3 FindResourceExW 654->655 656 9d42da-9d42dd 654->656 657 9d42d9 655->657 658 a135ba-a135c9 LoadResource 655->658 657->656 658->657 659 a135cf-a135dd SizeofResource 658->659 659->657 660 a135e3-a135ee LockResource 659->660 660->657 661 a135f4-a13612 660->661 661->657
                            APIs
                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,009D50AA,?,?,00000000,00000000), ref: 009D42B2
                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,009D50AA,?,?,00000000,00000000), ref: 009D42C9
                            • LoadResource.KERNEL32(?,00000000,?,?,009D50AA,?,?,00000000,00000000,?,?,?,?,?,?,009D4F20), ref: 00A135BE
                            • SizeofResource.KERNEL32(?,00000000,?,?,009D50AA,?,?,00000000,00000000,?,?,?,?,?,?,009D4F20), ref: 00A135D3
                            • LockResource.KERNEL32(009D50AA,?,?,009D50AA,?,?,00000000,00000000,?,?,?,?,?,?,009D4F20,?), ref: 00A135E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                            • String ID: SCRIPT
                            • API String ID: 3051347437-3967369404
                            • Opcode ID: 54d2a52c8edba6acc6063db68a10ee019e2cda1830510de1d0c3f6c4cee39b89
                            • Instruction ID: b616434a808f836a727153b73c23e38307a8e8117500fd3c94a29931a25574e2
                            • Opcode Fuzzy Hash: 54d2a52c8edba6acc6063db68a10ee019e2cda1830510de1d0c3f6c4cee39b89
                            • Instruction Fuzzy Hash: 7A11CE70240300BFEB219BA5DC48F677BBEEBC5B61F10816AF956C6250DBB1DC008670

                            Control-flow Graph

                            APIs
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 009D2B6B
                              • Part of subcall function 009D3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AA1418,?,009D2E7F,?,?,?,00000000), ref: 009D3A78
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00A92224), ref: 00A12C10
                            • ShellExecuteW.SHELL32(00000000,?,?,00A92224), ref: 00A12C17
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                            • String ID: runas
                            • API String ID: 448630720-4000483414
                            • Opcode ID: 90bc51bbcd206bf8cfee93c37f61538b6280d583fef27bfabec7a94ac432ece9
                            • Instruction ID: b0275264a132d8e70d29edfab751e83d178f4de4bc93a3dc6b52b18a8ffab14b
                            • Opcode Fuzzy Hash: 90bc51bbcd206bf8cfee93c37f61538b6280d583fef27bfabec7a94ac432ece9
                            • Instruction Fuzzy Hash: 2111D2312882016AC704FF74D852BBEBBA4ABE6751F44C42FF082432A2CF64894A8712

                            Control-flow Graph

                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00A5A6AC
                            • Process32FirstW.KERNEL32(00000000,?), ref: 00A5A6BA
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • Process32NextW.KERNEL32(00000000,?), ref: 00A5A79C
                            • CloseHandle.KERNELBASE(00000000), ref: 00A5A7AB
                              • Part of subcall function 009ECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00A13303,?), ref: 009ECE8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                            • String ID:
                            • API String ID: 1991900642-0
                            • Opcode ID: 1685e4c72ab9410462859b7a6359da5098b8ccb05208031691bf844b563f71d0
                            • Instruction ID: e12547d8c432cb6fbea477a09bb21a6d1071e289cf53788b80fd20edd79ec6ec
                            • Opcode Fuzzy Hash: 1685e4c72ab9410462859b7a6359da5098b8ccb05208031691bf844b563f71d0
                            • Instruction Fuzzy Hash: B7515D716083009FD710EF64D886A6BBBE8FFD9754F00891EF99597291EB70D904CB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 880 a3dbbe-a3dbda lstrlenW 881 a3dc06 880->881 882 a3dbdc-a3dbe6 GetFileAttributesW 880->882 883 a3dc09-a3dc0d 881->883 882->883 884 a3dbe8-a3dbf7 FindFirstFileW 882->884 884->881 885 a3dbf9-a3dc04 FindClose 884->885 885->883
                            APIs
                            • lstrlenW.KERNEL32(?,00A15222), ref: 00A3DBCE
                            • GetFileAttributesW.KERNELBASE(?), ref: 00A3DBDD
                            • FindFirstFileW.KERNEL32(?,?), ref: 00A3DBEE
                            • FindClose.KERNEL32(00000000), ref: 00A3DBFA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirstlstrlen
                            • String ID:
                            • API String ID: 2695905019-0
                            • Opcode ID: 52ddaf145f449a47accb6aded2c196268b916028913c72bab499083ef9cae872
                            • Instruction ID: 823b42bcb0855ac337edac0b86add32fcdf634b527baed500563ea0edbda67aa
                            • Opcode Fuzzy Hash: 52ddaf145f449a47accb6aded2c196268b916028913c72bab499083ef9cae872
                            • Instruction Fuzzy Hash: 94F03071824914A7C220ABB8AD0D8BAB77C9E42335F545706F8B6C21E0EBF099568695

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 a5aff9-a5b056 call 9f2340 3 a5b094-a5b098 0->3 4 a5b058-a5b06b call 9db567 0->4 5 a5b0dd-a5b0e0 3->5 6 a5b09a-a5b0bb call 9db567 * 2 3->6 14 a5b06d-a5b092 call 9db567 * 2 4->14 15 a5b0c8 4->15 10 a5b0f5-a5b119 call 9d7510 call 9d7620 5->10 11 a5b0e2-a5b0e5 5->11 29 a5b0bf-a5b0c4 6->29 31 a5b11f-a5b178 call 9d7510 call 9d7620 call 9d7510 call 9d7620 call 9d7510 call 9d7620 10->31 32 a5b1d8-a5b1e0 10->32 16 a5b0e8-a5b0ed call 9db567 11->16 14->29 19 a5b0cb-a5b0cf 15->19 16->10 25 a5b0d1-a5b0d7 19->25 26 a5b0d9-a5b0db 19->26 25->16 26->5 26->10 29->5 33 a5b0c6 29->33 80 a5b1a6-a5b1d6 GetSystemDirectoryW call 9efe0b GetSystemDirectoryW 31->80 81 a5b17a-a5b195 call 9d7510 call 9d7620 31->81 36 a5b1e2-a5b1fd call 9d7510 call 9d7620 32->36 37 a5b20a-a5b238 GetCurrentDirectoryW call 9efe0b GetCurrentDirectoryW 32->37 33->19 36->37 50 a5b1ff-a5b208 call 9f4963 36->50 46 a5b23c 37->46 49 a5b240-a5b244 46->49 52 a5b275-a5b285 call a400d9 49->52 53 a5b246-a5b270 call 9d9c6e * 3 49->53 50->37 50->52 62 a5b287-a5b289 52->62 63 a5b28b-a5b2e1 call a407c0 call a406e6 call a405a7 52->63 53->52 68 a5b2ee-a5b2f2 62->68 63->68 99 a5b2e3 63->99 73 a5b2f8-a5b321 call a311c8 68->73 74 a5b39a-a5b3be CreateProcessW 68->74 84 a5b323-a5b328 call a31201 73->84 85 a5b32a call a314ce 73->85 78 a5b3c1-a5b3d4 call 9efe14 * 2 74->78 101 a5b3d6-a5b3e8 78->101 102 a5b42f-a5b43d CloseHandle 78->102 80->46 81->80 107 a5b197-a5b1a0 call 9f4963 81->107 98 a5b32f-a5b33c call 9f4963 84->98 85->98 115 a5b347-a5b357 call 9f4963 98->115 116 a5b33e-a5b345 98->116 99->68 105 a5b3ed-a5b3fc 101->105 106 a5b3ea 101->106 109 a5b49c 102->109 110 a5b43f-a5b444 102->110 111 a5b401-a5b42a GetLastError call 9d630c call 9dcfa0 105->111 112 a5b3fe 105->112 106->105 107->49 107->80 113 a5b4a0-a5b4a4 109->113 117 a5b446-a5b44c CloseHandle 110->117 118 a5b451-a5b456 110->118 127 a5b4e5-a5b4f6 call a40175 111->127 112->111 120 a5b4a6-a5b4b0 113->120 121 a5b4b2-a5b4bc 113->121 137 a5b362-a5b372 call 9f4963 115->137 138 a5b359-a5b360 115->138 116->115 116->116 117->118 124 a5b463-a5b468 118->124 125 a5b458-a5b45e CloseHandle 118->125 120->127 128 a5b4c4-a5b4e3 call 9dcfa0 CloseHandle 121->128 129 a5b4be 121->129 131 a5b475-a5b49a call a409d9 call a5b536 124->131 132 a5b46a-a5b470 CloseHandle 124->132 125->124 128->127 129->128 131->113 132->131 146 a5b374-a5b37b 137->146 147 a5b37d-a5b398 call 9efe14 * 3 137->147 138->137 138->138 146->146 146->147 147->78
                            APIs
                            • _wcslen.LIBCMT ref: 00A5B198
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A5B1B0
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A5B1D4
                            • _wcslen.LIBCMT ref: 00A5B200
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A5B214
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A5B236
                            • _wcslen.LIBCMT ref: 00A5B332
                              • Part of subcall function 00A405A7: GetStdHandle.KERNEL32(000000F6), ref: 00A405C6
                            • _wcslen.LIBCMT ref: 00A5B34B
                            • _wcslen.LIBCMT ref: 00A5B366
                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A5B3B6
                            • GetLastError.KERNEL32(00000000), ref: 00A5B407
                            • CloseHandle.KERNEL32(?), ref: 00A5B439
                            • CloseHandle.KERNEL32(00000000), ref: 00A5B44A
                            • CloseHandle.KERNEL32(00000000), ref: 00A5B45C
                            • CloseHandle.KERNEL32(00000000), ref: 00A5B46E
                            • CloseHandle.KERNEL32(?), ref: 00A5B4E3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                            • String ID:
                            • API String ID: 2178637699-0
                            • Opcode ID: d134f4a6b5009f5f95a784e74d24d17b68b704f947a0f50a46feba7dc75229bf
                            • Instruction ID: 5bb144315fd592f97f09a7cf672b917b44ca5a9c14b80c49952a3738552bcc5c
                            • Opcode Fuzzy Hash: d134f4a6b5009f5f95a784e74d24d17b68b704f947a0f50a46feba7dc75229bf
                            • Instruction Fuzzy Hash: D1F1AC316143409FC724EF24C891B6EBBE1BF85315F14855EF8999B2A2DB31EC49CB62
                            APIs
                            • GetInputState.USER32 ref: 009DD807
                            • timeGetTime.WINMM ref: 009DDA07
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009DDB28
                            • TranslateMessage.USER32(?), ref: 009DDB7B
                            • DispatchMessageW.USER32(?), ref: 009DDB89
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009DDB9F
                            • Sleep.KERNELBASE(0000000A), ref: 009DDBB1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                            • String ID:
                            • API String ID: 2189390790-0
                            • Opcode ID: 7a11c1c93581871a6871e8d85793a31e64356a156d47c13b7e4708ae43263340
                            • Instruction ID: 78a2004c34427f73c6e064cf1905e71d3d7c3dbab3c24f8a96c3b94b57f42641
                            • Opcode Fuzzy Hash: 7a11c1c93581871a6871e8d85793a31e64356a156d47c13b7e4708ae43263340
                            • Instruction Fuzzy Hash: 73420330689342EFD729CF28D894B6AB7F4BF86304F14892EE49587391D775E844CB92

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 009D2D07
                            • RegisterClassExW.USER32(00000030), ref: 009D2D31
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D2D42
                            • InitCommonControlsEx.COMCTL32(?), ref: 009D2D5F
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D2D6F
                            • LoadIconW.USER32(000000A9), ref: 009D2D85
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D2D94
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: 9b9f0355a354eca11399290f2b97171bb51710fe25a792e63fa3ca1b109d5821
                            • Instruction ID: a312fd06d9d674fbe1c51e6cf491d487e49fff4c2272fb34d81471ed87d29f7b
                            • Opcode Fuzzy Hash: 9b9f0355a354eca11399290f2b97171bb51710fe25a792e63fa3ca1b109d5821
                            • Instruction Fuzzy Hash: E321F2B5901319AFDB00DFE4EC89BEEBBB4FB09724F00811AF551A62A0D7B10546CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 457 a1065b-a1068b call a1042f 460 a106a6-a106b2 call a05221 457->460 461 a1068d-a10698 call 9ff2c6 457->461 466 a106b4-a106c9 call 9ff2c6 call 9ff2d9 460->466 467 a106cb-a10714 call a1039a 460->467 468 a1069a-a106a1 call 9ff2d9 461->468 466->468 476 a10781-a1078a GetFileType 467->476 477 a10716-a1071f 467->477 478 a1097d-a10983 468->478 479 a107d3-a107d6 476->479 480 a1078c-a107bd GetLastError call 9ff2a3 CloseHandle 476->480 482 a10721-a10725 477->482 483 a10756-a1077c GetLastError call 9ff2a3 477->483 486 a107d8-a107dd 479->486 487 a107df-a107e5 479->487 480->468 494 a107c3-a107ce call 9ff2d9 480->494 482->483 488 a10727-a10754 call a1039a 482->488 483->468 491 a107e9-a10837 call a0516a 486->491 487->491 492 a107e7 487->492 488->476 488->483 499 a10847-a1086b call a1014d 491->499 500 a10839-a10845 call a105ab 491->500 492->491 494->468 507 a1086d 499->507 508 a1087e-a108c1 499->508 500->499 506 a1086f-a10879 call a086ae 500->506 506->478 507->506 510 a108c3-a108c7 508->510 511 a108e2-a108f0 508->511 510->511 513 a108c9-a108dd 510->513 514 a108f6-a108fa 511->514 515 a1097b 511->515 513->511 514->515 516 a108fc-a1092f CloseHandle call a1039a 514->516 515->478 519 a10931-a1095d GetLastError call 9ff2a3 call a05333 516->519 520 a10963-a10977 516->520 519->520 520->515
                            APIs
                              • Part of subcall function 00A1039A: CreateFileW.KERNELBASE(00000000,00000000,?,00A10704,?,?,00000000,?,00A10704,00000000,0000000C), ref: 00A103B7
                            • GetLastError.KERNEL32 ref: 00A1076F
                            • __dosmaperr.LIBCMT ref: 00A10776
                            • GetFileType.KERNELBASE(00000000), ref: 00A10782
                            • GetLastError.KERNEL32 ref: 00A1078C
                            • __dosmaperr.LIBCMT ref: 00A10795
                            • CloseHandle.KERNEL32(00000000), ref: 00A107B5
                            • CloseHandle.KERNEL32(?), ref: 00A108FF
                            • GetLastError.KERNEL32 ref: 00A10931
                            • __dosmaperr.LIBCMT ref: 00A10938
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                            • String ID: H
                            • API String ID: 4237864984-2852464175
                            • Opcode ID: 63a8a2b06a6be7c2d4e9bf9f60079099db8a96474f3deade18f7cb06cdcd0c4e
                            • Instruction ID: 400021aa10b49139be3d9f890703f4cd99285975c6832a7a791403ce7e1fe78e
                            • Opcode Fuzzy Hash: 63a8a2b06a6be7c2d4e9bf9f60079099db8a96474f3deade18f7cb06cdcd0c4e
                            • Instruction Fuzzy Hash: 64A10232A041098FDF19EFA8D861BEE7BB1AB46320F140159F815AF2D1D7B59893CB91

                            Control-flow Graph

                            APIs
                              • Part of subcall function 009D3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AA1418,?,009D2E7F,?,?,?,00000000), ref: 009D3A78
                              • Part of subcall function 009D3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009D3379
                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 009D356A
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A1318D
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A131CE
                            • RegCloseKey.ADVAPI32(?), ref: 00A13210
                            • _wcslen.LIBCMT ref: 00A13277
                            • _wcslen.LIBCMT ref: 00A13286
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                            • API String ID: 98802146-2727554177
                            • Opcode ID: 878913ddf0ee02c0dfc5501b3be6e921a3d7f76490347710cfb8f19991d65842
                            • Instruction ID: d9a19326f08243750ec079e891281d4798236e3048a3acdac429f08530f59d9c
                            • Opcode Fuzzy Hash: 878913ddf0ee02c0dfc5501b3be6e921a3d7f76490347710cfb8f19991d65842
                            • Instruction Fuzzy Hash: E671D8715443019ECB04EFA9DC41AABB7F8FFD6740F40482EF5858B2A0EB759A49CB61

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 009D2B8E
                            • LoadCursorW.USER32(00000000,00007F00), ref: 009D2B9D
                            • LoadIconW.USER32(00000063), ref: 009D2BB3
                            • LoadIconW.USER32(000000A4), ref: 009D2BC5
                            • LoadIconW.USER32(000000A2), ref: 009D2BD7
                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009D2BEF
                            • RegisterClassExW.USER32(?), ref: 009D2C40
                              • Part of subcall function 009D2CD4: GetSysColorBrush.USER32(0000000F), ref: 009D2D07
                              • Part of subcall function 009D2CD4: RegisterClassExW.USER32(00000030), ref: 009D2D31
                              • Part of subcall function 009D2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D2D42
                              • Part of subcall function 009D2CD4: InitCommonControlsEx.COMCTL32(?), ref: 009D2D5F
                              • Part of subcall function 009D2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D2D6F
                              • Part of subcall function 009D2CD4: LoadIconW.USER32(000000A9), ref: 009D2D85
                              • Part of subcall function 009D2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D2D94
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                            • String ID: #$0$AutoIt v3
                            • API String ID: 423443420-4155596026
                            • Opcode ID: 2ca670785317473e1edacda5ec87ce7b0b9f5f0478a25f55dc9ece53426ceb19
                            • Instruction ID: 73f668e3758abdd3bb606678b8403f614cfd731e627a98656b29fd75ab1fac98
                            • Opcode Fuzzy Hash: 2ca670785317473e1edacda5ec87ce7b0b9f5f0478a25f55dc9ece53426ceb19
                            • Instruction Fuzzy Hash: 9E21F575A40329BFDB50DFE5EC59AA97FF4FB49B64F00401AE504AA6E0D7B105428FA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 598 9d3170-9d3185 599 9d31e5-9d31e7 598->599 600 9d3187-9d318a 598->600 599->600 603 9d31e9 599->603 601 9d318c-9d3193 600->601 602 9d31eb 600->602 606 9d3199-9d319e 601->606 607 9d3265-9d326d PostQuitMessage 601->607 604 a12dfb-a12e23 call 9d18e2 call 9ee499 602->604 605 9d31f1-9d31f6 602->605 608 9d31d0-9d31d8 DefWindowProcW 603->608 644 a12e28-a12e2f 604->644 609 9d321d-9d3244 SetTimer RegisterWindowMessageW 605->609 610 9d31f8-9d31fb 605->610 612 9d31a4-9d31a8 606->612 613 a12e7c-a12e90 call a3bf30 606->613 615 9d3219-9d321b 607->615 614 9d31de-9d31e4 608->614 609->615 619 9d3246-9d3251 CreatePopupMenu 609->619 616 9d3201-9d3214 KillTimer call 9d30f2 call 9d3c50 610->616 617 a12d9c-a12d9f 610->617 620 9d31ae-9d31b3 612->620 621 a12e68-a12e72 call a3c161 612->621 613->615 637 a12e96 613->637 615->614 616->615 629 a12da1-a12da5 617->629 630 a12dd7-a12df6 MoveWindow 617->630 619->615 626 9d31b9-9d31be 620->626 627 a12e4d-a12e54 620->627 633 a12e77 621->633 635 9d31c4-9d31ca 626->635 636 9d3253-9d3263 call 9d326f 626->636 627->608 631 a12e5a-a12e63 call a30ad7 627->631 638 a12da7-a12daa 629->638 639 a12dc6-a12dd2 SetFocus 629->639 630->615 631->608 633->615 635->608 635->644 636->615 637->608 638->635 640 a12db0-a12dc1 call 9d18e2 638->640 639->615 640->615 644->608 648 a12e35-a12e48 call 9d30f2 call 9d3837 644->648 648->608
                            APIs
                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,009D316A,?,?), ref: 009D31D8
                            • KillTimer.USER32(?,00000001,?,?,?,?,?,009D316A,?,?), ref: 009D3204
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009D3227
                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,009D316A,?,?), ref: 009D3232
                            • CreatePopupMenu.USER32 ref: 009D3246
                            • PostQuitMessage.USER32(00000000), ref: 009D3267
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                            • String ID: TaskbarCreated
                            • API String ID: 129472671-2362178303
                            • Opcode ID: 415203a7487044f3efe93af9d78fb0e35096ea34f729ec8b2d847ca4cd798887
                            • Instruction ID: d0222f5ddf5c73175dac1a2da158d4b21d7b3322f42f82f7fc2fe4a4d98645b3
                            • Opcode Fuzzy Hash: 415203a7487044f3efe93af9d78fb0e35096ea34f729ec8b2d847ca4cd798887
                            • Instruction Fuzzy Hash: FC4158356C4202BBDF149FB8EC09BBA3A29E746352F04C127F661863E1D7A5CA41D763

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 664 9d2c63-9d2cd3 CreateWindowExW * 2 ShowWindow * 2
                            APIs
                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009D2C91
                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009D2CB2
                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,009D1CAD,?), ref: 009D2CC6
                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,009D1CAD,?), ref: 009D2CCF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$CreateShow
                            • String ID: AutoIt v3$edit
                            • API String ID: 1584632944-3779509399
                            • Opcode ID: aa1a02af9a7d855817427844831fa47102de40232a9c661f845c20d599020916
                            • Instruction ID: 42a3bd6ad19b1af8dfc94cf9ce344990aa8424ef10a8b0af42710c789568c610
                            • Opcode Fuzzy Hash: aa1a02af9a7d855817427844831fa47102de40232a9c661f845c20d599020916
                            • Instruction Fuzzy Hash: 77F0DA7A5402A17AEB719B97AC0CE772EBDD7C7F60F00005EF900AA5A0D7A51852DAB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 815 9d3b1c-9d3b27 816 9d3b99-9d3b9b 815->816 817 9d3b29-9d3b2e 815->817 818 9d3b8c-9d3b8f 816->818 817->816 819 9d3b30-9d3b48 RegOpenKeyExW 817->819 819->816 820 9d3b4a-9d3b69 RegQueryValueExW 819->820 821 9d3b6b-9d3b76 820->821 822 9d3b80-9d3b8b RegCloseKey 820->822 823 9d3b78-9d3b7a 821->823 824 9d3b90-9d3b97 821->824 822->818 825 9d3b7e 823->825 824->825 825->822
                            APIs
                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,009D3B0F,SwapMouseButtons,00000004,?), ref: 009D3B40
                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,009D3B0F,SwapMouseButtons,00000004,?), ref: 009D3B61
                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,009D3B0F,SwapMouseButtons,00000004,?), ref: 009D3B83
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: Control Panel\Mouse
                            • API String ID: 3677997916-824357125
                            • Opcode ID: dc6f5645feda488995542f3f4012de583b5b3fdf09aed5c9dcce20317eb117cd
                            • Instruction ID: 68d3c6df7618543080b7c5be605e05b974b4431522375751560c2215d8c64951
                            • Opcode Fuzzy Hash: dc6f5645feda488995542f3f4012de583b5b3fdf09aed5c9dcce20317eb117cd
                            • Instruction Fuzzy Hash: 8F1157B5650208FFDB20CFA4DC84ABEBBBCEF00751B10C96BE801D7210E2759E409BA0

                            Control-flow Graph

                            APIs
                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A133A2
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009D3A04
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: IconLoadNotifyShell_String_wcslen
                            • String ID: Line:
                            • API String ID: 2289894680-1585850449
                            • Opcode ID: 9353894deb4ecc5e27ce6c30a0ff061db2fb0dc3ea7db55b5ea1c3573a8a689a
                            • Instruction ID: 81299b67a750f6820bf96def102821a689cd55ec768a288d3b0334968923cef5
                            • Opcode Fuzzy Hash: 9353894deb4ecc5e27ce6c30a0ff061db2fb0dc3ea7db55b5ea1c3573a8a689a
                            • Instruction Fuzzy Hash: 7C31E371588304AAC720EF60DC45BEBB3E8AB81710F00C92BF599872D1DB749A49C7D3
                            APIs
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 009F0668
                              • Part of subcall function 009F32A4: RaiseException.KERNEL32(?,?,?,009F068A,?,00AA1444,?,?,?,?,?,?,009F068A,009D1129,00A98738,009D1129), ref: 009F3304
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 009F0685
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Exception@8Throw$ExceptionRaise
                            • String ID: Unknown exception
                            • API String ID: 3476068407-410509341
                            • Opcode ID: 61ff65544d5cd98e60c769a8003c3a57cdbd043605594b9c1c98339e02241a18
                            • Instruction ID: 628404d2c3bcd70e09eabfd890ba07b2de63fcc05f3d2e4ff1c9206dea61d114
                            • Opcode Fuzzy Hash: 61ff65544d5cd98e60c769a8003c3a57cdbd043605594b9c1c98339e02241a18
                            • Instruction Fuzzy Hash: DBF0C83490020D778F00B665DC56EBE7B6C6EC0350B604531BB24D55D2EF75DA65C780
                            APIs
                              • Part of subcall function 009D1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009D1BF4
                              • Part of subcall function 009D1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 009D1BFC
                              • Part of subcall function 009D1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009D1C07
                              • Part of subcall function 009D1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009D1C12
                              • Part of subcall function 009D1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 009D1C1A
                              • Part of subcall function 009D1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 009D1C22
                              • Part of subcall function 009D1B4A: RegisterWindowMessageW.USER32(00000004,?,009D12C4), ref: 009D1BA2
                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009D136A
                            • OleInitialize.OLE32 ref: 009D1388
                            • CloseHandle.KERNEL32(00000000,00000000), ref: 00A124AB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                            • String ID:
                            • API String ID: 1986988660-0
                            • Opcode ID: 4b3ac93e66f7cc1499650b4630310dc8de42ccce6c379b98391bb97621aa1e75
                            • Instruction ID: eb65c2f07cb1fb7135861011b2f7b26511d535af2e175924c58be8e682340e95
                            • Opcode Fuzzy Hash: 4b3ac93e66f7cc1499650b4630310dc8de42ccce6c379b98391bb97621aa1e75
                            • Instruction Fuzzy Hash: 95719AB9D11213AFC388EFB9A9556657AE0FB8F394F54822AD04AC73E1EB344442CF44
                            APIs
                              • Part of subcall function 009D3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 009D3A04
                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A3C259
                            • KillTimer.USER32(?,00000001,?,?), ref: 00A3C261
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A3C270
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: IconNotifyShell_Timer$Kill
                            • String ID:
                            • API String ID: 3500052701-0
                            • Opcode ID: 42ef857a27c128ca515b07e5958ecaff33c77bb81f5df78ed1d561e057c2d3af
                            • Instruction ID: a7851c9a54fa4f88fc6afd88e18504748a6b79693a3288c08788c4fb4ae20bee
                            • Opcode Fuzzy Hash: 42ef857a27c128ca515b07e5958ecaff33c77bb81f5df78ed1d561e057c2d3af
                            • Instruction Fuzzy Hash: AD31C370904354AFEB22DFA48C55BE7BBFC9B06314F00049AE2DAA7241C7745A85CB51
                            APIs
                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,00A085CC,?,00A98CC8,0000000C), ref: 00A08704
                            • GetLastError.KERNEL32(?,00A085CC,?,00A98CC8,0000000C), ref: 00A0870E
                            • __dosmaperr.LIBCMT ref: 00A08739
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseErrorHandleLast__dosmaperr
                            • String ID:
                            • API String ID: 2583163307-0
                            • Opcode ID: 050cf3ae7886eb5e2e9041036446019406955b58a9ccc94a2d791ebdb4977680
                            • Instruction ID: 7adb56165f1acd9328f16006dcacd7945315916301087fb03d32a0ca5417f18c
                            • Opcode Fuzzy Hash: 050cf3ae7886eb5e2e9041036446019406955b58a9ccc94a2d791ebdb4977680
                            • Instruction Fuzzy Hash: 6B01CE32E0022C1AC620A334B965B7F6B584B93774F3A0119F8449F1D3DFAACC818249
                            APIs
                            • TranslateMessage.USER32(?), ref: 009DDB7B
                            • DispatchMessageW.USER32(?), ref: 009DDB89
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009DDB9F
                            • Sleep.KERNELBASE(0000000A), ref: 009DDBB1
                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00A21CC9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                            • String ID:
                            • API String ID: 3288985973-0
                            • Opcode ID: 599a1317f7de7f4bb6684225c27ea87b3f8d8a7c71e44be8b3cccae74b42eada
                            • Instruction ID: a5e92b7fb75b1f43b91916236197ac1a86ddfb780927d76fd2040dfd704a50e5
                            • Opcode Fuzzy Hash: 599a1317f7de7f4bb6684225c27ea87b3f8d8a7c71e44be8b3cccae74b42eada
                            • Instruction Fuzzy Hash: 75F082306853409BE730CBA0DC89FEA73BCEB89310F10892AE64AC31C0DB749489DB15
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 009E17F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Init_thread_footer
                            • String ID: CALL
                            • API String ID: 1385522511-4196123274
                            • Opcode ID: b74240eb23a85fd95b41caa0501f036fc0a9a2209245ffaacc918596f2ec38b7
                            • Instruction ID: 741731edb976257dddbc65e8775230ec38d481f580fd0b4e5c755597c9a63b06
                            • Opcode Fuzzy Hash: b74240eb23a85fd95b41caa0501f036fc0a9a2209245ffaacc918596f2ec38b7
                            • Instruction Fuzzy Hash: 78228A706082819FC715DF19C490B2ABBF5BF89314F24896DF4968B3A2D735EC41CB82
                            APIs
                            • GetOpenFileNameW.COMDLG32(?), ref: 00A12C8C
                              • Part of subcall function 009D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D3A97,?,?,009D2E7F,?,?,?,00000000), ref: 009D3AC2
                              • Part of subcall function 009D2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009D2DC4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Name$Path$FileFullLongOpen
                            • String ID: X
                            • API String ID: 779396738-3081909835
                            • Opcode ID: a11e8628bffae6ed58c8bc9e2b43dda33c406ab0053a1d322e4fdf93c5817c6e
                            • Instruction ID: def4142afd0bd842e9e0138178f8237c67c17d7b7e5829179c159a42cd95ff2b
                            • Opcode Fuzzy Hash: a11e8628bffae6ed58c8bc9e2b43dda33c406ab0053a1d322e4fdf93c5817c6e
                            • Instruction Fuzzy Hash: 5521A571A402589FCF41EF94C845BEE7BFCAF89315F00805AE505B7341DBB89A898FA1
                            APIs
                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 009D3908
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: IconNotifyShell_
                            • String ID:
                            • API String ID: 1144537725-0
                            • Opcode ID: 57f2e4a1cdbb6ef900b75971a05bf30d3d0d4dccbfb20f55af582045ed3ecf0e
                            • Instruction ID: 995f07d8a36cd8fabc07274ebb39d874c0590f196a10c35985b89cc12f4bf3da
                            • Opcode Fuzzy Hash: 57f2e4a1cdbb6ef900b75971a05bf30d3d0d4dccbfb20f55af582045ed3ecf0e
                            • Instruction Fuzzy Hash: 503181705043019FD760DF64D884797BBE8FB49719F00492EF59997380E7B1AA44CB52
                            APIs
                            • timeGetTime.WINMM ref: 009EF661
                              • Part of subcall function 009DD730: GetInputState.USER32 ref: 009DD807
                            • Sleep.KERNEL32(00000000), ref: 00A2F2DE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: InputSleepStateTimetime
                            • String ID:
                            • API String ID: 4149333218-0
                            • Opcode ID: ce5a65b443f32a701280f59ca12bedb811995b2c66727119c33195b14e1439ea
                            • Instruction ID: fe62aa546ac3112d65978f87cc03baf6cff72b3d06a25a4c7277989c445654a1
                            • Opcode Fuzzy Hash: ce5a65b443f32a701280f59ca12bedb811995b2c66727119c33195b14e1439ea
                            • Instruction Fuzzy Hash: F0F08C312802159FD310EF69E449B6AB7F8EF867A0F00402AF859C7360DBB0A800CB90
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 009DBB4E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Init_thread_footer
                            • String ID:
                            • API String ID: 1385522511-0
                            • Opcode ID: e7ac095a89f3f9c3aa277503bd14d011263ae43ca9f075187457f1a400bf3d3e
                            • Instruction ID: bac33023f51724dcafa59ed67f10811ffe7547f1a8f45be08495ff1c42b69fa2
                            • Opcode Fuzzy Hash: e7ac095a89f3f9c3aa277503bd14d011263ae43ca9f075187457f1a400bf3d3e
                            • Instruction Fuzzy Hash: 38329C34A4021ADFDB14CF58C894FBAB7B9EF45304F16806AE915AB392C778ED41CB91
                            APIs
                              • Part of subcall function 009D4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,009D4EDD,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4E9C
                              • Part of subcall function 009D4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009D4EAE
                              • Part of subcall function 009D4E90: FreeLibrary.KERNEL32(00000000,?,?,009D4EDD,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4EC0
                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4EFD
                              • Part of subcall function 009D4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A13CDE,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4E62
                              • Part of subcall function 009D4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009D4E74
                              • Part of subcall function 009D4E59: FreeLibrary.KERNEL32(00000000,?,?,00A13CDE,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4E87
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Library$Load$AddressFreeProc
                            • String ID:
                            • API String ID: 2632591731-0
                            • Opcode ID: 83a41498ba908083b017c1e862531595f64c988000e7d8bebbd1d9debea626ed
                            • Instruction ID: 28fc6c73fdb6d92016237b47bdc4bbece17c294a8f3be6fba811a76f495d4d50
                            • Opcode Fuzzy Hash: 83a41498ba908083b017c1e862531595f64c988000e7d8bebbd1d9debea626ed
                            • Instruction Fuzzy Hash: 4011E732680205ABCF14FFA4DC06FAD77A5AF90710F10C42FF542A62E1DE749A459B60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: __wsopen_s
                            • String ID:
                            • API String ID: 3347428461-0
                            • Opcode ID: dde20e58d66e2f97b142c56e449b40ffbe6192ae537809771722fbd59c8e5edc
                            • Instruction ID: 9239f410f3b7e5e81130410683fc82ec223e6aafea8cdfd11a481c027ef60441
                            • Opcode Fuzzy Hash: dde20e58d66e2f97b142c56e449b40ffbe6192ae537809771722fbd59c8e5edc
                            • Instruction Fuzzy Hash: 5811187590410EAFCB05DF58E9419DE7BF5EF48314F104059F808AB352DB31DA11CBA9
                            APIs
                              • Part of subcall function 00A04C7D: RtlAllocateHeap.NTDLL(00000008,009D1129,00000000,?,00A02E29,00000001,00000364,?,?,?,009FF2DE,00A03863,00AA1444,?,009EFDF5,?), ref: 00A04CBE
                            • _free.LIBCMT ref: 00A0506C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap_free
                            • String ID:
                            • API String ID: 614378929-0
                            • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                            • Instruction ID: 45db50952e4e08adce72f291972dada64dfd141a1506dc9852d15bbd2a802511
                            • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                            • Instruction Fuzzy Hash: 0A012B726047085FE3218F65E885A5AFBECFB89370F25052DE184832C0E6306905CB74
                            APIs
                            • GetForegroundWindow.USER32(00000000,?,?,?,00A614B5,?), ref: 00A62A01
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ForegroundWindow
                            • String ID:
                            • API String ID: 2020703349-0
                            • Opcode ID: cc5f1d9f3703e68ff3bff71d9fdfdd6a03b250302caa7154a265c64c183fbeaa
                            • Instruction ID: d134c62e11ba686be91bf7902b1d10619e040144e00d84f60f2392c9c6a3c653
                            • Opcode Fuzzy Hash: cc5f1d9f3703e68ff3bff71d9fdfdd6a03b250302caa7154a265c64c183fbeaa
                            • Instruction Fuzzy Hash: 57019E36300E829FD334CB6CC454B2237B2EBD5358F298468C0878B291DB72EC42C7A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                            • Instruction ID: 89e0899754d7d2e83d438d7526da46ca3de78d654633f515fae2982fb8d4b310
                            • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                            • Instruction Fuzzy Hash: 3AF0F432511A1C96DA323E69AD09B7A339C9F92334F100B15F661D61E2DF74980187A9
                            APIs
                            • RtlAllocateHeap.NTDLL(00000008,009D1129,00000000,?,00A02E29,00000001,00000364,?,?,?,009FF2DE,00A03863,00AA1444,?,009EFDF5,?), ref: 00A04CBE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 0f071f518bc62feac34f0acf706fcddb3a4db14bfb01e763c6a600bc28ef083b
                            • Instruction ID: 2b68915e14f1d5bab47bd7a59e1a25029d8443660612e1af8cc5cb11f6631995
                            • Opcode Fuzzy Hash: 0f071f518bc62feac34f0acf706fcddb3a4db14bfb01e763c6a600bc28ef083b
                            • Instruction Fuzzy Hash: 9AF0B47160622C77FB215F62BC09B6B3798BF857B0F144111FA1AAA1C0CA70D80147E0
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,?,00AA1444,?,009EFDF5,?,?,009DA976,00000010,00AA1440,009D13FC,?,009D13C6,?,009D1129), ref: 00A03852
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 115e51088316c9d4b46de5dd66e56be61a8271e46ed0ede8f616823b3e02859a
                            • Instruction ID: 9138971ce14c8dfe97f50f366622c6d92082adab060641e94b12c6e68d478885
                            • Opcode Fuzzy Hash: 115e51088316c9d4b46de5dd66e56be61a8271e46ed0ede8f616823b3e02859a
                            • Instruction Fuzzy Hash: 0FE0E53350122C66DF212FB7BC00BAB365CAF827B0F0581A0FD15964C0CB11DE0583E0
                            APIs
                            • FreeLibrary.KERNEL32(?,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4F6D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: e20d3faf44ba82a7bb93bf570331b745738c5c6ec38adf8d556e5674a559b648
                            • Instruction ID: 1331b190435004993aa7e88665a654820fba10aeaf469517d51f6692b9a713b2
                            • Opcode Fuzzy Hash: e20d3faf44ba82a7bb93bf570331b745738c5c6ec38adf8d556e5674a559b648
                            • Instruction Fuzzy Hash: 53F01571145752CFDB349F68D490822BBF8AF24329320CA6FE2EA82621CB359844DB50
                            APIs
                            • IsWindow.USER32(00000000), ref: 00A62A66
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window
                            • String ID:
                            • API String ID: 2353593579-0
                            • Opcode ID: 53457df0b18a49e3c4f52ec545aa99efb1ecb37d6f6b755f06589698c533becf
                            • Instruction ID: 3f7d879154331a7466eac5f0c1f41ee148d46f64271351e288933c7615c43704
                            • Opcode Fuzzy Hash: 53457df0b18a49e3c4f52ec545aa99efb1ecb37d6f6b755f06589698c533becf
                            • Instruction Fuzzy Hash: 8EE0863A754516AAC714EB70DC80AFE777CEF643D5B104536FC26C2100DB74999587E0
                            APIs
                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009D2DC4
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LongNamePath_wcslen
                            • String ID:
                            • API String ID: 541455249-0
                            • Opcode ID: 2500b591fcee16eccfcd10fad436adf8169dcaa215117d9e31841fa89ffc160c
                            • Instruction ID: d21005359b155e9a4695ec876ddd8c484268354f7b3f645ff7891ecfb7b55d41
                            • Opcode Fuzzy Hash: 2500b591fcee16eccfcd10fad436adf8169dcaa215117d9e31841fa89ffc160c
                            • Instruction Fuzzy Hash: 40E0CD726041245BC710E2989C05FEA77EDDFC8790F044072FD09D7248D964AD818550
                            APIs
                              • Part of subcall function 009D3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009D3908
                              • Part of subcall function 009DD730: GetInputState.USER32 ref: 009DD807
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 009D2B6B
                              • Part of subcall function 009D30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 009D314E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: IconNotifyShell_$CurrentDirectoryInputState
                            • String ID:
                            • API String ID: 3667716007-0
                            • Opcode ID: 0a5eac8ad5c9eb00e7c88b7f18ec9c947073d2843a08e4c4eb1168a93f5c366b
                            • Instruction ID: 04d92d8682551ba442d7a90e75a64979616eea17b3d4e94c9c940d45b4fea195
                            • Opcode Fuzzy Hash: 0a5eac8ad5c9eb00e7c88b7f18ec9c947073d2843a08e4c4eb1168a93f5c366b
                            • Instruction Fuzzy Hash: 95E0266138020413C604BBB4A81267DA7598BE6352F00C43FF042833A2CF6449464212
                            APIs
                            • CreateFileW.KERNELBASE(00000000,00000000,?,00A10704,?,?,00000000,?,00A10704,00000000,0000000C), ref: 00A103B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateFile
                            • String ID:
                            • API String ID: 823142352-0
                            • Opcode ID: c6c91a6f412dcb1ed2363f89ba2a13501c6e3abacc452e5a9c303475be2d30ee
                            • Instruction ID: 5a5568707c8de4f5630ebbb6624174a6c9fa92cbd4454a2d0e603da209bf77b1
                            • Opcode Fuzzy Hash: c6c91a6f412dcb1ed2363f89ba2a13501c6e3abacc452e5a9c303475be2d30ee
                            • Instruction Fuzzy Hash: 1DD06C3204010DBBDF028F84DD06EDA3BAAFB48714F014100FE5856020C772E822AB90
                            APIs
                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 009D1CBC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: InfoParametersSystem
                            • String ID:
                            • API String ID: 3098949447-0
                            • Opcode ID: e526d8cceae8a913e68aa06fd33628e4409dc0674aca29706e71a5dd347c781c
                            • Instruction ID: 50c07819302c23813dc11a00ad4994c611a1a2e669c46cba1ff8c572ca3a36cc
                            • Opcode Fuzzy Hash: e526d8cceae8a913e68aa06fd33628e4409dc0674aca29706e71a5dd347c781c
                            • Instruction Fuzzy Hash: 9EC09B352C0306AFF614CBC4BC4EF107764B349F14F044001F649595E3C3E21421DB50
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A6961A
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A6965B
                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A6969F
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A696C9
                            • SendMessageW.USER32 ref: 00A696F2
                            • GetKeyState.USER32(00000011), ref: 00A6978B
                            • GetKeyState.USER32(00000009), ref: 00A69798
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A697AE
                            • GetKeyState.USER32(00000010), ref: 00A697B8
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A697E9
                            • SendMessageW.USER32 ref: 00A69810
                            • SendMessageW.USER32(?,00001030,?,00A67E95), ref: 00A69918
                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A6992E
                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A69941
                            • SetCapture.USER32(?), ref: 00A6994A
                            • ClientToScreen.USER32(?,?), ref: 00A699AF
                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A699BC
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A699D6
                            • ReleaseCapture.USER32 ref: 00A699E1
                            • GetCursorPos.USER32(?), ref: 00A69A19
                            • ScreenToClient.USER32(?,?), ref: 00A69A26
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A69A80
                            • SendMessageW.USER32 ref: 00A69AAE
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A69AEB
                            • SendMessageW.USER32 ref: 00A69B1A
                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A69B3B
                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A69B4A
                            • GetCursorPos.USER32(?), ref: 00A69B68
                            • ScreenToClient.USER32(?,?), ref: 00A69B75
                            • GetParent.USER32(?), ref: 00A69B93
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A69BFA
                            • SendMessageW.USER32 ref: 00A69C2B
                            • ClientToScreen.USER32(?,?), ref: 00A69C84
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A69CB4
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A69CDE
                            • SendMessageW.USER32 ref: 00A69D01
                            • ClientToScreen.USER32(?,?), ref: 00A69D4E
                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A69D82
                              • Part of subcall function 009E9944: GetWindowLongW.USER32(?,000000EB), ref: 009E9952
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A69E05
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                            • String ID: @GUI_DRAGID$F
                            • API String ID: 3429851547-4164748364
                            • Opcode ID: a674ff33a5460529ecfeb6ca634b9e82d0a0fbb8d151f4ca96c55d403d5ebc46
                            • Instruction ID: abd45b1ab449af1052bf4d45470ecddcb71f3fa7f5e955116a5687ca24ba51fa
                            • Opcode Fuzzy Hash: a674ff33a5460529ecfeb6ca634b9e82d0a0fbb8d151f4ca96c55d403d5ebc46
                            • Instruction Fuzzy Hash: 86428C38204341AFDB25CF68CC84AABBBF9FF89320F144619F699872A1D771E855CB51
                            APIs
                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00A648F3
                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00A64908
                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00A64927
                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00A6494B
                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00A6495C
                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00A6497B
                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00A649AE
                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00A649D4
                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00A64A0F
                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A64A56
                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A64A7E
                            • IsMenu.USER32(?), ref: 00A64A97
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A64AF2
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A64B20
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A64B94
                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00A64BE3
                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00A64C82
                            • wsprintfW.USER32 ref: 00A64CAE
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A64CC9
                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00A64CF1
                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A64D13
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A64D33
                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00A64D5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                            • String ID: %d/%02d/%02d
                            • API String ID: 4054740463-328681919
                            • Opcode ID: 1040641871e2311fbcb6cd1b1021d886da499b75a1e8072cf766125cf4a45d0b
                            • Instruction ID: 72f585566fde3da8fc2413f4cbf96fc5e6cf3a7a213fb49bd4bf720535330c82
                            • Opcode Fuzzy Hash: 1040641871e2311fbcb6cd1b1021d886da499b75a1e8072cf766125cf4a45d0b
                            • Instruction Fuzzy Hash: 0F121171600254ABEB258F68DC49FBE7BF8EF89710F104129F516EB2E1DBB89941CB50
                            APIs
                            • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 009EF998
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A2F474
                            • IsIconic.USER32(00000000), ref: 00A2F47D
                            • ShowWindow.USER32(00000000,00000009), ref: 00A2F48A
                            • SetForegroundWindow.USER32(00000000), ref: 00A2F494
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A2F4AA
                            • GetCurrentThreadId.KERNEL32 ref: 00A2F4B1
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A2F4BD
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A2F4CE
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A2F4D6
                            • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00A2F4DE
                            • SetForegroundWindow.USER32(00000000), ref: 00A2F4E1
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2F4F6
                            • keybd_event.USER32(00000012,00000000), ref: 00A2F501
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2F50B
                            • keybd_event.USER32(00000012,00000000), ref: 00A2F510
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2F519
                            • keybd_event.USER32(00000012,00000000), ref: 00A2F51E
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2F528
                            • keybd_event.USER32(00000012,00000000), ref: 00A2F52D
                            • SetForegroundWindow.USER32(00000000), ref: 00A2F530
                            • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00A2F557
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                            • String ID: Shell_TrayWnd
                            • API String ID: 4125248594-2988720461
                            • Opcode ID: 87a071cc813898233bd11b30f61fd744e2e5323370b76bd4efd2c5caa0031b43
                            • Instruction ID: 3072843c02ebcd1c1fa09fbc13336ffb7ee0f1f1e6787690649137fc4a227961
                            • Opcode Fuzzy Hash: 87a071cc813898233bd11b30f61fd744e2e5323370b76bd4efd2c5caa0031b43
                            • Instruction Fuzzy Hash: 15313271A802287EEB216BF55C49FBF7E7CEB44B60F100076FA41E61D1C6F15D01AA61
                            APIs
                              • Part of subcall function 00A316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A3170D
                              • Part of subcall function 00A316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A3173A
                              • Part of subcall function 00A316C3: GetLastError.KERNEL32 ref: 00A3174A
                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00A31286
                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00A312A8
                            • CloseHandle.KERNEL32(?), ref: 00A312B9
                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A312D1
                            • GetProcessWindowStation.USER32 ref: 00A312EA
                            • SetProcessWindowStation.USER32(00000000), ref: 00A312F4
                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A31310
                              • Part of subcall function 00A310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A311FC), ref: 00A310D4
                              • Part of subcall function 00A310BF: CloseHandle.KERNEL32(?,?,00A311FC), ref: 00A310E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                            • String ID: $default$winsta0
                            • API String ID: 22674027-1027155976
                            • Opcode ID: f5bd9774022d7b4e22d1d8bd37e10db8119197c7b55275b779ce2795dbef6815
                            • Instruction ID: cd8a400e98ae05ca12512bdbd8d08a00369e99fe60bdae74376020d4f6aad5bb
                            • Opcode Fuzzy Hash: f5bd9774022d7b4e22d1d8bd37e10db8119197c7b55275b779ce2795dbef6815
                            • Instruction Fuzzy Hash: E78179B1A00349ABDF21DFA4DD4AFFE7BB9EF04714F144129FA11A61A0DB758945CB20
                            APIs
                              • Part of subcall function 00A310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A31114
                              • Part of subcall function 00A310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A31120
                              • Part of subcall function 00A310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A3112F
                              • Part of subcall function 00A310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A31136
                              • Part of subcall function 00A310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A3114D
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A30BCC
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A30C00
                            • GetLengthSid.ADVAPI32(?), ref: 00A30C17
                            • GetAce.ADVAPI32(?,00000000,?), ref: 00A30C51
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A30C6D
                            • GetLengthSid.ADVAPI32(?), ref: 00A30C84
                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A30C8C
                            • HeapAlloc.KERNEL32(00000000), ref: 00A30C93
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A30CB4
                            • CopySid.ADVAPI32(00000000), ref: 00A30CBB
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A30CEA
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A30D0C
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A30D1E
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A30D45
                            • HeapFree.KERNEL32(00000000), ref: 00A30D4C
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A30D55
                            • HeapFree.KERNEL32(00000000), ref: 00A30D5C
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A30D65
                            • HeapFree.KERNEL32(00000000), ref: 00A30D6C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00A30D78
                            • HeapFree.KERNEL32(00000000), ref: 00A30D7F
                              • Part of subcall function 00A31193: GetProcessHeap.KERNEL32(00000008,00A30BB1,?,00000000,?,00A30BB1,?), ref: 00A311A1
                              • Part of subcall function 00A31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A30BB1,?), ref: 00A311A8
                              • Part of subcall function 00A31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A30BB1,?), ref: 00A311B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 4175595110-0
                            • Opcode ID: 9e5a49a83e13a447ed2de7f57d92ba0868889a99bfd9494d84069a8193127123
                            • Instruction ID: 6a47c741e44db2ea6cf0791055a732211192bb96dc407cd6c26db5fc9f351033
                            • Opcode Fuzzy Hash: 9e5a49a83e13a447ed2de7f57d92ba0868889a99bfd9494d84069a8193127123
                            • Instruction Fuzzy Hash: 1B71687290021AABDF11DFE4DC48FAEBBB8BF05350F044655F954A6291D7B1AA06CBA0
                            APIs
                            • OpenClipboard.USER32(00A6CC08), ref: 00A4EB29
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A4EB37
                            • GetClipboardData.USER32(0000000D), ref: 00A4EB43
                            • CloseClipboard.USER32 ref: 00A4EB4F
                            • GlobalLock.KERNEL32(00000000), ref: 00A4EB87
                            • CloseClipboard.USER32 ref: 00A4EB91
                            • GlobalUnlock.KERNEL32(00000000), ref: 00A4EBBC
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00A4EBC9
                            • GetClipboardData.USER32(00000001), ref: 00A4EBD1
                            • GlobalLock.KERNEL32(00000000), ref: 00A4EBE2
                            • GlobalUnlock.KERNEL32(00000000), ref: 00A4EC22
                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 00A4EC38
                            • GetClipboardData.USER32(0000000F), ref: 00A4EC44
                            • GlobalLock.KERNEL32(00000000), ref: 00A4EC55
                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00A4EC77
                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A4EC94
                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A4ECD2
                            • GlobalUnlock.KERNEL32(00000000), ref: 00A4ECF3
                            • CountClipboardFormats.USER32 ref: 00A4ED14
                            • CloseClipboard.USER32 ref: 00A4ED59
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                            • String ID:
                            • API String ID: 420908878-0
                            • Opcode ID: bf7b78bc0d5a2301d3d07d1e34b2456c0be0b1e9d0a4c020eec80ecaafe7e736
                            • Instruction ID: d13c0d18fb06c55bcf3119fd1429e0a31f5decf27fea98709ad367b1b23d4f2e
                            • Opcode Fuzzy Hash: bf7b78bc0d5a2301d3d07d1e34b2456c0be0b1e9d0a4c020eec80ecaafe7e736
                            • Instruction Fuzzy Hash: 60618C39204201AFD300EF64D898F7AB7B4FF84754F14851AF896972A1CB71E946CBA2
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00A469BE
                            • FindClose.KERNEL32(00000000), ref: 00A46A12
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A46A4E
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A46A75
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A46AB2
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A46ADF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                            • API String ID: 3830820486-3289030164
                            • Opcode ID: 1c426ec32ac22affd516b2d4a92b83377802ae2cb3e1be24c2b16f7cfaae1f7a
                            • Instruction ID: 1902153ffd24bb848c4629cf1bd0418abd71dc2d2aac391a23d4ddf70e43d0b7
                            • Opcode Fuzzy Hash: 1c426ec32ac22affd516b2d4a92b83377802ae2cb3e1be24c2b16f7cfaae1f7a
                            • Instruction Fuzzy Hash: 36D161B1548340AEC710EBA4D891EABB7FCAFC8704F44891EF589D7291EB74DA04C762
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A49663
                            • GetFileAttributesW.KERNEL32(?), ref: 00A496A1
                            • SetFileAttributesW.KERNEL32(?,?), ref: 00A496BB
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00A496D3
                            • FindClose.KERNEL32(00000000), ref: 00A496DE
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00A496FA
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A4974A
                            • SetCurrentDirectoryW.KERNEL32(00A96B7C), ref: 00A49768
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A49772
                            • FindClose.KERNEL32(00000000), ref: 00A4977F
                            • FindClose.KERNEL32(00000000), ref: 00A4978F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                            • String ID: *.*
                            • API String ID: 1409584000-438819550
                            • Opcode ID: 95cafa10f51b3b3c53ec0fac79b493e32b1fe37855fbba6d1878995d0905594f
                            • Instruction ID: 89e92585832d8b8490bd288987ea55f0e828234935ab70498fc7717dda581fac
                            • Opcode Fuzzy Hash: 95cafa10f51b3b3c53ec0fac79b493e32b1fe37855fbba6d1878995d0905594f
                            • Instruction Fuzzy Hash: 9431BC366406197ADB10EFB4DC08AEF77BCAF89330F104166E965E21A0EB70DE518B24
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A497BE
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00A49819
                            • FindClose.KERNEL32(00000000), ref: 00A49824
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00A49840
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A49890
                            • SetCurrentDirectoryW.KERNEL32(00A96B7C), ref: 00A498AE
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A498B8
                            • FindClose.KERNEL32(00000000), ref: 00A498C5
                            • FindClose.KERNEL32(00000000), ref: 00A498D5
                              • Part of subcall function 00A3DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A3DB00
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                            • String ID: *.*
                            • API String ID: 2640511053-438819550
                            • Opcode ID: 5276d7608d7dc38ec7369a09d469cc7a5f69f21a2996b7395b8f653d36863760
                            • Instruction ID: 86dcc4c8df2d2e5816a98d79c8a6638b0cf48f6e811db8ac858a53ae6b8c61b0
                            • Opcode Fuzzy Hash: 5276d7608d7dc38ec7369a09d469cc7a5f69f21a2996b7395b8f653d36863760
                            • Instruction Fuzzy Hash: EB31C336640619BEDF10EFB8EC48AEF77BCAF86330F104556F964A2190EB70D9558B60
                            APIs
                              • Part of subcall function 00A5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5B6AE,?,?), ref: 00A5C9B5
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5C9F1
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA68
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5BF3E
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00A5BFA9
                            • RegCloseKey.ADVAPI32(00000000), ref: 00A5BFCD
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A5C02C
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A5C0E7
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00A5C154
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00A5C1E9
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00A5C23A
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00A5C2E3
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A5C382
                            • RegCloseKey.ADVAPI32(00000000), ref: 00A5C38F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                            • String ID:
                            • API String ID: 3102970594-0
                            • Opcode ID: b33f69ed83d45cb53bda5f5743f84ab395406a0eb1af45b8ae03b085f2cbeae9
                            • Instruction ID: 422e5166806356c4db10e6e157138da6b4563aa6e3329acd9773a7aecd527f56
                            • Opcode Fuzzy Hash: b33f69ed83d45cb53bda5f5743f84ab395406a0eb1af45b8ae03b085f2cbeae9
                            • Instruction Fuzzy Hash: 0B023B71604200AFD714DF28C895E2ABBE5BF89328F18C49DF84ADB2A6D731ED45CB51
                            APIs
                            • GetLocalTime.KERNEL32(?), ref: 00A48257
                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A48267
                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A48273
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A48310
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A48324
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A48356
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A4838C
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A48395
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CurrentDirectoryTime$File$Local$System
                            • String ID: *.*
                            • API String ID: 1464919966-438819550
                            • Opcode ID: 9e6f7d4d51f2554819e2f720da826dbd46ecce17a2dabc92d03efbbdec2c4b1b
                            • Instruction ID: decd8dfdf918bd09bae5830721474d39467b989af18fceb44e02528be28c0f30
                            • Opcode Fuzzy Hash: 9e6f7d4d51f2554819e2f720da826dbd46ecce17a2dabc92d03efbbdec2c4b1b
                            • Instruction Fuzzy Hash: 066168B65043059FCB10EF64D840AAEB3E8FFC9314F04891EF99997251EB35E945CB92
                            APIs
                              • Part of subcall function 009D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D3A97,?,?,009D2E7F,?,?,?,00000000), ref: 009D3AC2
                              • Part of subcall function 00A3E199: GetFileAttributesW.KERNEL32(?,00A3CF95), ref: 00A3E19A
                            • FindFirstFileW.KERNEL32(?,?), ref: 00A3D122
                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00A3D1DD
                            • MoveFileW.KERNEL32(?,?), ref: 00A3D1F0
                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A3D20D
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A3D237
                              • Part of subcall function 00A3D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00A3D21C,?,?), ref: 00A3D2B2
                            • FindClose.KERNEL32(00000000,?,?,?), ref: 00A3D253
                            • FindClose.KERNEL32(00000000), ref: 00A3D264
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                            • String ID: \*.*
                            • API String ID: 1946585618-1173974218
                            • Opcode ID: 014e2070cfd360be76b7afc60f56f540719473dc9d52b82b054c5026e8507f2b
                            • Instruction ID: 28ee68be3f1dd61557f17c78ab35086cd04fa8f509820964653d54dd7c57e3f8
                            • Opcode Fuzzy Hash: 014e2070cfd360be76b7afc60f56f540719473dc9d52b82b054c5026e8507f2b
                            • Instruction Fuzzy Hash: DD615C3194110DAFCF05EBE0EA92AEEB7B5AF55340F248166F40277291EB306F09DB61
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                            • String ID:
                            • API String ID: 1737998785-0
                            • Opcode ID: 3576c0861ee07f786802d8ebd3cf77345e1f934aead2c35efbd6b9ed3e727930
                            • Instruction ID: 540d16195b8ffed3812d13a827f0c798725ff2def8ffdef98eac39555e67f964
                            • Opcode Fuzzy Hash: 3576c0861ee07f786802d8ebd3cf77345e1f934aead2c35efbd6b9ed3e727930
                            • Instruction Fuzzy Hash: 8041CE39604611AFD710DF55D889B69BBF5FF84328F14C099E4558B762C7B1EC42CB90
                            APIs
                              • Part of subcall function 00A316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A3170D
                              • Part of subcall function 00A316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A3173A
                              • Part of subcall function 00A316C3: GetLastError.KERNEL32 ref: 00A3174A
                            • ExitWindowsEx.USER32(?,00000000), ref: 00A3E932
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                            • String ID: $ $@$SeShutdownPrivilege
                            • API String ID: 2234035333-3163812486
                            • Opcode ID: 7df19a9498c4459b8651ecee57aefe56dc248fe9dfc791eebc24d06c79cd79a6
                            • Instruction ID: 6a17bdd55564dfbcac9dbed6f628282bc1d9ee9c9d2445538296b5d0e1963101
                            • Opcode Fuzzy Hash: 7df19a9498c4459b8651ecee57aefe56dc248fe9dfc791eebc24d06c79cd79a6
                            • Instruction Fuzzy Hash: 9001F972710211ABEB54A7F49C86FBFB27CAB14760F154822FC13F21D1D6A05C408390
                            APIs
                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A51276
                            • WSAGetLastError.WSOCK32 ref: 00A51283
                            • bind.WSOCK32(00000000,?,00000010), ref: 00A512BA
                            • WSAGetLastError.WSOCK32 ref: 00A512C5
                            • closesocket.WSOCK32(00000000), ref: 00A512F4
                            • listen.WSOCK32(00000000,00000005), ref: 00A51303
                            • WSAGetLastError.WSOCK32 ref: 00A5130D
                            • closesocket.WSOCK32(00000000), ref: 00A5133C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$closesocket$bindlistensocket
                            • String ID:
                            • API String ID: 540024437-0
                            • Opcode ID: e03a50d01676033f4baf036f2f81df4163b051de8f55232ed240c63b36e154bd
                            • Instruction ID: 372900b59660c5fe5b2152510e7f5f6398c8168607510c38dd4c7d4c1b6a8ac0
                            • Opcode Fuzzy Hash: e03a50d01676033f4baf036f2f81df4163b051de8f55232ed240c63b36e154bd
                            • Instruction Fuzzy Hash: 35418E316001019FD720DF64D488B79BBF5BF86329F188199E8569F292C775EC86CBE1
                            APIs
                              • Part of subcall function 009D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D3A97,?,?,009D2E7F,?,?,?,00000000), ref: 009D3AC2
                              • Part of subcall function 00A3E199: GetFileAttributesW.KERNEL32(?,00A3CF95), ref: 00A3E19A
                            • FindFirstFileW.KERNEL32(?,?), ref: 00A3D420
                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A3D470
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A3D481
                            • FindClose.KERNEL32(00000000), ref: 00A3D498
                            • FindClose.KERNEL32(00000000), ref: 00A3D4A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                            • String ID: \*.*
                            • API String ID: 2649000838-1173974218
                            • Opcode ID: 5d663cb7bebfea67c5b5594f93925a6d431d94bff878b6b0bceac773c0a78cbe
                            • Instruction ID: 301e2000519f4674f60a675fa9f4021d0ec62eed34c61e16bf693a96c84a4af8
                            • Opcode Fuzzy Hash: 5d663cb7bebfea67c5b5594f93925a6d431d94bff878b6b0bceac773c0a78cbe
                            • Instruction Fuzzy Hash: 9B317E71048341AFC301EF64D8919AFB7E8AED1354F448A1EF4E193291EB30AA19D763
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: __floor_pentium4
                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                            • API String ID: 4168288129-2761157908
                            • Opcode ID: bb0bbe6fff637cf80073ee6ee6be80e714b0d567cf3ae3fd7904208fa6062baa
                            • Instruction ID: f6bfb6013dc298ceda7aaa6d9c44f7590a876f0c47ba68ea300d73a4b5c3f363
                            • Opcode Fuzzy Hash: bb0bbe6fff637cf80073ee6ee6be80e714b0d567cf3ae3fd7904208fa6062baa
                            • Instruction Fuzzy Hash: 7FC22971E0462C8FDB25CF28AD407EAB7B5EB88305F1445EAD84DE7280E775AE859F40
                            APIs
                            • _wcslen.LIBCMT ref: 00A464DC
                            • CoInitialize.OLE32(00000000), ref: 00A46639
                            • CoCreateInstance.OLE32(00A6FCF8,00000000,00000001,00A6FB68,?), ref: 00A46650
                            • CoUninitialize.OLE32 ref: 00A468D4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 886957087-24824748
                            • Opcode ID: ceb1bd05d5400c0f1a566edb14331e321a92196010211c79f7d2f6c8e4e5e65e
                            • Instruction ID: f47e5c51f72d7c789c499f3ca73de42c978228e6b8b37354d7ae9ac23663c757
                            • Opcode Fuzzy Hash: ceb1bd05d5400c0f1a566edb14331e321a92196010211c79f7d2f6c8e4e5e65e
                            • Instruction Fuzzy Hash: 87D14971648201AFC314EF24C881A6BB7E8FFD5704F50896DF5958B2A1EB70ED05CB92
                            APIs
                            • GetForegroundWindow.USER32(?,?,00000000), ref: 00A522E8
                              • Part of subcall function 00A4E4EC: GetWindowRect.USER32(?,?), ref: 00A4E504
                            • GetDesktopWindow.USER32 ref: 00A52312
                            • GetWindowRect.USER32(00000000), ref: 00A52319
                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00A52355
                            • GetCursorPos.USER32(?), ref: 00A52381
                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A523DF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                            • String ID:
                            • API String ID: 2387181109-0
                            • Opcode ID: 2c6367c50a846f6963faba7ef481988efa0982f71066ce012b8a77d13a9c970f
                            • Instruction ID: bbf96574775c64bdb2b9806ff7b72f0e536ed3883a531a7833d73cc2c09bcf78
                            • Opcode Fuzzy Hash: 2c6367c50a846f6963faba7ef481988efa0982f71066ce012b8a77d13a9c970f
                            • Instruction Fuzzy Hash: E331E072504315AFC720DF54CC49B6BBBA9FF85724F000919F9859B191DB74EA09CB92
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00A49B78
                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00A49C8B
                              • Part of subcall function 00A43874: GetInputState.USER32 ref: 00A438CB
                              • Part of subcall function 00A43874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A43966
                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00A49BA8
                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00A49C75
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                            • String ID: *.*
                            • API String ID: 1972594611-438819550
                            • Opcode ID: 53f3ee0d42bf8c74c87b7362a252c74514486925108377b71b419f0bc6b730e7
                            • Instruction ID: ff940831b8860eb9b4024b5eebfdfaebc8b31cb8944e1dda47ef5c3c3e4a8fae
                            • Opcode Fuzzy Hash: 53f3ee0d42bf8c74c87b7362a252c74514486925108377b71b419f0bc6b730e7
                            • Instruction Fuzzy Hash: 0B41927594020AAFCF14EFA4C985AEFBBB4FF85311F208156E815A2291EB309E55CF61
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 009E9A4E
                            • GetSysColor.USER32(0000000F), ref: 009E9B23
                            • SetBkColor.GDI32(?,00000000), ref: 009E9B36
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Color$LongProcWindow
                            • String ID:
                            • API String ID: 3131106179-0
                            • Opcode ID: 524a78ba2cca70f688b09dc967f9ad12fed27e7ea84d7090f2e4f6238da4db74
                            • Instruction ID: 8093d3242986c269a7530f3659a00e87755fd13160b617d6c32a2f0cf69f0341
                            • Opcode Fuzzy Hash: 524a78ba2cca70f688b09dc967f9ad12fed27e7ea84d7090f2e4f6238da4db74
                            • Instruction Fuzzy Hash: 54A119701085A4BEE72ADB3E9C58E7F266DDF86344F140629F502DA6D1CB29DE01D272
                            APIs
                              • Part of subcall function 00A5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A5307A
                              • Part of subcall function 00A5304E: _wcslen.LIBCMT ref: 00A5309B
                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A5185D
                            • WSAGetLastError.WSOCK32 ref: 00A51884
                            • bind.WSOCK32(00000000,?,00000010), ref: 00A518DB
                            • WSAGetLastError.WSOCK32 ref: 00A518E6
                            • closesocket.WSOCK32(00000000), ref: 00A51915
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 1601658205-0
                            • Opcode ID: d46672189a63c461e6feb08e43f0d27c295e2e3d3723c2b004dab48205e2dfa9
                            • Instruction ID: 4f4a797983c42be8199f7cb9d3698d432e9861383325f90e8e378e3a049fa052
                            • Opcode Fuzzy Hash: d46672189a63c461e6feb08e43f0d27c295e2e3d3723c2b004dab48205e2dfa9
                            • Instruction Fuzzy Hash: D351A071A40200AFDB20AF64C886F7AB7E5AB84718F088459F945AF3D3D671AD41CBA1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                            • String ID:
                            • API String ID: 292994002-0
                            • Opcode ID: 35a14bb57fe8b21e739b23ef07f24412f5ad18c536438959a0abc025f7f81f03
                            • Instruction ID: 6d2607f7270b3c6e10fc19d6f1e4d78019bfbb66c9ac0da7555e5a426b1f400b
                            • Opcode Fuzzy Hash: 35a14bb57fe8b21e739b23ef07f24412f5ad18c536438959a0abc025f7f81f03
                            • Instruction Fuzzy Hash: 4621A1317806119FD7209F2AC884B6A7FF5EF95325B1D8469E886CB351DBB1EC42CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                            • API String ID: 0-1546025612
                            • Opcode ID: 25bd19452b70e6ebfffe43b0a566b9a272e3f5babf3258f575880e92c2e03d0c
                            • Instruction ID: 43216bce54cef42f4f17424bb68abdf796fe05fb2fdcfcf0a8b3893aed4cf438
                            • Opcode Fuzzy Hash: 25bd19452b70e6ebfffe43b0a566b9a272e3f5babf3258f575880e92c2e03d0c
                            • Instruction Fuzzy Hash: DFA26D71E4061ACBDF24CF58C9407EEB7B1BB94310F2485AAE815AB385EB749DC1CB90
                            APIs
                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00A3AAAC
                            • SetKeyboardState.USER32(00000080), ref: 00A3AAC8
                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00A3AB36
                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00A3AB88
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: 84c246fa94fcfd7a689b29011e945d7e8a1e6037227fa735770081620cb9b766
                            • Instruction ID: 017d621bb410f30e83962d6194a31aa5d6ba2dad04c81a1b7edeaec269bb104c
                            • Opcode Fuzzy Hash: 84c246fa94fcfd7a689b29011e945d7e8a1e6037227fa735770081620cb9b766
                            • Instruction Fuzzy Hash: 15310531A40268AEEB35CF64CC05BFABBBAAB64320F04421AF1D1961D1D3748D81C763
                            APIs
                            • _free.LIBCMT ref: 00A0BB7F
                              • Part of subcall function 00A029C8: HeapFree.KERNEL32(00000000,00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000), ref: 00A029DE
                              • Part of subcall function 00A029C8: GetLastError.KERNEL32(00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000,00000000), ref: 00A029F0
                            • GetTimeZoneInformation.KERNEL32 ref: 00A0BB91
                            • WideCharToMultiByte.KERNEL32(00000000,?,00AA121C,000000FF,?,0000003F,?,?), ref: 00A0BC09
                            • WideCharToMultiByte.KERNEL32(00000000,?,00AA1270,000000FF,?,0000003F,?,?,?,00AA121C,000000FF,?,0000003F,?,?), ref: 00A0BC36
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                            • String ID:
                            • API String ID: 806657224-0
                            • Opcode ID: b0b171425f845c5b9c94ae36b153106ff9a3f8ee514c6aa8584e04eddcf9907b
                            • Instruction ID: 0cc532727294b835aa8037af37707591bb0851808e335f7ea6ff8151795213e0
                            • Opcode Fuzzy Hash: b0b171425f845c5b9c94ae36b153106ff9a3f8ee514c6aa8584e04eddcf9907b
                            • Instruction Fuzzy Hash: F631D27090424AEFCB11DFA8ED80AB9BBB8FF46750B14466AE060DB2E1D7309D45CB60
                            APIs
                            • InternetReadFile.WININET(?,?,00000400,?), ref: 00A4CE89
                            • GetLastError.KERNEL32(?,00000000), ref: 00A4CEEA
                            • SetEvent.KERNEL32(?,?,00000000), ref: 00A4CEFE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorEventFileInternetLastRead
                            • String ID:
                            • API String ID: 234945975-0
                            • Opcode ID: 1990c420d8341941b6328541eed5c725f7629fdf1881dd4f7f1527a3f0e4d1b6
                            • Instruction ID: 7fd5cbf3a1a30f4d70fc9982c011d4134d7ee88c18b36116420cea8932b337a4
                            • Opcode Fuzzy Hash: 1990c420d8341941b6328541eed5c725f7629fdf1881dd4f7f1527a3f0e4d1b6
                            • Instruction Fuzzy Hash: 4A21CFB5501305ABDB60DFA5C949BA7B7FCEF80364F10442EE64AD2151E774EE098B50
                            APIs
                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A382AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: ($|
                            • API String ID: 1659193697-1631851259
                            • Opcode ID: 77762756bc2c87998ad205022a11db5438c5d1b59d81b43bc179761440ed31f6
                            • Instruction ID: 9aad9a2012bafa93c2f1fe4ac379c9245f079b48b390a9e6f9d40e58fb1bb770
                            • Opcode Fuzzy Hash: 77762756bc2c87998ad205022a11db5438c5d1b59d81b43bc179761440ed31f6
                            • Instruction Fuzzy Hash: 21323475A007059FCB28CF69C481AAAB7F0FF48710B15856EE49ADB3A1EB74E941CB40
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00A45CC1
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00A45D17
                            • FindClose.KERNEL32(?), ref: 00A45D5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstNext
                            • String ID:
                            • API String ID: 3541575487-0
                            • Opcode ID: 8cfa7e81f26c46eb681bec1109d5d71893c06a37b86f664b19b6c806c97478ff
                            • Instruction ID: 4889db78dbb70858afe36a9c572e3aa66c361f2bf2a60260d6afcd36b560bb65
                            • Opcode Fuzzy Hash: 8cfa7e81f26c46eb681bec1109d5d71893c06a37b86f664b19b6c806c97478ff
                            • Instruction Fuzzy Hash: E3517E78A046019FC714DF28C494E96B7E4FF89324F14855EE99A8B3A2DB30ED45CF91
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 00A0271A
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00A02724
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00A02731
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: 5dcbc62589d6fd1931d59d2ab1d348e30a1f67283c51c0215f320b86388d64c0
                            • Instruction ID: a66cde748c51c9d1ff895cf4582a717ce14f79b5d6079cc9763cdf558c3fadd7
                            • Opcode Fuzzy Hash: 5dcbc62589d6fd1931d59d2ab1d348e30a1f67283c51c0215f320b86388d64c0
                            • Instruction Fuzzy Hash: 5931C27491131CABCB21DF68DD89798BBB8BF48310F5041EAE90CA72A1E7709F818F44
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00A451DA
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A45238
                            • SetErrorMode.KERNEL32(00000000), ref: 00A452A1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID:
                            • API String ID: 1682464887-0
                            • Opcode ID: 22dbc450c5f84da60773cf76746802bc273f66b9d26437588f1e986054cb226c
                            • Instruction ID: 41953e7e6e6a39e1032d8e1225b8be20c55ac6b09d646f72f3ade1a7568b3ed6
                            • Opcode Fuzzy Hash: 22dbc450c5f84da60773cf76746802bc273f66b9d26437588f1e986054cb226c
                            • Instruction Fuzzy Hash: 0F314B75A00518DFDB00DFA4D884EEDBBB4FF49314F04809AE845AB362DB71E856CB90
                            APIs
                              • Part of subcall function 009EFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 009F0668
                              • Part of subcall function 009EFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 009F0685
                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A3170D
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A3173A
                            • GetLastError.KERNEL32 ref: 00A3174A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                            • String ID:
                            • API String ID: 577356006-0
                            • Opcode ID: d9022129e1f831abb6cbfca2506732074d03a10cfa85152750775277b6e3fdfe
                            • Instruction ID: cb6b7b082b429d6339df1c847ce313c2a216f8d9b22129c6bdf32b57d35fcbc7
                            • Opcode Fuzzy Hash: d9022129e1f831abb6cbfca2506732074d03a10cfa85152750775277b6e3fdfe
                            • Instruction Fuzzy Hash: CF11C1B2404305AFD718EF54EC86E6ABBBDEB44764B24852EF05657681EB70BC428A60
                            APIs
                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A3D608
                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00A3D645
                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A3D650
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseControlCreateDeviceFileHandle
                            • String ID:
                            • API String ID: 33631002-0
                            • Opcode ID: 792d85a4b1b068c669c3110c91d3c1c404a51fb1a1632f0149ea5444af62a0ee
                            • Instruction ID: 29adb7736e4f5855a0e9871849ac912109c38f0dd8f14159189ad39c29b93b3f
                            • Opcode Fuzzy Hash: 792d85a4b1b068c669c3110c91d3c1c404a51fb1a1632f0149ea5444af62a0ee
                            • Instruction Fuzzy Hash: 4F115E75E05228BFDB10CFA5EC45FAFBBBCEB45B60F108115F914E7290D6B05A058BA1
                            APIs
                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A3168C
                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A316A1
                            • FreeSid.ADVAPI32(?), ref: 00A316B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AllocateCheckFreeInitializeMembershipToken
                            • String ID:
                            • API String ID: 3429775523-0
                            • Opcode ID: 0c319d59c3379eb6b4132eb8b1b2334015bcef1a8ae6c07f86f61aaf0fe640c0
                            • Instruction ID: b4804313222cb2dcd1a39dc7b3178e22a0267360d2ca25df2738273a40eb4d02
                            • Opcode Fuzzy Hash: 0c319d59c3379eb6b4132eb8b1b2334015bcef1a8ae6c07f86f61aaf0fe640c0
                            • Instruction Fuzzy Hash: B2F0F471950309FBDB00DFE49D89AAEBBBCEB08614F504565E601E2181E774AA448A50
                            APIs
                            • GetCurrentProcess.KERNEL32(00A028E9,?,009F4CBE,00A028E9,00A988B8,0000000C,009F4E15,00A028E9,00000002,00000000,?,00A028E9), ref: 009F4D09
                            • TerminateProcess.KERNEL32(00000000,?,009F4CBE,00A028E9,00A988B8,0000000C,009F4E15,00A028E9,00000002,00000000,?,00A028E9), ref: 009F4D10
                            • ExitProcess.KERNEL32 ref: 009F4D22
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: 9ad3a99d4da82b4fe53ef0715dc53132735081190d59dace118e27146f4657ca
                            • Instruction ID: 9fdd69071627b18cd7ffb96544f059436ccd9f06d938c8c50e766f2caed100d0
                            • Opcode Fuzzy Hash: 9ad3a99d4da82b4fe53ef0715dc53132735081190d59dace118e27146f4657ca
                            • Instruction Fuzzy Hash: 67E0B63100014CABDF11AF94DE09A6A7F7DEB85795F104014FD598A262DB75ED42CB80
                            APIs
                            • GetUserNameW.ADVAPI32(?,?), ref: 00A2D28C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID: X64
                            • API String ID: 2645101109-893830106
                            • Opcode ID: 68ec076f855a5768a883301668cd0e632f0bdd3fe25e95639691c576149bb783
                            • Instruction ID: 606a7f7a5a358e06c06b70143f6a135d45633d7073a2631fc48bef7f3255120e
                            • Opcode Fuzzy Hash: 68ec076f855a5768a883301668cd0e632f0bdd3fe25e95639691c576149bb783
                            • Instruction Fuzzy Hash: D1D0C9B480112DEACB95CB90EC88DD9B37CBB04306F100551F106A2000D77495498F20
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                            • Instruction ID: d7531909c508c1026b52dfd409a0dbb02259e4a3be363b2109791a9c4caf14c3
                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                            • Instruction Fuzzy Hash: 03020AB1E0021D9BDF14CFA9C9806ADFBB5EF88314F25856AD919E7380D731AE418B94
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00A46918
                            • FindClose.KERNEL32(00000000), ref: 00A46961
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: a73cbaf4f3a169e3d4267de3a22e35c3074d4b6b3ea70143a009f8876ed2a7c0
                            • Instruction ID: 3e4e7e966f36d0fdc1efb9ceeaf76820a97f2f431ba0c0d9e91666096be405f0
                            • Opcode Fuzzy Hash: a73cbaf4f3a169e3d4267de3a22e35c3074d4b6b3ea70143a009f8876ed2a7c0
                            • Instruction Fuzzy Hash: 2C1190756042019FC710DF69D484A26BBE5FF85328F14C69AF8698F3A2D770EC05CB91
                            APIs
                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00A54891,?,?,00000035,?), ref: 00A437E4
                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00A54891,?,?,00000035,?), ref: 00A437F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorFormatLastMessage
                            • String ID:
                            • API String ID: 3479602957-0
                            • Opcode ID: d4e77e90c43671ba0f29a1e97fef9c6c73d81bc60c7bfe30ba2386b4649a510e
                            • Instruction ID: f49982b552f517e2d68b4df0bdc68a84eef8186c7ea5bd21ab07ded331a0ce7b
                            • Opcode Fuzzy Hash: d4e77e90c43671ba0f29a1e97fef9c6c73d81bc60c7bfe30ba2386b4649a510e
                            • Instruction Fuzzy Hash: 8DF055B16002282AEB60A3B68C4DFEB3AAEEFC4770F000122F509D2280C9A08904C6B0
                            APIs
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00A3B25D
                            • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00A3B270
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: InputSendkeybd_event
                            • String ID:
                            • API String ID: 3536248340-0
                            • Opcode ID: 40508798b1446898c4ce9fa9d7d63e31886f7638596f78aa4b1f9f46df4369d3
                            • Instruction ID: 642e97b2d93f2fb2afc97ad9d535311ba4ebb396cd866d669b22dfe9c39d864c
                            • Opcode Fuzzy Hash: 40508798b1446898c4ce9fa9d7d63e31886f7638596f78aa4b1f9f46df4369d3
                            • Instruction Fuzzy Hash: B6F01D7181428DABDB05DFA1C806BFE7BB4FF04319F00800AFA65A5192C7B986119FA4
                            APIs
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A311FC), ref: 00A310D4
                            • CloseHandle.KERNEL32(?,?,00A311FC), ref: 00A310E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AdjustCloseHandlePrivilegesToken
                            • String ID:
                            • API String ID: 81990902-0
                            • Opcode ID: 682f06aed5a4557a3667388391e4c8f1454efafd3b966c990ff452ba218a008b
                            • Instruction ID: a719ac8639c49d3b8df54f887d1a2a0ea72f8a43b579d69ae56b003fb581c8e5
                            • Opcode Fuzzy Hash: 682f06aed5a4557a3667388391e4c8f1454efafd3b966c990ff452ba218a008b
                            • Instruction Fuzzy Hash: DFE0BF72018651AEE7266B52FC05F777BA9EB04320F14882EF5A5844B1DBA26C91DB50
                            Strings
                            • Variable is not of type 'Object'., xrefs: 00A20C40
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: Variable is not of type 'Object'.
                            • API String ID: 0-1840281001
                            • Opcode ID: 9291e707ead179c224fd058c03346183a48012b56a2a583895b4c6393642dc1a
                            • Instruction ID: 089576bb2ccf7a8b5731a8ede96dca9130fd53eca6dfe93c6ea38c5daf733e5b
                            • Opcode Fuzzy Hash: 9291e707ead179c224fd058c03346183a48012b56a2a583895b4c6393642dc1a
                            • Instruction Fuzzy Hash: 0D329BB4940219DBCF14DF98D980BEDB7B9FF45304F20846AE806AB392D775AE45CB60
                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A06766,?,?,00000008,?,?,00A0FEFE,00000000), ref: 00A06998
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: 54645a5869ad040f42aba20d1b288d358d976105a5f4a7251b69a2e3e330a91a
                            • Instruction ID: cb951d06e5b863583457103677bdbb0613b9084e6e37c07987e6c6ef23e35b41
                            • Opcode Fuzzy Hash: 54645a5869ad040f42aba20d1b288d358d976105a5f4a7251b69a2e3e330a91a
                            • Instruction Fuzzy Hash: 05B116316106099FD719CF28D48AB657BE0FF45368F29C658E899CF2E2C335E9A5CB40
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: b8543acf7ed1f87a85329bdb2ffc69a1e8003cac59b7c417ae172ed8e324a562
                            • Instruction ID: 748d6557a36813e546b8bf79a58f250d6583a58179d2a30376089451997f281f
                            • Opcode Fuzzy Hash: b8543acf7ed1f87a85329bdb2ffc69a1e8003cac59b7c417ae172ed8e324a562
                            • Instruction Fuzzy Hash: 06127D719012299FCB25CF59D8816EEB7F5FF48710F1081AAE849EB255EB349E81CF90
                            APIs
                            • BlockInput.USER32(00000001), ref: 00A4EABD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: BlockInput
                            • String ID:
                            • API String ID: 3456056419-0
                            • Opcode ID: 15d96cd31127404eeb97d1841b9f89025ae3d7fe7fe3baf7baf1615a3837267a
                            • Instruction ID: a63404b70badcf75d69e3fcf27ae3c4cdfd34074be349d6296d056a1f699c212
                            • Opcode Fuzzy Hash: 15d96cd31127404eeb97d1841b9f89025ae3d7fe7fe3baf7baf1615a3837267a
                            • Instruction Fuzzy Hash: BEE01A352002059FC710EF59D804E9AB7E9BF987A1F008426FD49D7361DAB0A8418B90
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,009F03EE), ref: 009F09DA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: cc1b104cbf0bb6e40883acf9f7543933b4882cc3439e1ef28ba0a7443b1e8edb
                            • Instruction ID: 57cc2ae823d6d51c8614b6e55260bba2e279cc887d5d852d9c247c06a23f6f86
                            • Opcode Fuzzy Hash: cc1b104cbf0bb6e40883acf9f7543933b4882cc3439e1ef28ba0a7443b1e8edb
                            • Instruction Fuzzy Hash:
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                            • Instruction ID: 8ce1ac0f8c7de15b6e37762d0829a3980e10feb96bfe78ea636b006c1df8b4e1
                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                            • Instruction Fuzzy Hash: 32518B7160C70D6BDF3889E888DD7BFE79D9B52384F180909DB82C7282C655DE82D352
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ede86e366b8aced7b4d0f350f45053ae1d66da1b7b6bda3d7e3a5f070ab36c56
                            • Instruction ID: 1abc0a6509fdfaa1ec49dc3ff5116b55add24d2db83180ae529e28c89071f584
                            • Opcode Fuzzy Hash: ede86e366b8aced7b4d0f350f45053ae1d66da1b7b6bda3d7e3a5f070ab36c56
                            • Instruction Fuzzy Hash: D3322422D29F054DD7239634EC22339A689AFB73C5F15D737E81AB59A6EB39D4C34200
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a74d0e8fa8a54fed19c65f24cf578b41461e42e37b1a77db44d39debf0f88541
                            • Instruction ID: f5cab4f3078a07f04082c48476eb2cc19a8be7005c44c293b823d39e005301f4
                            • Opcode Fuzzy Hash: a74d0e8fa8a54fed19c65f24cf578b41461e42e37b1a77db44d39debf0f88541
                            • Instruction Fuzzy Hash: A1322872A001A58BDF29CF2DE490A7D77B2EF45360F388576E4C99B291D234DD82DB40
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4d6fd49a5f8537a0825f26d0e043ad409c7e4c1bf780f7ce12dfef7e654c2311
                            • Instruction ID: 89cdb95be2dc24848988462f8ab8b50a87bd801dc52464052cabd0e2dc3dac11
                            • Opcode Fuzzy Hash: 4d6fd49a5f8537a0825f26d0e043ad409c7e4c1bf780f7ce12dfef7e654c2311
                            • Instruction Fuzzy Hash: 78228F70E04609DFDF14CFA5D941AEEB7B6FF84300F14852AE816AB291EB399D51CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 502a646738ab1881323bb0a0bd06deb01e881e7f88f9eb04e76b67e96210454a
                            • Instruction ID: 5378150c8dfc1caad9a9801410dc5905bc04ed28895b8bf5e1d76a637a6a9a35
                            • Opcode Fuzzy Hash: 502a646738ab1881323bb0a0bd06deb01e881e7f88f9eb04e76b67e96210454a
                            • Instruction Fuzzy Hash: 3F02A4B1E00209EBDB05DF55D881BAEB7B5FF44340F10816AE8169B391EB35AE61CBD1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 27bd4d3db0404342607060dbbe40ba3b542480a0ec135e292f9dac27746fa685
                            • Instruction ID: c38c9135f20a37a2d82cc976c002461ffbff922ab0951f788c8d09a31c1c6c8a
                            • Opcode Fuzzy Hash: 27bd4d3db0404342607060dbbe40ba3b542480a0ec135e292f9dac27746fa685
                            • Instruction Fuzzy Hash: A5B1F221D2AF414DC62396398C31336B65CAFBB6D5F92D31BFC2A78D62EB2285C35141
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                            • Instruction ID: 3671b91a7183bafecde63bdef0eca62aa389d7f736089a33c97449b5ac2bccef
                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                            • Instruction Fuzzy Hash: 4E9186726080A78ADB2D463E857403EFFF55A923B131A0B9ED5F2CA1C5FE24C954D7A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                            • Instruction ID: e1bb2978ce5b1b24c7c26f2908e55a07ad6c321a2d9e2b0e6bd126e29d610233
                            • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                            • Instruction Fuzzy Hash: 6E91547320D0A74ADB29433A857413EFFE59A923B131E079ED6F2CB1C5EE248564E760
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                            • Instruction ID: 051e533bed8ac7e1f0c6f54b86c300cfcd76fa9951f99461dc53ce15c036c1bc
                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                            • Instruction Fuzzy Hash: C891B3322090E7CADB2D427A847403EFFE55A923B231A079ED5F2CA1C5FE24C564D7A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3bb468fadbdba21fd780c4f361b68b1426f805675ebed094ec2a2672376af0eb
                            • Instruction ID: 9560952bcdbd153b7f8b306c6ab6f05b58c01dcc18d6ade50d509762ed552328
                            • Opcode Fuzzy Hash: 3bb468fadbdba21fd780c4f361b68b1426f805675ebed094ec2a2672376af0eb
                            • Instruction Fuzzy Hash: 6961573120870D96EA349AEC8C95BBFE39CDF82711F100D1AEB82DB281DA55DE42C315
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e17a26b97b6300b52376bd9307696e9a4cc293dfd33e63d8ad7e8daf5000604f
                            • Instruction ID: 01a5d74bd978aac1544f33e155074ff8d4762173e84daf9050a6f03d44673c91
                            • Opcode Fuzzy Hash: e17a26b97b6300b52376bd9307696e9a4cc293dfd33e63d8ad7e8daf5000604f
                            • Instruction Fuzzy Hash: 9D618A3160870D67DE384AE85895BBFE38DEF82704FA00D5AEB42CB2D1DA56DD42C315
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                            • Instruction ID: 366e9d02b70b22214f67eb16e683007ca79cf5ba59c08333091cd32086f3f44b
                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                            • Instruction Fuzzy Hash: 5B8186326080E78ADB2D827A853407EFFE55A923B131A079ED5F6CB1C1EE24D554E7A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11349d656394f9e7e25e73b528ebc04a6fc055a65f757aa3f9beeb581d074d18
                            • Instruction ID: 4c3425b3ee1859e88e9d2f88122886608663ac85cffe3c83d0a974040d91b83b
                            • Opcode Fuzzy Hash: 11349d656394f9e7e25e73b528ebc04a6fc055a65f757aa3f9beeb581d074d18
                            • Instruction Fuzzy Hash: 732193326216158BD728CF79C82277E73E5A794310F55862EE4A7C37D0DE35AD04CB80
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 00A52B30
                            • DeleteObject.GDI32(00000000), ref: 00A52B43
                            • DestroyWindow.USER32 ref: 00A52B52
                            • GetDesktopWindow.USER32 ref: 00A52B6D
                            • GetWindowRect.USER32(00000000), ref: 00A52B74
                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00A52CA3
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00A52CB1
                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52CF8
                            • GetClientRect.USER32(00000000,?), ref: 00A52D04
                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A52D40
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52D62
                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52D75
                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52D80
                            • GlobalLock.KERNEL32(00000000), ref: 00A52D89
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52D98
                            • GlobalUnlock.KERNEL32(00000000), ref: 00A52DA1
                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52DA8
                            • GlobalFree.KERNEL32(00000000), ref: 00A52DB3
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52DC5
                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A6FC38,00000000), ref: 00A52DDB
                            • GlobalFree.KERNEL32(00000000), ref: 00A52DEB
                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00A52E11
                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00A52E30
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A52E52
                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A5303F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                            • String ID: $AutoIt v3$DISPLAY$static
                            • API String ID: 2211948467-2373415609
                            • Opcode ID: 43bad085e2d634231e8dbd4b384da03842a355ca6716d76d5efcd67215799a11
                            • Instruction ID: aa2f2a90181ed227b2234dc59b11fd0bc2f9c899f6fa4dc11e30300cd423841f
                            • Opcode Fuzzy Hash: 43bad085e2d634231e8dbd4b384da03842a355ca6716d76d5efcd67215799a11
                            • Instruction Fuzzy Hash: 98029B75A00205EFDB14DFA4DC89EAE7BB9FF49321F008119F915AB2A1DB74AD05CB60
                            APIs
                            • SetTextColor.GDI32(?,00000000), ref: 00A6712F
                            • GetSysColorBrush.USER32(0000000F), ref: 00A67160
                            • GetSysColor.USER32(0000000F), ref: 00A6716C
                            • SetBkColor.GDI32(?,000000FF), ref: 00A67186
                            • SelectObject.GDI32(?,?), ref: 00A67195
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00A671C0
                            • GetSysColor.USER32(00000010), ref: 00A671C8
                            • CreateSolidBrush.GDI32(00000000), ref: 00A671CF
                            • FrameRect.USER32(?,?,00000000), ref: 00A671DE
                            • DeleteObject.GDI32(00000000), ref: 00A671E5
                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00A67230
                            • FillRect.USER32(?,?,?), ref: 00A67262
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A67284
                              • Part of subcall function 00A673E8: GetSysColor.USER32(00000012), ref: 00A67421
                              • Part of subcall function 00A673E8: SetTextColor.GDI32(?,?), ref: 00A67425
                              • Part of subcall function 00A673E8: GetSysColorBrush.USER32(0000000F), ref: 00A6743B
                              • Part of subcall function 00A673E8: GetSysColor.USER32(0000000F), ref: 00A67446
                              • Part of subcall function 00A673E8: GetSysColor.USER32(00000011), ref: 00A67463
                              • Part of subcall function 00A673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A67471
                              • Part of subcall function 00A673E8: SelectObject.GDI32(?,00000000), ref: 00A67482
                              • Part of subcall function 00A673E8: SetBkColor.GDI32(?,00000000), ref: 00A6748B
                              • Part of subcall function 00A673E8: SelectObject.GDI32(?,?), ref: 00A67498
                              • Part of subcall function 00A673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00A674B7
                              • Part of subcall function 00A673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A674CE
                              • Part of subcall function 00A673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00A674DB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                            • String ID:
                            • API String ID: 4124339563-0
                            • Opcode ID: 06528b7d10a38dd969613982169efdb84e9c8d1e91bbade85a0efa766760eb71
                            • Instruction ID: 178f2bdb788fd694994e8190c90b84c1064db204a5f7db90eced149532cb65e9
                            • Opcode Fuzzy Hash: 06528b7d10a38dd969613982169efdb84e9c8d1e91bbade85a0efa766760eb71
                            • Instruction Fuzzy Hash: 28A17F72008301AFDB01DFA0DC48A6E7BB9FB89334F100B19F9A2961E1D7B5E945CB51
                            APIs
                            • DestroyWindow.USER32(?,?), ref: 009E8E14
                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A26AC5
                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A26AFE
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A26F43
                              • Part of subcall function 009E8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009E8BE8,?,00000000,?,?,?,?,009E8BBA,00000000,?), ref: 009E8FC5
                            • SendMessageW.USER32(?,00001053), ref: 00A26F7F
                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A26F96
                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00A26FAC
                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00A26FB7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                            • String ID: 0
                            • API String ID: 2760611726-4108050209
                            • Opcode ID: c86f7494a668c757a5784dfb579f2c6397f492c45093b40015c2fd21aeb63e16
                            • Instruction ID: 5b0226eb15be789dc305393cbce168d55c021cc19d1f2ce190111d759b2038bf
                            • Opcode Fuzzy Hash: c86f7494a668c757a5784dfb579f2c6397f492c45093b40015c2fd21aeb63e16
                            • Instruction Fuzzy Hash: B812CE30202261EFDB26DF58E944BAAB7F5FB45310F14846DF4898B2A1CB35EC52DB91
                            APIs
                            • DestroyWindow.USER32(00000000), ref: 00A5273E
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A5286A
                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00A528A9
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00A528B9
                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00A52900
                            • GetClientRect.USER32(00000000,?), ref: 00A5290C
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00A52955
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A52964
                            • GetStockObject.GDI32(00000011), ref: 00A52974
                            • SelectObject.GDI32(00000000,00000000), ref: 00A52978
                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00A52988
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A52991
                            • DeleteDC.GDI32(00000000), ref: 00A5299A
                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A529C6
                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A529DD
                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00A52A1D
                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A52A31
                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A52A42
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00A52A77
                            • GetStockObject.GDI32(00000011), ref: 00A52A82
                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A52A8D
                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00A52A97
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                            • API String ID: 2910397461-517079104
                            • Opcode ID: c763c8048c0cdbcbf4baf2c197311dd5499be281aa77e175be03ca54ae0e8e73
                            • Instruction ID: 22771be28484c87a66a3264b395a6ae971f0f00dcf9255797fdb768d2f437236
                            • Opcode Fuzzy Hash: c763c8048c0cdbcbf4baf2c197311dd5499be281aa77e175be03ca54ae0e8e73
                            • Instruction Fuzzy Hash: BCB14971A40215BFEB14DFA8DC49FAABBB9FB49711F008115F914EB290D7B4AD41CBA0
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00A44AED
                            • GetDriveTypeW.KERNEL32(?,00A6CB68,?,\\.\,00A6CC08), ref: 00A44BCA
                            • SetErrorMode.KERNEL32(00000000,00A6CB68,?,\\.\,00A6CC08), ref: 00A44D36
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$DriveType
                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                            • API String ID: 2907320926-4222207086
                            • Opcode ID: 5497d99a7f8021d94dff78a54882324676af909d2c093735cd0a76f1f7051b93
                            • Instruction ID: 835429ed43b92280fd425f9be3093fec2324ac560e90c91f5dd385073bde972d
                            • Opcode Fuzzy Hash: 5497d99a7f8021d94dff78a54882324676af909d2c093735cd0a76f1f7051b93
                            • Instruction Fuzzy Hash: 2161AE38745506ABCF04DF64CAC2B68B7B0FF8C349B288816F806AB291DB35ED41DB41
                            APIs
                            • GetSysColor.USER32(00000012), ref: 00A67421
                            • SetTextColor.GDI32(?,?), ref: 00A67425
                            • GetSysColorBrush.USER32(0000000F), ref: 00A6743B
                            • GetSysColor.USER32(0000000F), ref: 00A67446
                            • CreateSolidBrush.GDI32(?), ref: 00A6744B
                            • GetSysColor.USER32(00000011), ref: 00A67463
                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A67471
                            • SelectObject.GDI32(?,00000000), ref: 00A67482
                            • SetBkColor.GDI32(?,00000000), ref: 00A6748B
                            • SelectObject.GDI32(?,?), ref: 00A67498
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00A674B7
                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A674CE
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00A674DB
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A6752A
                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A67554
                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00A67572
                            • DrawFocusRect.USER32(?,?), ref: 00A6757D
                            • GetSysColor.USER32(00000011), ref: 00A6758E
                            • SetTextColor.GDI32(?,00000000), ref: 00A67596
                            • DrawTextW.USER32(?,00A670F5,000000FF,?,00000000), ref: 00A675A8
                            • SelectObject.GDI32(?,?), ref: 00A675BF
                            • DeleteObject.GDI32(?), ref: 00A675CA
                            • SelectObject.GDI32(?,?), ref: 00A675D0
                            • DeleteObject.GDI32(?), ref: 00A675D5
                            • SetTextColor.GDI32(?,?), ref: 00A675DB
                            • SetBkColor.GDI32(?,?), ref: 00A675E5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                            • String ID:
                            • API String ID: 1996641542-0
                            • Opcode ID: 5c61793b04315a283e86a2f7340be899e95074dcfb02bf36e1cb7f1677ff507a
                            • Instruction ID: f6f2b4d0fafc4c458f27990f4756828ecfa4b4ce128bf9274de35cdf95965fd4
                            • Opcode Fuzzy Hash: 5c61793b04315a283e86a2f7340be899e95074dcfb02bf36e1cb7f1677ff507a
                            • Instruction Fuzzy Hash: 43615D76900218AFDF01DFA4DC49EAE7FB9EB09320F114225F916AB2A1D7B49941CB90
                            APIs
                            • GetCursorPos.USER32(?), ref: 00A61128
                            • GetDesktopWindow.USER32 ref: 00A6113D
                            • GetWindowRect.USER32(00000000), ref: 00A61144
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A61199
                            • DestroyWindow.USER32(?), ref: 00A611B9
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A611ED
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A6120B
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A6121D
                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 00A61232
                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00A61245
                            • IsWindowVisible.USER32(00000000), ref: 00A612A1
                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00A612BC
                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00A612D0
                            • GetWindowRect.USER32(00000000,?), ref: 00A612E8
                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00A6130E
                            • GetMonitorInfoW.USER32(00000000,?), ref: 00A61328
                            • CopyRect.USER32(?,?), ref: 00A6133F
                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A613AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                            • String ID: ($0$tooltips_class32
                            • API String ID: 698492251-4156429822
                            • Opcode ID: aefaaaaf609bc3cb08b7c85d320c9c7f91d7b000b021ca675a6871c453dd9f46
                            • Instruction ID: b324778575bd9ec2b9c64f449289921829f0f2e607aca980cc060732aabbe9ba
                            • Opcode Fuzzy Hash: aefaaaaf609bc3cb08b7c85d320c9c7f91d7b000b021ca675a6871c453dd9f46
                            • Instruction Fuzzy Hash: 2BB18B71608341AFDB00DF65C884B6ABBF4FF88354F04891DF99A9B2A1D771E845CB92
                            APIs
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009E8968
                            • GetSystemMetrics.USER32(00000007), ref: 009E8970
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009E899B
                            • GetSystemMetrics.USER32(00000008), ref: 009E89A3
                            • GetSystemMetrics.USER32(00000004), ref: 009E89C8
                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009E89E5
                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009E89F5
                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009E8A28
                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009E8A3C
                            • GetClientRect.USER32(00000000,000000FF), ref: 009E8A5A
                            • GetStockObject.GDI32(00000011), ref: 009E8A76
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 009E8A81
                              • Part of subcall function 009E912D: GetCursorPos.USER32(?), ref: 009E9141
                              • Part of subcall function 009E912D: ScreenToClient.USER32(00000000,?), ref: 009E915E
                              • Part of subcall function 009E912D: GetAsyncKeyState.USER32(00000001), ref: 009E9183
                              • Part of subcall function 009E912D: GetAsyncKeyState.USER32(00000002), ref: 009E919D
                            • SetTimer.USER32(00000000,00000000,00000028,009E90FC), ref: 009E8AA8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                            • String ID: AutoIt v3 GUI
                            • API String ID: 1458621304-248962490
                            • Opcode ID: 762b7a3e4045d11667c6b4366db60ec972d69be4739cff38fe41cd3d5646c5cc
                            • Instruction ID: db079aec5b7c1c12fd833b2e1dad94b32fbe037ee8f7087a16ad3444889d3aba
                            • Opcode Fuzzy Hash: 762b7a3e4045d11667c6b4366db60ec972d69be4739cff38fe41cd3d5646c5cc
                            • Instruction Fuzzy Hash: 66B17B35A4024AAFDB15DFA8DC85BAE3BB5FB48324F104229FA15A72D0DB74E841CB50
                            APIs
                              • Part of subcall function 00A310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A31114
                              • Part of subcall function 00A310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A31120
                              • Part of subcall function 00A310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A3112F
                              • Part of subcall function 00A310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A31136
                              • Part of subcall function 00A310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A3114D
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A30DF5
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A30E29
                            • GetLengthSid.ADVAPI32(?), ref: 00A30E40
                            • GetAce.ADVAPI32(?,00000000,?), ref: 00A30E7A
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A30E96
                            • GetLengthSid.ADVAPI32(?), ref: 00A30EAD
                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A30EB5
                            • HeapAlloc.KERNEL32(00000000), ref: 00A30EBC
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A30EDD
                            • CopySid.ADVAPI32(00000000), ref: 00A30EE4
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A30F13
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A30F35
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A30F47
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A30F6E
                            • HeapFree.KERNEL32(00000000), ref: 00A30F75
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A30F7E
                            • HeapFree.KERNEL32(00000000), ref: 00A30F85
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A30F8E
                            • HeapFree.KERNEL32(00000000), ref: 00A30F95
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00A30FA1
                            • HeapFree.KERNEL32(00000000), ref: 00A30FA8
                              • Part of subcall function 00A31193: GetProcessHeap.KERNEL32(00000008,00A30BB1,?,00000000,?,00A30BB1,?), ref: 00A311A1
                              • Part of subcall function 00A31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A30BB1,?), ref: 00A311A8
                              • Part of subcall function 00A31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A30BB1,?), ref: 00A311B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 4175595110-0
                            • Opcode ID: ac514760a2156318ed175c9e6e7992026678184f6ff877c14e8f66d1daa522a3
                            • Instruction ID: bc3394c83d284d45fcdcd0b982faac86522a3464f6bfda01a2d88577c1bbf18d
                            • Opcode Fuzzy Hash: ac514760a2156318ed175c9e6e7992026678184f6ff877c14e8f66d1daa522a3
                            • Instruction Fuzzy Hash: 3D71787290021AEBDF20DFA4DD48FEEBBB8BF05310F148215F959E6191D7719A06CBA0
                            APIs
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5C4BD
                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A6CC08,00000000,?,00000000,?,?), ref: 00A5C544
                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00A5C5A4
                            • _wcslen.LIBCMT ref: 00A5C5F4
                            • _wcslen.LIBCMT ref: 00A5C66F
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00A5C6B2
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00A5C7C1
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00A5C84D
                            • RegCloseKey.ADVAPI32(?), ref: 00A5C881
                            • RegCloseKey.ADVAPI32(00000000), ref: 00A5C88E
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00A5C960
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                            • API String ID: 9721498-966354055
                            • Opcode ID: 2c58d81590a18cd7bb71b50126503bde103659ac99fc2b9c69adc0e66c685cac
                            • Instruction ID: 6fc7999de6738bddd4a2f803b1e48259ad67899aef4f5f4ce322c4612ac51a4d
                            • Opcode Fuzzy Hash: 2c58d81590a18cd7bb71b50126503bde103659ac99fc2b9c69adc0e66c685cac
                            • Instruction Fuzzy Hash: BB124775604201AFDB14DF14C891B2AB7E5FF88725F04899DF88A9B3A2DB31ED45CB81
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 00A609C6
                            • _wcslen.LIBCMT ref: 00A60A01
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A60A54
                            • _wcslen.LIBCMT ref: 00A60A8A
                            • _wcslen.LIBCMT ref: 00A60B06
                            • _wcslen.LIBCMT ref: 00A60B81
                              • Part of subcall function 009EF9F2: _wcslen.LIBCMT ref: 009EF9FD
                              • Part of subcall function 00A32BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A32BFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$MessageSend$BuffCharUpper
                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                            • API String ID: 1103490817-4258414348
                            • Opcode ID: 17786cdaf5c66bcfa2a5f43e427aeba91f51d85d2e7a9630d3f8bfc5c4756877
                            • Instruction ID: dbe7150580a6889a5b16af70c1ceb8f23ff24b0cbeaead6e07bca898abc6ac44
                            • Opcode Fuzzy Hash: 17786cdaf5c66bcfa2a5f43e427aeba91f51d85d2e7a9630d3f8bfc5c4756877
                            • Instruction Fuzzy Hash: 01E178322087019FCB14DF64C450A2BB7F2BF98354B148A5DF8969B3A2D731ED85CB92
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                            • API String ID: 1256254125-909552448
                            • Opcode ID: b9a43efe96f5a81857a1fd5611a7ddcf1e07a28c89797faecfbb49d33086a5e2
                            • Instruction ID: f7c20a0486924d98caf1bc59fe9580dccaaba2adf8ad175ca55ecfa51a0dac89
                            • Opcode Fuzzy Hash: b9a43efe96f5a81857a1fd5611a7ddcf1e07a28c89797faecfbb49d33086a5e2
                            • Instruction Fuzzy Hash: 8B71E63261022A8FCF10DF68CD516BF37A2BBA07B5B154529FD569B289E631CD49C3A0
                            APIs
                            • _wcslen.LIBCMT ref: 00A6835A
                            • _wcslen.LIBCMT ref: 00A6836E
                            • _wcslen.LIBCMT ref: 00A68391
                            • _wcslen.LIBCMT ref: 00A683B4
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A683F2
                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00A6361A,?), ref: 00A6844E
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A68487
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A684CA
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A68501
                            • FreeLibrary.KERNEL32(?), ref: 00A6850D
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A6851D
                            • DestroyIcon.USER32(?), ref: 00A6852C
                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A68549
                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A68555
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                            • String ID: .dll$.exe$.icl
                            • API String ID: 799131459-1154884017
                            • Opcode ID: 984d05237f93b5afe9a757a749dd15bc96428623990453ca2f4ddce0d2966c6c
                            • Instruction ID: 197f9a5c4d9188e30e23d9d130700aaad67c3f76ab65d368c601f28936fa7c73
                            • Opcode Fuzzy Hash: 984d05237f93b5afe9a757a749dd15bc96428623990453ca2f4ddce0d2966c6c
                            • Instruction Fuzzy Hash: F861BF71540219BAEB14DF64CC45BBE77BCFB44B21F10460AF916DA1D1DFB8AA80C7A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                            • API String ID: 0-1645009161
                            • Opcode ID: 5d646e67c67e5e2f3e4af29137a8d2117a5109ea8a3e94452503807efcfa99ee
                            • Instruction ID: 9c32443e5cccbdb90c311c077dd8afbaea8b21e7623a8d176498d9b98fef0c5d
                            • Opcode Fuzzy Hash: 5d646e67c67e5e2f3e4af29137a8d2117a5109ea8a3e94452503807efcfa99ee
                            • Instruction Fuzzy Hash: 2E81E971A84205BBDB11BFA0DC42FFF77A8AF95300F048426F905AA296FB70D941C791
                            APIs
                            • CharLowerBuffW.USER32(?,?), ref: 00A43EF8
                            • _wcslen.LIBCMT ref: 00A43F03
                            • _wcslen.LIBCMT ref: 00A43F5A
                            • _wcslen.LIBCMT ref: 00A43F98
                            • GetDriveTypeW.KERNEL32(?), ref: 00A43FD6
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A4401E
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A44059
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A44087
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                            • API String ID: 1839972693-4113822522
                            • Opcode ID: a183d692f50cbd7fbebbd786ce55a9a6cad656bfe74507d695e9835416c08e66
                            • Instruction ID: a15dc4eccf875d1120f26d42a7adb7e58ddfdfa4e4e70f23da8ee80b957c30ed
                            • Opcode Fuzzy Hash: a183d692f50cbd7fbebbd786ce55a9a6cad656bfe74507d695e9835416c08e66
                            • Instruction Fuzzy Hash: 6471E2766042119FCB10EF24C881A6AB7F4FFD8758F10892EF99697251EB30DD49CB91
                            APIs
                            • LoadIconW.USER32(00000063), ref: 00A35A2E
                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A35A40
                            • SetWindowTextW.USER32(?,?), ref: 00A35A57
                            • GetDlgItem.USER32(?,000003EA), ref: 00A35A6C
                            • SetWindowTextW.USER32(00000000,?), ref: 00A35A72
                            • GetDlgItem.USER32(?,000003E9), ref: 00A35A82
                            • SetWindowTextW.USER32(00000000,?), ref: 00A35A88
                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A35AA9
                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A35AC3
                            • GetWindowRect.USER32(?,?), ref: 00A35ACC
                            • _wcslen.LIBCMT ref: 00A35B33
                            • SetWindowTextW.USER32(?,?), ref: 00A35B6F
                            • GetDesktopWindow.USER32 ref: 00A35B75
                            • GetWindowRect.USER32(00000000), ref: 00A35B7C
                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00A35BD3
                            • GetClientRect.USER32(?,?), ref: 00A35BE0
                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00A35C05
                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A35C2F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                            • String ID:
                            • API String ID: 895679908-0
                            • Opcode ID: cd270590aebefafc2ae26ac4a344098c1b763c74930ee151914aeadd9c2dbd2a
                            • Instruction ID: c626611e3e88ad83c1ed1b7377e300eb5f8bbfd6c5ab2d1bdbe995e4f52c161c
                            • Opcode Fuzzy Hash: cd270590aebefafc2ae26ac4a344098c1b763c74930ee151914aeadd9c2dbd2a
                            • Instruction Fuzzy Hash: 41716B31A00B09AFDB20DFB8CE89AAEBBF5FF48714F104518F582A25A0D775E941CB50
                            APIs
                            • LoadCursorW.USER32(00000000,00007F89), ref: 00A4FE27
                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00A4FE32
                            • LoadCursorW.USER32(00000000,00007F00), ref: 00A4FE3D
                            • LoadCursorW.USER32(00000000,00007F03), ref: 00A4FE48
                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00A4FE53
                            • LoadCursorW.USER32(00000000,00007F01), ref: 00A4FE5E
                            • LoadCursorW.USER32(00000000,00007F81), ref: 00A4FE69
                            • LoadCursorW.USER32(00000000,00007F88), ref: 00A4FE74
                            • LoadCursorW.USER32(00000000,00007F80), ref: 00A4FE7F
                            • LoadCursorW.USER32(00000000,00007F86), ref: 00A4FE8A
                            • LoadCursorW.USER32(00000000,00007F83), ref: 00A4FE95
                            • LoadCursorW.USER32(00000000,00007F85), ref: 00A4FEA0
                            • LoadCursorW.USER32(00000000,00007F82), ref: 00A4FEAB
                            • LoadCursorW.USER32(00000000,00007F84), ref: 00A4FEB6
                            • LoadCursorW.USER32(00000000,00007F04), ref: 00A4FEC1
                            • LoadCursorW.USER32(00000000,00007F02), ref: 00A4FECC
                            • GetCursorInfo.USER32(?), ref: 00A4FEDC
                            • GetLastError.KERNEL32 ref: 00A4FF1E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Cursor$Load$ErrorInfoLast
                            • String ID:
                            • API String ID: 3215588206-0
                            • Opcode ID: 37ceb5ea12d59f65ab50676a2a5e393d0d4c1419e3d48af60b6d0088427f112f
                            • Instruction ID: 0db6294783858931839e5ad24452634ae91cf97a52dfb26d265503725fa48a38
                            • Opcode Fuzzy Hash: 37ceb5ea12d59f65ab50676a2a5e393d0d4c1419e3d48af60b6d0088427f112f
                            • Instruction Fuzzy Hash: 494144B0D443196FDB10DFBA8C8585EBFE8FF44754B50852AE11DE7281DB789901CE91
                            APIs
                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 009F00C6
                              • Part of subcall function 009F00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00AA070C,00000FA0,78E4ACD0,?,?,?,?,00A123B3,000000FF), ref: 009F011C
                              • Part of subcall function 009F00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00A123B3,000000FF), ref: 009F0127
                              • Part of subcall function 009F00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00A123B3,000000FF), ref: 009F0138
                              • Part of subcall function 009F00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 009F014E
                              • Part of subcall function 009F00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 009F015C
                              • Part of subcall function 009F00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 009F016A
                              • Part of subcall function 009F00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009F0195
                              • Part of subcall function 009F00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009F01A0
                            • ___scrt_fastfail.LIBCMT ref: 009F00E7
                              • Part of subcall function 009F00A3: __onexit.LIBCMT ref: 009F00A9
                            Strings
                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 009F0122
                            • SleepConditionVariableCS, xrefs: 009F0154
                            • kernel32.dll, xrefs: 009F0133
                            • WakeAllConditionVariable, xrefs: 009F0162
                            • InitializeConditionVariable, xrefs: 009F0148
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                            • API String ID: 66158676-1714406822
                            • Opcode ID: 515f7364e75d56571048dbf1299d468045920b33706566c4fbcfdd44de5ee373
                            • Instruction ID: ad49cd1861817099ccb3a440527e5c8e33b37641171415ebb2a607d645a07c28
                            • Opcode Fuzzy Hash: 515f7364e75d56571048dbf1299d468045920b33706566c4fbcfdd44de5ee373
                            • Instruction Fuzzy Hash: 7021C832644715AFD711ABE4AC05B7A36ACFB86B65F00052AF901A7292DBB4AC018B50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                            • API String ID: 176396367-1603158881
                            • Opcode ID: 036288730dbf8b7f696403cfb50e953ac650cd252184cb90b097a12f648af38c
                            • Instruction ID: ce2035bf2aeb2de4a08bf7b95ad41af8dbea1f5102f8c06ea6e7115231716042
                            • Opcode Fuzzy Hash: 036288730dbf8b7f696403cfb50e953ac650cd252184cb90b097a12f648af38c
                            • Instruction Fuzzy Hash: 75E1B133A08616ABCF159FB8C4527FEBBB0BF54750F54821AF456E7240EB30AE858790
                            APIs
                            • CharLowerBuffW.USER32(00000000,00000000,00A6CC08), ref: 00A44527
                            • _wcslen.LIBCMT ref: 00A4453B
                            • _wcslen.LIBCMT ref: 00A44599
                            • _wcslen.LIBCMT ref: 00A445F4
                            • _wcslen.LIBCMT ref: 00A4463F
                            • _wcslen.LIBCMT ref: 00A446A7
                              • Part of subcall function 009EF9F2: _wcslen.LIBCMT ref: 009EF9FD
                            • GetDriveTypeW.KERNEL32(?,00A96BF0,00000061), ref: 00A44743
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharDriveLowerType
                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                            • API String ID: 2055661098-1000479233
                            • Opcode ID: ba497a45c6640483973fff5b11585edf0e858d745d794d939becece4094f760e
                            • Instruction ID: 6599878b3b53235d1896232bc3936c7013ff3eb19a57e79dab3083aa362b6a5a
                            • Opcode Fuzzy Hash: ba497a45c6640483973fff5b11585edf0e858d745d794d939becece4094f760e
                            • Instruction Fuzzy Hash: 93B1AB796083029BC710EF28C891B6AF7E5AFE9764F50891DF496C7291E730DC45CBA2
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00A6CC08), ref: 00A540BB
                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A540CD
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00A6CC08), ref: 00A540F2
                            • FreeLibrary.KERNEL32(00000000,?,00A6CC08), ref: 00A5413E
                            • StringFromGUID2.OLE32(?,?,00000028,?,00A6CC08), ref: 00A541A8
                            • SysFreeString.OLEAUT32(00000009), ref: 00A54262
                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A542C8
                            • SysFreeString.OLEAUT32(?), ref: 00A542F2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                            • String ID: GetModuleHandleExW$kernel32.dll
                            • API String ID: 354098117-199464113
                            • Opcode ID: 8bf3677da7ff577d74c29f4f3562ad06fb67aedafb5ad73b00f7122a391d586c
                            • Instruction ID: 7bb4e92d3272e654dfd0ce03f049d8e3e7781d2045f2746910db8cf4b393bc07
                            • Opcode Fuzzy Hash: 8bf3677da7ff577d74c29f4f3562ad06fb67aedafb5ad73b00f7122a391d586c
                            • Instruction Fuzzy Hash: 65124C75A00215EFDB14DF94C884EAEBBB5FF49319F248098F9059B261D731ED86CBA0
                            APIs
                            • GetMenuItemCount.USER32(00AA1990), ref: 00A12F8D
                            • GetMenuItemCount.USER32(00AA1990), ref: 00A1303D
                            • GetCursorPos.USER32(?), ref: 00A13081
                            • SetForegroundWindow.USER32(00000000), ref: 00A1308A
                            • TrackPopupMenuEx.USER32(00AA1990,00000000,?,00000000,00000000,00000000), ref: 00A1309D
                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A130A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                            • String ID: 0
                            • API String ID: 36266755-4108050209
                            • Opcode ID: 647443ba60e99adaf91d9597b17b1609d86243cde3a55087990456bad5b50dad
                            • Instruction ID: e1de515a0b961cb5a142a6fb0afc144af0a15d64edcdc00f929567ab657ee270
                            • Opcode Fuzzy Hash: 647443ba60e99adaf91d9597b17b1609d86243cde3a55087990456bad5b50dad
                            • Instruction Fuzzy Hash: 7F711731680205BEEB259F64CC49FEABF75FF05364F208216F6256A2E0C7B1A960CB51
                            APIs
                            • DestroyWindow.USER32(00000000,?), ref: 00A66DEB
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A66E5F
                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A66E81
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A66E94
                            • DestroyWindow.USER32(?), ref: 00A66EB5
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009D0000,00000000), ref: 00A66EE4
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A66EFD
                            • GetDesktopWindow.USER32 ref: 00A66F16
                            • GetWindowRect.USER32(00000000), ref: 00A66F1D
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A66F35
                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A66F4D
                              • Part of subcall function 009E9944: GetWindowLongW.USER32(?,000000EB), ref: 009E9952
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                            • String ID: 0$tooltips_class32
                            • API String ID: 2429346358-3619404913
                            • Opcode ID: 8487a4ed3296ee116755f3d8cf3eaf387058d749f1bcf85a5b985a48d5173622
                            • Instruction ID: ce0db2661924252f5cd86ba96df14855353992d5dc9b7a2b5ad26ae772fa30a3
                            • Opcode Fuzzy Hash: 8487a4ed3296ee116755f3d8cf3eaf387058d749f1bcf85a5b985a48d5173622
                            • Instruction Fuzzy Hash: BE717674104241AFDB21CF68D844FBABBF9FB99304F04481EFA99872A1C775A906CB15
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • DragQueryPoint.SHELL32(?,?), ref: 00A69147
                              • Part of subcall function 00A67674: ClientToScreen.USER32(?,?), ref: 00A6769A
                              • Part of subcall function 00A67674: GetWindowRect.USER32(?,?), ref: 00A67710
                              • Part of subcall function 00A67674: PtInRect.USER32(?,?,00A68B89), ref: 00A67720
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00A691B0
                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A691BB
                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A691DE
                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A69225
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00A6923E
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00A69255
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00A69277
                            • DragFinish.SHELL32(?), ref: 00A6927E
                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A69371
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                            • API String ID: 221274066-3440237614
                            • Opcode ID: ed39b49c5e90c228692fdd3781f9f5bdd2abc9a20bf2bf71daf995317a3ce06c
                            • Instruction ID: 574ebd2d3f5031a7cb4f229a0ad36bc20492b1bff25c1cc9c7f9ffb1e2464e76
                            • Opcode Fuzzy Hash: ed39b49c5e90c228692fdd3781f9f5bdd2abc9a20bf2bf71daf995317a3ce06c
                            • Instruction Fuzzy Hash: 19613971108301AFC701EFA4DC85EAFBBF8EBC9750F00491EF595962A1DB709A49CB52
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A4C4B0
                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A4C4C3
                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A4C4D7
                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A4C4F0
                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00A4C533
                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A4C549
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A4C554
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A4C584
                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A4C5DC
                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A4C5F0
                            • InternetCloseHandle.WININET(00000000), ref: 00A4C5FB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                            • String ID:
                            • API String ID: 3800310941-3916222277
                            • Opcode ID: ff8642626fe3a2a0aaa32475202392b25c1c2a77096da4674776e8ebd97b48dc
                            • Instruction ID: f121ea1a0788afcddf9b89acd1d3262687b7d2b7598f488efee87bc45a39b6e4
                            • Opcode Fuzzy Hash: ff8642626fe3a2a0aaa32475202392b25c1c2a77096da4674776e8ebd97b48dc
                            • Instruction Fuzzy Hash: 1D517DB4541308BFDB61DFA0C948ABB7BFCFF48764F008419F98A96210DB74E9059B61
                            APIs
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00A68592
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00A685A2
                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00A685AD
                            • CloseHandle.KERNEL32(00000000), ref: 00A685BA
                            • GlobalLock.KERNEL32(00000000), ref: 00A685C8
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A685D7
                            • GlobalUnlock.KERNEL32(00000000), ref: 00A685E0
                            • CloseHandle.KERNEL32(00000000), ref: 00A685E7
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00A685F8
                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A6FC38,?), ref: 00A68611
                            • GlobalFree.KERNEL32(00000000), ref: 00A68621
                            • GetObjectW.GDI32(?,00000018,000000FF), ref: 00A68641
                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00A68671
                            • DeleteObject.GDI32(00000000), ref: 00A68699
                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A686AF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                            • String ID:
                            • API String ID: 3840717409-0
                            • Opcode ID: fd7bd62cd2969efbce78ada238ec5d1429dda26b6705932567141d9fa53b7e8c
                            • Instruction ID: 93353fbb96a2d9b7416e4f85e353c4de11e3c64ad52f192d4ef8c2cbea0ece33
                            • Opcode Fuzzy Hash: fd7bd62cd2969efbce78ada238ec5d1429dda26b6705932567141d9fa53b7e8c
                            • Instruction Fuzzy Hash: 98411875600208AFDB11DFA5DC48EAA7BBCFF89B21F104159F956EB260DB749902CB60
                            APIs
                            • VariantInit.OLEAUT32(00000000), ref: 00A41502
                            • VariantCopy.OLEAUT32(?,?), ref: 00A4150B
                            • VariantClear.OLEAUT32(?), ref: 00A41517
                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A415FB
                            • VarR8FromDec.OLEAUT32(?,?), ref: 00A41657
                            • VariantInit.OLEAUT32(?), ref: 00A41708
                            • SysFreeString.OLEAUT32(?), ref: 00A4178C
                            • VariantClear.OLEAUT32(?), ref: 00A417D8
                            • VariantClear.OLEAUT32(?), ref: 00A417E7
                            • VariantInit.OLEAUT32(00000000), ref: 00A41823
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                            • API String ID: 1234038744-3931177956
                            • Opcode ID: e97b7b8fc47815ecb37ba2fedde5f937c143cdb9fd0432e73571207dfefce802
                            • Instruction ID: 512eba13f5ce3efa6c5aeb1bc5c0b57780f23e4541a204c7025cf8fef5e7582e
                            • Opcode Fuzzy Hash: e97b7b8fc47815ecb37ba2fedde5f937c143cdb9fd0432e73571207dfefce802
                            • Instruction Fuzzy Hash: 8DD10275A00219EBDB00EF65D889BBDB7B5BFC4700F148056F446AB291DB30EC81DB62
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5B6AE,?,?), ref: 00A5C9B5
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5C9F1
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA68
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5B6F4
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A5B772
                            • RegDeleteValueW.ADVAPI32(?,?), ref: 00A5B80A
                            • RegCloseKey.ADVAPI32(?), ref: 00A5B87E
                            • RegCloseKey.ADVAPI32(?), ref: 00A5B89C
                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00A5B8F2
                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A5B904
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A5B922
                            • FreeLibrary.KERNEL32(00000000), ref: 00A5B983
                            • RegCloseKey.ADVAPI32(00000000), ref: 00A5B994
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 146587525-4033151799
                            • Opcode ID: 6704f100f6a922e490b4e57651a8d4a526754a37265fdb6d8f02bc255bc3a15a
                            • Instruction ID: ab8a51796793b9d36ed69b4bc2930b39f3dd88ced77242e202c0c9f95c999a1e
                            • Opcode Fuzzy Hash: 6704f100f6a922e490b4e57651a8d4a526754a37265fdb6d8f02bc255bc3a15a
                            • Instruction Fuzzy Hash: B8C16B30214201EFD710DF14C495B2ABBE5BF84319F14859DF89A8B3A2CB71E84ACBA1
                            APIs
                            • GetDC.USER32(00000000), ref: 00A525D8
                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00A525E8
                            • CreateCompatibleDC.GDI32(?), ref: 00A525F4
                            • SelectObject.GDI32(00000000,?), ref: 00A52601
                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00A5266D
                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00A526AC
                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00A526D0
                            • SelectObject.GDI32(?,?), ref: 00A526D8
                            • DeleteObject.GDI32(?), ref: 00A526E1
                            • DeleteDC.GDI32(?), ref: 00A526E8
                            • ReleaseDC.USER32(00000000,?), ref: 00A526F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                            • String ID: (
                            • API String ID: 2598888154-3887548279
                            • Opcode ID: 2a7704ed81cc14288fa6cbf5133beac0d28ef53a9d1a32b943a2e3a011192aa5
                            • Instruction ID: 5147f1f5beb6fc85069acfb4a26cfa8b71b396b53a2e146a166ec9c0caf91266
                            • Opcode Fuzzy Hash: 2a7704ed81cc14288fa6cbf5133beac0d28ef53a9d1a32b943a2e3a011192aa5
                            • Instruction Fuzzy Hash: FB61E275D00219EFCF15CFE8D984AAEBBB5FF48310F20852AE955A7250E774A941CF90
                            APIs
                            • ___free_lconv_mon.LIBCMT ref: 00A0DAA1
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D659
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D66B
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D67D
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D68F
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D6A1
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D6B3
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D6C5
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D6D7
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D6E9
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D6FB
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D70D
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D71F
                              • Part of subcall function 00A0D63C: _free.LIBCMT ref: 00A0D731
                            • _free.LIBCMT ref: 00A0DA96
                              • Part of subcall function 00A029C8: HeapFree.KERNEL32(00000000,00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000), ref: 00A029DE
                              • Part of subcall function 00A029C8: GetLastError.KERNEL32(00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000,00000000), ref: 00A029F0
                            • _free.LIBCMT ref: 00A0DAB8
                            • _free.LIBCMT ref: 00A0DACD
                            • _free.LIBCMT ref: 00A0DAD8
                            • _free.LIBCMT ref: 00A0DAFA
                            • _free.LIBCMT ref: 00A0DB0D
                            • _free.LIBCMT ref: 00A0DB1B
                            • _free.LIBCMT ref: 00A0DB26
                            • _free.LIBCMT ref: 00A0DB5E
                            • _free.LIBCMT ref: 00A0DB65
                            • _free.LIBCMT ref: 00A0DB82
                            • _free.LIBCMT ref: 00A0DB9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                            • String ID:
                            • API String ID: 161543041-0
                            • Opcode ID: 37e8f6bad86269b99adc0879488c7d144a9e503779b338a053b64a8bb6cbfb4c
                            • Instruction ID: 11db53a5cd1b9e19b1f347703d56f583a89691bb5e2e7e40e9459eeea7c1aea8
                            • Opcode Fuzzy Hash: 37e8f6bad86269b99adc0879488c7d144a9e503779b338a053b64a8bb6cbfb4c
                            • Instruction Fuzzy Hash: 2231193260470D9FEB21ABB9F949B5A77E9FF41390F254419E449D71D1DB35AC40CB20
                            APIs
                            • GetClassNameW.USER32(?,?,00000100), ref: 00A3369C
                            • _wcslen.LIBCMT ref: 00A336A7
                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A33797
                            • GetClassNameW.USER32(?,?,00000400), ref: 00A3380C
                            • GetDlgCtrlID.USER32(?), ref: 00A3385D
                            • GetWindowRect.USER32(?,?), ref: 00A33882
                            • GetParent.USER32(?), ref: 00A338A0
                            • ScreenToClient.USER32(00000000), ref: 00A338A7
                            • GetClassNameW.USER32(?,?,00000100), ref: 00A33921
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00A3395D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                            • String ID: %s%u
                            • API String ID: 4010501982-679674701
                            • Opcode ID: d1209d7b55490c1dc70ef300020cbfc24e3e37c115517dafdc9f8169070b3422
                            • Instruction ID: b47b231facd185a51b0ce04724772d9350e98180d919b2e4ade452a51bc5bd4b
                            • Opcode Fuzzy Hash: d1209d7b55490c1dc70ef300020cbfc24e3e37c115517dafdc9f8169070b3422
                            • Instruction Fuzzy Hash: BD91B372208706EFDB19DF64C895BBAF7A9FF44350F008619F999C2190DB70EA45CB91
                            APIs
                            • GetClassNameW.USER32(?,?,00000400), ref: 00A34994
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00A349DA
                            • _wcslen.LIBCMT ref: 00A349EB
                            • CharUpperBuffW.USER32(?,00000000), ref: 00A349F7
                            • _wcsstr.LIBVCRUNTIME ref: 00A34A2C
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00A34A64
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00A34A9D
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00A34AE6
                            • GetClassNameW.USER32(?,?,00000400), ref: 00A34B20
                            • GetWindowRect.USER32(?,?), ref: 00A34B8B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                            • String ID: ThumbnailClass
                            • API String ID: 1311036022-1241985126
                            • Opcode ID: c4f3ab5015eb8b5d0555f9fccb14a2e985f0d94b01c0a8b9ba509c6c539ad1a3
                            • Instruction ID: 3330d0d26a07231bc084e468771a33fd473ce2cf9d24568a2020ed181e802521
                            • Opcode Fuzzy Hash: c4f3ab5015eb8b5d0555f9fccb14a2e985f0d94b01c0a8b9ba509c6c539ad1a3
                            • Instruction Fuzzy Hash: D991CE711082099FDB04DF14C981BBABBE8FF88354F04846AFD859A196EB74FD45CBA1
                            APIs
                            • GetMenuItemInfoW.USER32(00AA1990,000000FF,00000000,00000030), ref: 00A3BFAC
                            • SetMenuItemInfoW.USER32(00AA1990,00000004,00000000,00000030), ref: 00A3BFE1
                            • Sleep.KERNEL32(000001F4), ref: 00A3BFF3
                            • GetMenuItemCount.USER32(?), ref: 00A3C039
                            • GetMenuItemID.USER32(?,00000000), ref: 00A3C056
                            • GetMenuItemID.USER32(?,-00000001), ref: 00A3C082
                            • GetMenuItemID.USER32(?,?), ref: 00A3C0C9
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A3C10F
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A3C124
                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A3C145
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountRadioSleep
                            • String ID: 0
                            • API String ID: 1460738036-4108050209
                            • Opcode ID: f3e127d10c168b37b9abc04bb7244f9071e02cbce26a903754ca4a1d350a0c75
                            • Instruction ID: 98a1db5aee56ed2875aa0effe7d27ff17ef7916b2ec67ec5addce149f822fb82
                            • Opcode Fuzzy Hash: f3e127d10c168b37b9abc04bb7244f9071e02cbce26a903754ca4a1d350a0c75
                            • Instruction Fuzzy Hash: F761A0B190028AAFDF15CFA4CD88AFEBBB9EB06364F004115F951B7291C775AD05DB60
                            APIs
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00A5CC64
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00A5CC8D
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A5CD48
                              • Part of subcall function 00A5CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00A5CCAA
                              • Part of subcall function 00A5CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00A5CCBD
                              • Part of subcall function 00A5CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A5CCCF
                              • Part of subcall function 00A5CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A5CD05
                              • Part of subcall function 00A5CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00A5CD28
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A5CCF3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 2734957052-4033151799
                            • Opcode ID: 14c6751cda6897cb6f2a2b69cbfbfba4be659322fd541bdf685fff4161b71994
                            • Instruction ID: 3f43f769ff8a5135dcb45499d194c0575368635629da1f28f01846c49f26961e
                            • Opcode Fuzzy Hash: 14c6751cda6897cb6f2a2b69cbfbfba4be659322fd541bdf685fff4161b71994
                            • Instruction Fuzzy Hash: 2A317E72901228BFDB21DB90DC88EFFBB7CEF05761F000165E905E3144D6B49A4A9AA0
                            APIs
                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A43D40
                            • _wcslen.LIBCMT ref: 00A43D6D
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A43D9D
                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A43DBE
                            • RemoveDirectoryW.KERNEL32(?), ref: 00A43DCE
                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A43E55
                            • CloseHandle.KERNEL32(00000000), ref: 00A43E60
                            • CloseHandle.KERNEL32(00000000), ref: 00A43E6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                            • String ID: :$\$\??\%s
                            • API String ID: 1149970189-3457252023
                            • Opcode ID: a924afbe0b36a36a2e0d5b59d66d08af944c396f03ec7b104bcdf528bcfc829b
                            • Instruction ID: 62e5d8eee2499cdf837cca16b5133db8d3e91a542f889145df7de6f471aff337
                            • Opcode Fuzzy Hash: a924afbe0b36a36a2e0d5b59d66d08af944c396f03ec7b104bcdf528bcfc829b
                            • Instruction Fuzzy Hash: 15319076A00209AADF21DBA0DC49FEF37BCEF89710F1041A6F609D6160EBB497458B24
                            APIs
                            • timeGetTime.WINMM ref: 00A3E6B4
                              • Part of subcall function 009EE551: timeGetTime.WINMM(?,?,00A3E6D4), ref: 009EE555
                            • Sleep.KERNEL32(0000000A), ref: 00A3E6E1
                            • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00A3E705
                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A3E727
                            • SetActiveWindow.USER32 ref: 00A3E746
                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A3E754
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A3E773
                            • Sleep.KERNEL32(000000FA), ref: 00A3E77E
                            • IsWindow.USER32 ref: 00A3E78A
                            • EndDialog.USER32(00000000), ref: 00A3E79B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                            • String ID: BUTTON
                            • API String ID: 1194449130-3405671355
                            • Opcode ID: 148622d07588f4ab5768c8834d64e754e7bebec8c8432414ebd033910e9b8a1c
                            • Instruction ID: 8a9487e68ec056870636f40c2f17fa33a94ffb01f0fbbf1515234856670a0a3f
                            • Opcode Fuzzy Hash: 148622d07588f4ab5768c8834d64e754e7bebec8c8432414ebd033910e9b8a1c
                            • Instruction Fuzzy Hash: A7216FB0240206AFEB11DFE4EC99B363B79FB56758F101425F556826E1DBB1AC228B24
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A3EA5D
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A3EA73
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3EA84
                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A3EA96
                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A3EAA7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: SendString$_wcslen
                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                            • API String ID: 2420728520-1007645807
                            • Opcode ID: 3a1fb6c924910db25c7f7837feb8ef572e2834ca897b71b667465e58d0dd473d
                            • Instruction ID: cfa2bad09739b33c580f20486fd0e96ad51f071a63de7167731b89564b77a2b5
                            • Opcode Fuzzy Hash: 3a1fb6c924910db25c7f7837feb8ef572e2834ca897b71b667465e58d0dd473d
                            • Instruction Fuzzy Hash: 51115131B9026979DB20E7A6DC4AEFF6ABCFFD1F40F40482AB411A21D1EAB05915C5B0
                            APIs
                            • GetKeyboardState.USER32(?), ref: 00A3A012
                            • SetKeyboardState.USER32(?), ref: 00A3A07D
                            • GetAsyncKeyState.USER32(000000A0), ref: 00A3A09D
                            • GetKeyState.USER32(000000A0), ref: 00A3A0B4
                            • GetAsyncKeyState.USER32(000000A1), ref: 00A3A0E3
                            • GetKeyState.USER32(000000A1), ref: 00A3A0F4
                            • GetAsyncKeyState.USER32(00000011), ref: 00A3A120
                            • GetKeyState.USER32(00000011), ref: 00A3A12E
                            • GetAsyncKeyState.USER32(00000012), ref: 00A3A157
                            • GetKeyState.USER32(00000012), ref: 00A3A165
                            • GetAsyncKeyState.USER32(0000005B), ref: 00A3A18E
                            • GetKeyState.USER32(0000005B), ref: 00A3A19C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 39ed187b681d5b5eff40ed2620fb2e738413097c2e0a844dec36e74821ec63ca
                            • Instruction ID: 99b5681a7b290110f5237a6dbb2306c402b73b8729c1415520cfd63a4de62402
                            • Opcode Fuzzy Hash: 39ed187b681d5b5eff40ed2620fb2e738413097c2e0a844dec36e74821ec63ca
                            • Instruction Fuzzy Hash: E351AB30A047942AFB35DBA089157EBFFB55F22340F08869DF5C6571C2DA949E4CC762
                            APIs
                            • GetDlgItem.USER32(?,00000001), ref: 00A35CE2
                            • GetWindowRect.USER32(00000000,?), ref: 00A35CFB
                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00A35D59
                            • GetDlgItem.USER32(?,00000002), ref: 00A35D69
                            • GetWindowRect.USER32(00000000,?), ref: 00A35D7B
                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00A35DCF
                            • GetDlgItem.USER32(?,000003E9), ref: 00A35DDD
                            • GetWindowRect.USER32(00000000,?), ref: 00A35DEF
                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00A35E31
                            • GetDlgItem.USER32(?,000003EA), ref: 00A35E44
                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A35E5A
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00A35E67
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$ItemMoveRect$Invalidate
                            • String ID:
                            • API String ID: 3096461208-0
                            • Opcode ID: 3761ddc7b83fad966d895da24938d0d9ded89e399ca172be0c49b5a4178157b5
                            • Instruction ID: cd8f3612b92537d23d90077c3f1b8f940d6282d8d3bd0c2ba9fa1ca03ebbd95b
                            • Opcode Fuzzy Hash: 3761ddc7b83fad966d895da24938d0d9ded89e399ca172be0c49b5a4178157b5
                            • Instruction Fuzzy Hash: 9C510CB5F00605AFDF18CFA8DD89AAEBBB5EF48311F548129F515E6290D7B09E01CB60
                            APIs
                              • Part of subcall function 009E8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009E8BE8,?,00000000,?,?,?,?,009E8BBA,00000000,?), ref: 009E8FC5
                            • DestroyWindow.USER32(?), ref: 009E8C81
                            • KillTimer.USER32(00000000,?,?,?,?,009E8BBA,00000000,?), ref: 009E8D1B
                            • DestroyAcceleratorTable.USER32(00000000), ref: 00A26973
                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,009E8BBA,00000000,?), ref: 00A269A1
                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,009E8BBA,00000000,?), ref: 00A269B8
                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,009E8BBA,00000000), ref: 00A269D4
                            • DeleteObject.GDI32(00000000), ref: 00A269E6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                            • String ID:
                            • API String ID: 641708696-0
                            • Opcode ID: 534f9b87d6ba7bed350c4949a10411b36f47a2c71c676df332a28ae679b1f979
                            • Instruction ID: 55e74b0900f5af765f8bf719ea4f5030218b126c71c4be14c45da0b33c76dc62
                            • Opcode Fuzzy Hash: 534f9b87d6ba7bed350c4949a10411b36f47a2c71c676df332a28ae679b1f979
                            • Instruction Fuzzy Hash: 4361AF30502651EFCB22DFAAD94872777F1FB46312F244929E086979A0CB75AD82DF90
                            APIs
                              • Part of subcall function 009E9944: GetWindowLongW.USER32(?,000000EB), ref: 009E9952
                            • GetSysColor.USER32(0000000F), ref: 009E9862
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ColorLongWindow
                            • String ID:
                            • API String ID: 259745315-0
                            • Opcode ID: 8440992430d3a42ee71360f754d39bfe7b0c5fdc67d1cc9168f623be97385adc
                            • Instruction ID: b4b24729f972e5908f87989b6c420943932b6eaba1b686fed7b68765a2d2785e
                            • Opcode Fuzzy Hash: 8440992430d3a42ee71360f754d39bfe7b0c5fdc67d1cc9168f623be97385adc
                            • Instruction Fuzzy Hash: 8741D131104690AFDB219F799C84BB93BA9AB07330F144615F9A2872F2D7709D42DB11
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00A1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00A39717
                            • LoadStringW.USER32(00000000,?,00A1F7F8,00000001), ref: 00A39720
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00A1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00A39742
                            • LoadStringW.USER32(00000000,?,00A1F7F8,00000001), ref: 00A39745
                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00A39866
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message_wcslen
                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                            • API String ID: 747408836-2268648507
                            • Opcode ID: 164f255f36d0ebef5f93680ad8c8f95a96402f230e25f5265dc0881a64f0cfc1
                            • Instruction ID: 8edba3955f8811bcec7c69c0889976db6faa43dee3a480cf1e86f7fb5d7af0a1
                            • Opcode Fuzzy Hash: 164f255f36d0ebef5f93680ad8c8f95a96402f230e25f5265dc0881a64f0cfc1
                            • Instruction Fuzzy Hash: 5E418372940209AADF04FBE0DE82EEFB778AF95340F508026F10572192EB756F59CB61
                            APIs
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A307A2
                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A307BE
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A307DA
                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A30804
                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00A3082C
                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A30837
                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A3083C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                            • API String ID: 323675364-22481851
                            • Opcode ID: e33c7e7eadc089ef9dde733eaf46f5199c3abe6b2ae366377c44e9bd0a95900c
                            • Instruction ID: 24481ec68b16dd94b08132c6180970eea3d18414eb19d659ed83d5ebe8f34eb7
                            • Opcode Fuzzy Hash: e33c7e7eadc089ef9dde733eaf46f5199c3abe6b2ae366377c44e9bd0a95900c
                            • Instruction Fuzzy Hash: 1B413972D00228ABDF11EBA4DC95DEDB778FF44750F04812AF901A32A0EB709E04CB90
                            APIs
                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A6403B
                            • CreateCompatibleDC.GDI32(00000000), ref: 00A64042
                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A64055
                            • SelectObject.GDI32(00000000,00000000), ref: 00A6405D
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A64068
                            • DeleteDC.GDI32(00000000), ref: 00A64072
                            • GetWindowLongW.USER32(?,000000EC), ref: 00A6407C
                            • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00A64092
                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00A6409E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                            • String ID: static
                            • API String ID: 2559357485-2160076837
                            • Opcode ID: 6ff4cb28ddec4726622b15828b9a6821c5247508381a0f35d6862985517efee7
                            • Instruction ID: 0ecef4299042f4c840e5a1f130bddc8b2fa04f6c62dbdddd4a8affe538503e24
                            • Opcode Fuzzy Hash: 6ff4cb28ddec4726622b15828b9a6821c5247508381a0f35d6862985517efee7
                            • Instruction Fuzzy Hash: 1B315A32501215BBDF219FA4CC09FEA3BB8EF0E720F110211FA65A61A0C7B9D851DBA4
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00A53C5C
                            • CoInitialize.OLE32(00000000), ref: 00A53C8A
                            • CoUninitialize.OLE32 ref: 00A53C94
                            • _wcslen.LIBCMT ref: 00A53D2D
                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00A53DB1
                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A53ED5
                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00A53F0E
                            • CoGetObject.OLE32(?,00000000,00A6FB98,?), ref: 00A53F2D
                            • SetErrorMode.KERNEL32(00000000), ref: 00A53F40
                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A53FC4
                            • VariantClear.OLEAUT32(?), ref: 00A53FD8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                            • String ID:
                            • API String ID: 429561992-0
                            • Opcode ID: a4305eb6631d216b74d767ab606f6750453c1f5f3f2e89edabf427d91a20fa74
                            • Instruction ID: 35ce5df5daa7c0c339833e3c439853883b86e69e0804b3c12d9620256693feb2
                            • Opcode Fuzzy Hash: a4305eb6631d216b74d767ab606f6750453c1f5f3f2e89edabf427d91a20fa74
                            • Instruction Fuzzy Hash: 4EC114726082059FDB00DF68C88492AB7F9FFC9789F10491DF98A9B211D771EE09CB52
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 00A47AF3
                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A47B8F
                            • SHGetDesktopFolder.SHELL32(?), ref: 00A47BA3
                            • CoCreateInstance.OLE32(00A6FD08,00000000,00000001,00A96E6C,?), ref: 00A47BEF
                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A47C74
                            • CoTaskMemFree.OLE32(?,?), ref: 00A47CCC
                            • SHBrowseForFolderW.SHELL32(?), ref: 00A47D57
                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A47D7A
                            • CoTaskMemFree.OLE32(00000000), ref: 00A47D81
                            • CoTaskMemFree.OLE32(00000000), ref: 00A47DD6
                            • CoUninitialize.OLE32 ref: 00A47DDC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                            • String ID:
                            • API String ID: 2762341140-0
                            • Opcode ID: 2998b2fda25ef6fa5ecf5ca006c6a4b39626df880d9e30043c40fa300d9dec8f
                            • Instruction ID: 3107dc67c9909de69329e825f028c831e5319e1fa787cd5499030340ff4fb66c
                            • Opcode Fuzzy Hash: 2998b2fda25ef6fa5ecf5ca006c6a4b39626df880d9e30043c40fa300d9dec8f
                            • Instruction Fuzzy Hash: 6DC10B75A04159AFCB14DFA4C888DAEBBF9FF88314B148499F81A9B361D730ED45CB90
                            APIs
                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A65504
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A65515
                            • CharNextW.USER32(00000158), ref: 00A65544
                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A65585
                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A6559B
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A655AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CharNext
                            • String ID:
                            • API String ID: 1350042424-0
                            • Opcode ID: f5eb3b16b5270f8493406180c2b86e4fdc6e87993dcc98c3ef82f373cd2d3b22
                            • Instruction ID: 0024efb9d21f7cd391de7e64d7fbcb28da99880de5d429fbcc991e8a8a7f445d
                            • Opcode Fuzzy Hash: f5eb3b16b5270f8493406180c2b86e4fdc6e87993dcc98c3ef82f373cd2d3b22
                            • Instruction Fuzzy Hash: D6617E75D04609AFDF10DFB4CC889FE7BB9EB09724F108145F965A7290DB788A81DB60
                            APIs
                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A2FAAF
                            • SafeArrayAllocData.OLEAUT32(?), ref: 00A2FB08
                            • VariantInit.OLEAUT32(?), ref: 00A2FB1A
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A2FB3A
                            • VariantCopy.OLEAUT32(?,?), ref: 00A2FB8D
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A2FBA1
                            • VariantClear.OLEAUT32(?), ref: 00A2FBB6
                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00A2FBC3
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A2FBCC
                            • VariantClear.OLEAUT32(?), ref: 00A2FBDE
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A2FBE9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                            • String ID:
                            • API String ID: 2706829360-0
                            • Opcode ID: 828744eb48e67960d34abd6edee88ae9e948580e46842be85da300f12f9d1673
                            • Instruction ID: 84cdfa958f7d2dca203dbb39beed60b559b2c57bc51b7f72d923f5d99b7051f2
                            • Opcode Fuzzy Hash: 828744eb48e67960d34abd6edee88ae9e948580e46842be85da300f12f9d1673
                            • Instruction Fuzzy Hash: 35411375A002199FCB04DFA8D8589BDBBB9FF48354F008075E955A7261DB70E946CF90
                            APIs
                            • GetKeyboardState.USER32(?), ref: 00A39CA1
                            • GetAsyncKeyState.USER32(000000A0), ref: 00A39D22
                            • GetKeyState.USER32(000000A0), ref: 00A39D3D
                            • GetAsyncKeyState.USER32(000000A1), ref: 00A39D57
                            • GetKeyState.USER32(000000A1), ref: 00A39D6C
                            • GetAsyncKeyState.USER32(00000011), ref: 00A39D84
                            • GetKeyState.USER32(00000011), ref: 00A39D96
                            • GetAsyncKeyState.USER32(00000012), ref: 00A39DAE
                            • GetKeyState.USER32(00000012), ref: 00A39DC0
                            • GetAsyncKeyState.USER32(0000005B), ref: 00A39DD8
                            • GetKeyState.USER32(0000005B), ref: 00A39DEA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 8ee5678754bad5058751b680fb99506bb222ec8eed842e0063ac2e8a20f0bb9b
                            • Instruction ID: 9229a3d121b373a86aaaefa96ec7d32f9982518b4b4c4bd0326b3dca3019b97a
                            • Opcode Fuzzy Hash: 8ee5678754bad5058751b680fb99506bb222ec8eed842e0063ac2e8a20f0bb9b
                            • Instruction Fuzzy Hash: 424194345047CA6DFF31976588053B7FEA06F11354F04805AEAC6566C2DBE599C8CBA2
                            APIs
                            • WSAStartup.WSOCK32(00000101,?), ref: 00A505BC
                            • inet_addr.WSOCK32(?), ref: 00A5061C
                            • gethostbyname.WSOCK32(?), ref: 00A50628
                            • IcmpCreateFile.IPHLPAPI ref: 00A50636
                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A506C6
                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A506E5
                            • IcmpCloseHandle.IPHLPAPI(?), ref: 00A507B9
                            • WSACleanup.WSOCK32 ref: 00A507BF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                            • String ID: Ping
                            • API String ID: 1028309954-2246546115
                            • Opcode ID: 0cd24c4a3ab756ba2b89baed3a93243c7df7f1b4e1ef4d57131823b6f814b40a
                            • Instruction ID: c60900b7c15bffdfcf84a6600ab8a152c3523fbfd7c709e98c2d8f7b86a74912
                            • Opcode Fuzzy Hash: 0cd24c4a3ab756ba2b89baed3a93243c7df7f1b4e1ef4d57131823b6f814b40a
                            • Instruction Fuzzy Hash: 34917D756046019FD320DF15C488F1ABBE0BF88319F1485A9F8A99B7A2D770ED49CF91
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharLower
                            • String ID: cdecl$none$stdcall$winapi
                            • API String ID: 707087890-567219261
                            • Opcode ID: fba9101f2c4384f643a9b2cb8cede2fc7835ee92f693a42a6137d7a12778615a
                            • Instruction ID: 865df26b11335768389b6582d1a032801a12e822b96bbb8c62a4b3a000a30dac
                            • Opcode Fuzzy Hash: fba9101f2c4384f643a9b2cb8cede2fc7835ee92f693a42a6137d7a12778615a
                            • Instruction Fuzzy Hash: 1D51AD32A001169BCF14DF68C9419BEB3F5BF64725B204229ED66F7284EB39DE48C790
                            APIs
                            • CoInitialize.OLE32 ref: 00A53774
                            • CoUninitialize.OLE32 ref: 00A5377F
                            • CoCreateInstance.OLE32(?,00000000,00000017,00A6FB78,?), ref: 00A537D9
                            • IIDFromString.OLE32(?,?), ref: 00A5384C
                            • VariantInit.OLEAUT32(?), ref: 00A538E4
                            • VariantClear.OLEAUT32(?), ref: 00A53936
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                            • API String ID: 636576611-1287834457
                            • Opcode ID: 3dac91a5ada88b620b9eb999f1a355031c44aa46c831a634c094f8f53317aea1
                            • Instruction ID: 35f994a0a6d8314a60a3e5ecfbd5809211d8b9f384df995505cf3d7b75993885
                            • Opcode Fuzzy Hash: 3dac91a5ada88b620b9eb999f1a355031c44aa46c831a634c094f8f53317aea1
                            • Instruction Fuzzy Hash: D3619F72608301AFDB11DF54C889B6ABBF4FF88755F104909F9859B291D770EE48CBA2
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A433CF
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A433F0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LoadString$_wcslen
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                            • API String ID: 4099089115-3080491070
                            • Opcode ID: 4fc079d6b9e050b49ba1002e34a7371627934015f70f3abccdc04705f9a5ada5
                            • Instruction ID: 91db4a6a047096a9b4eae631fc258bdda0a2f49af7853f731ca7b96ddffb2c57
                            • Opcode Fuzzy Hash: 4fc079d6b9e050b49ba1002e34a7371627934015f70f3abccdc04705f9a5ada5
                            • Instruction Fuzzy Hash: E051A132940209BADF15EBE0DE46EEEB7B8AF54340F108466F505721A2EB712F58DB61
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                            • API String ID: 1256254125-769500911
                            • Opcode ID: 3833503e1de4ce515e3b8cc4f19a2dce4b2d0b66f2eaa938cdff5061f329734d
                            • Instruction ID: 78af5b6b29ae883f1e6d72640be4758def5325aa596ebacc03c26e97ce8fa38e
                            • Opcode Fuzzy Hash: 3833503e1de4ce515e3b8cc4f19a2dce4b2d0b66f2eaa938cdff5061f329734d
                            • Instruction Fuzzy Hash: 5941F732B110269BCB105F7DC8925BE77B6AFA0B94F24412AF621DB285E731CD81C7A0
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00A453A0
                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A45416
                            • GetLastError.KERNEL32 ref: 00A45420
                            • SetErrorMode.KERNEL32(00000000,READY), ref: 00A454A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Error$Mode$DiskFreeLastSpace
                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                            • API String ID: 4194297153-14809454
                            • Opcode ID: d526bd53afcaf78221e7e2a5630997c842895f7cad8837643e4be9533068eca4
                            • Instruction ID: 34225f6bd4c6b54a01af5e115ba98deca50fbe8bf55c0557edaff17ec7e77ea9
                            • Opcode Fuzzy Hash: d526bd53afcaf78221e7e2a5630997c842895f7cad8837643e4be9533068eca4
                            • Instruction Fuzzy Hash: 70317C39E006049FCB10DF78C484BAABBB5EF95345F148066E405CF2A2DB75DD86CB90
                            APIs
                            • CreateMenu.USER32 ref: 00A63C79
                            • SetMenu.USER32(?,00000000), ref: 00A63C88
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A63D10
                            • IsMenu.USER32(?), ref: 00A63D24
                            • CreatePopupMenu.USER32 ref: 00A63D2E
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A63D5B
                            • DrawMenuBar.USER32 ref: 00A63D63
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                            • String ID: 0$F
                            • API String ID: 161812096-3044882817
                            • Opcode ID: 2773c7eb76a533facf5767b05ee236aa6030a458695aa8a7cd6ae8959aed3fc7
                            • Instruction ID: 45c91551febdc8baadac86060052df4beb68b8f5990cc60a6cb6214833940b32
                            • Opcode Fuzzy Hash: 2773c7eb76a533facf5767b05ee236aa6030a458695aa8a7cd6ae8959aed3fc7
                            • Instruction Fuzzy Hash: BF41597AA01209EFDF14CFA4DC44AAA7BB5FF49350F140429F946A7360D770AA12CF94
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00A31F64
                            • GetDlgCtrlID.USER32 ref: 00A31F6F
                            • GetParent.USER32 ref: 00A31F8B
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A31F8E
                            • GetDlgCtrlID.USER32(?), ref: 00A31F97
                            • GetParent.USER32(?), ref: 00A31FAB
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A31FAE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 711023334-1403004172
                            • Opcode ID: 711a4686572a328fe19c863b861b5df9030e7ff42995596b9b05c39680208d9f
                            • Instruction ID: f68881143714912d47e8576723f00fec7ef6501b06aa3d5c02997555fc1ea57d
                            • Opcode Fuzzy Hash: 711a4686572a328fe19c863b861b5df9030e7ff42995596b9b05c39680208d9f
                            • Instruction Fuzzy Hash: E621CF75A00214BBCF05EFA0DC85EFEBBB8EF05310F009116F9A5A72A1DB785909DB64
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00A32043
                            • GetDlgCtrlID.USER32 ref: 00A3204E
                            • GetParent.USER32 ref: 00A3206A
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A3206D
                            • GetDlgCtrlID.USER32(?), ref: 00A32076
                            • GetParent.USER32(?), ref: 00A3208A
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A3208D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 711023334-1403004172
                            • Opcode ID: 31f9d4ba6a81cba06f7c18d773e9be46b717867673ba9b6c4dd99227b000a709
                            • Instruction ID: 522273c8f3b6fb583ac347f14fe4148b27a6c01c23e3156ba76910f8d281012d
                            • Opcode Fuzzy Hash: 31f9d4ba6a81cba06f7c18d773e9be46b717867673ba9b6c4dd99227b000a709
                            • Instruction Fuzzy Hash: 2321C275A40214BBCF15EFA0CC45EFEBBB8AF05310F005406F995A72A1DA794919DB60
                            APIs
                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A63A9D
                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A63AA0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A63AC7
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A63AEA
                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A63B62
                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00A63BAC
                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00A63BC7
                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00A63BE2
                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00A63BF6
                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00A63C13
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow
                            • String ID:
                            • API String ID: 312131281-0
                            • Opcode ID: b486e3bd015e5b52cfe6439775ce0872bad2721e402678735a849483e04e7bbe
                            • Instruction ID: ee79a5fca812742bc9d3909f8de0e1f5d62b5b4adfb206f3acf345b561c323aa
                            • Opcode Fuzzy Hash: b486e3bd015e5b52cfe6439775ce0872bad2721e402678735a849483e04e7bbe
                            • Instruction Fuzzy Hash: 5D617B75900208AFDB10DFA8CC81EEE77B8EF09714F10419AFA15E72A1D774AE46DB50
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00A3B151
                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B165
                            • GetWindowThreadProcessId.USER32(00000000), ref: 00A3B16C
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B17B
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A3B18D
                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B1A6
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B1B8
                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B1FD
                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B212
                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00A3A1E1,?,00000001), ref: 00A3B21D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                            • String ID:
                            • API String ID: 2156557900-0
                            • Opcode ID: e5a82ac0a00cbc34434c43ac182f2ad1994b47a55b55e37237dd9a41d8fa847d
                            • Instruction ID: 44b2f008ab4fc34ddd2fb62d199d9b8902760f51883b7a6affabb09835d8ea70
                            • Opcode Fuzzy Hash: e5a82ac0a00cbc34434c43ac182f2ad1994b47a55b55e37237dd9a41d8fa847d
                            • Instruction Fuzzy Hash: 78318976520205AFDF11DFA4DC49BBEBBBAAB52321F104205FA06D61A0D7B49A428F74
                            APIs
                            • _free.LIBCMT ref: 00A02C94
                              • Part of subcall function 00A029C8: HeapFree.KERNEL32(00000000,00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000), ref: 00A029DE
                              • Part of subcall function 00A029C8: GetLastError.KERNEL32(00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000,00000000), ref: 00A029F0
                            • _free.LIBCMT ref: 00A02CA0
                            • _free.LIBCMT ref: 00A02CAB
                            • _free.LIBCMT ref: 00A02CB6
                            • _free.LIBCMT ref: 00A02CC1
                            • _free.LIBCMT ref: 00A02CCC
                            • _free.LIBCMT ref: 00A02CD7
                            • _free.LIBCMT ref: 00A02CE2
                            • _free.LIBCMT ref: 00A02CED
                            • _free.LIBCMT ref: 00A02CFB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 1330bf1d07e7df4dfacbceff1eb53df0aff2a9158428674dc88532db73af5797
                            • Instruction ID: 9aa58072f4c879f43000026c62912544671a0dc965f796dcfa1d40f8b10e67a7
                            • Opcode Fuzzy Hash: 1330bf1d07e7df4dfacbceff1eb53df0aff2a9158428674dc88532db73af5797
                            • Instruction Fuzzy Hash: 8611B97610020CBFCB02EF54EA46EDD3BA9FF45390F5144A5F9485F262D631EE509B90
                            APIs
                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009D1459
                            • OleUninitialize.OLE32(?,00000000), ref: 009D14F8
                            • UnregisterHotKey.USER32(?), ref: 009D16DD
                            • DestroyWindow.USER32(?), ref: 00A124B9
                            • FreeLibrary.KERNEL32(?), ref: 00A1251E
                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A1254B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                            • String ID: close all
                            • API String ID: 469580280-3243417748
                            • Opcode ID: 32797716f807c7c62ab3a4c1577ead61e0f16a22d2c1ffa6d9a6db858301213b
                            • Instruction ID: c6f4d752118615f163d31f9bc86c1abfe0d3092b5aaf7dc5d87f019c6b3f3fc6
                            • Opcode Fuzzy Hash: 32797716f807c7c62ab3a4c1577ead61e0f16a22d2c1ffa6d9a6db858301213b
                            • Instruction Fuzzy Hash: 42D189327412129FCB29EF15C895B69F7A5BF45710F1481AEE44A6B361CB30EC62CF50
                            APIs
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A47FAD
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A47FC1
                            • GetFileAttributesW.KERNEL32(?), ref: 00A47FEB
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00A48005
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A48017
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00A48060
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A480B0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CurrentDirectory$AttributesFile
                            • String ID: *.*
                            • API String ID: 769691225-438819550
                            • Opcode ID: b29f2cbf49bc16c128da5777b1a88ab74b42eeda15e3f5eb5eea9c58acc1d84a
                            • Instruction ID: f389dc84576b085bb3696c8a1c028ac577361f1a6120235a2dfa6de1324f941b
                            • Opcode Fuzzy Hash: b29f2cbf49bc16c128da5777b1a88ab74b42eeda15e3f5eb5eea9c58acc1d84a
                            • Instruction Fuzzy Hash: DF81BE765082819BCB20EF54C845AAEB3E8BFC8310F548D6EF885D7250EB75DD49CB92
                            APIs
                            • SetWindowLongW.USER32(?,000000EB), ref: 009D5C7A
                              • Part of subcall function 009D5D0A: GetClientRect.USER32(?,?), ref: 009D5D30
                              • Part of subcall function 009D5D0A: GetWindowRect.USER32(?,?), ref: 009D5D71
                              • Part of subcall function 009D5D0A: ScreenToClient.USER32(?,?), ref: 009D5D99
                            • GetDC.USER32 ref: 00A146F5
                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A14708
                            • SelectObject.GDI32(00000000,00000000), ref: 00A14716
                            • SelectObject.GDI32(00000000,00000000), ref: 00A1472B
                            • ReleaseDC.USER32(?,00000000), ref: 00A14733
                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A147C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                            • String ID: U
                            • API String ID: 4009187628-3372436214
                            • Opcode ID: aa15e6cc0f9f99c967230ce2af2099269d4bbfd7f7a27671a0b98525c6d6c508
                            • Instruction ID: 3778a15a7b266d35925c63f4699776adb694dbcfa1289844436abaebc7795f2b
                            • Opcode Fuzzy Hash: aa15e6cc0f9f99c967230ce2af2099269d4bbfd7f7a27671a0b98525c6d6c508
                            • Instruction Fuzzy Hash: 9C71E134500205EFCF21CF68C984AFA3BB6FF4A365F14426AEDA55A2A6C7319C81DF50
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00A435E4
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • LoadStringW.USER32(00AA2390,?,00000FFF,?), ref: 00A4360A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LoadString$_wcslen
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                            • API String ID: 4099089115-2391861430
                            • Opcode ID: 1e5dfa46b408242052ef5a0e38822e6f4a838b9ecfef99325802d54411389aed
                            • Instruction ID: c901758ad5643ceb3807634070b66b1ddb58bd611122474724c16e53599e79ac
                            • Opcode Fuzzy Hash: 1e5dfa46b408242052ef5a0e38822e6f4a838b9ecfef99325802d54411389aed
                            • Instruction Fuzzy Hash: E451807294020ABADF14EFE0DD42EEEBB78AF94350F048126F105721A1EB711B99DF61
                            APIs
                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A4C272
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A4C29A
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A4C2CA
                            • GetLastError.KERNEL32 ref: 00A4C322
                            • SetEvent.KERNEL32(?), ref: 00A4C336
                            • InternetCloseHandle.WININET(00000000), ref: 00A4C341
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                            • String ID:
                            • API String ID: 3113390036-3916222277
                            • Opcode ID: 7554a5bfad5f2642b2de5dae411cec63da5001ed130540d0f86e72e041192e90
                            • Instruction ID: e92453d044ffe95721ae259277c9ca35278cfcbafb15e1c1508293324f362faa
                            • Opcode Fuzzy Hash: 7554a5bfad5f2642b2de5dae411cec63da5001ed130540d0f86e72e041192e90
                            • Instruction Fuzzy Hash: BB31B1B5601304AFD761DFA48C88ABBBBFCEB89760B10851DF48AD7200DB70ED059B60
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00A13AAF,?,?,Bad directive syntax error,00A6CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00A398BC
                            • LoadStringW.USER32(00000000,?,00A13AAF,?), ref: 00A398C3
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00A39987
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HandleLoadMessageModuleString_wcslen
                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                            • API String ID: 858772685-4153970271
                            • Opcode ID: 227b86502595738b955bc23b21c9dc3fd4643043c54e45340e1f274cf1744980
                            • Instruction ID: 717e9ab3800e6f01adaec199a9aaae479de2bb3076f9143a87d8e683cffb6d6f
                            • Opcode Fuzzy Hash: 227b86502595738b955bc23b21c9dc3fd4643043c54e45340e1f274cf1744980
                            • Instruction Fuzzy Hash: 7621A03194021ABBCF11EFA0CD06FEE7775BF58300F048416F519661A2EB719A28DB11
                            APIs
                            • GetParent.USER32 ref: 00A320AB
                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00A320C0
                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A3214D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameParentSend
                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                            • API String ID: 1290815626-3381328864
                            • Opcode ID: aaafd01cbee6d6471e95b07a000ce56e6cf2054165278d940871e569e46c7892
                            • Instruction ID: 5b3e52329a57812502ff42fb4491587ccd56c23beda5d58df8b02871df5205a9
                            • Opcode Fuzzy Hash: aaafd01cbee6d6471e95b07a000ce56e6cf2054165278d940871e569e46c7892
                            • Instruction Fuzzy Hash: 0011C67A68870AB9FA066730ED07FB737ACDB05724F200256FB04A50E1FEA5A9425718
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 30147a540a3e4a2f48a490a804e04c9eb507a6befae2bb51493c2f85b8d83dce
                            • Instruction ID: 555ed3636f7c66e4aa50d5c1c54fc1e4a2513be233bd27fe8add4462bab09402
                            • Opcode Fuzzy Hash: 30147a540a3e4a2f48a490a804e04c9eb507a6befae2bb51493c2f85b8d83dce
                            • Instruction Fuzzy Hash: FAC1F174A0424EAFDF11DFA8E841BAEBBB0BF4A310F144199F955A73D2C7349942CB60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                            • String ID:
                            • API String ID: 1282221369-0
                            • Opcode ID: 642c65fb24a8280d58e097f69f3ad6b7c2214774e7339eaf409ce971a7bc2ab4
                            • Instruction ID: 9dfd85081920f8d048899b19525f816cbed648091cb7d27a58a57391a7324762
                            • Opcode Fuzzy Hash: 642c65fb24a8280d58e097f69f3ad6b7c2214774e7339eaf409ce971a7bc2ab4
                            • Instruction Fuzzy Hash: 3661647290430EAFDB21AFF4B885B7E7BA5AF05360F14426DF945A72C2E73199018791
                            APIs
                            • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00A65186
                            • ShowWindow.USER32(?,00000000), ref: 00A651C7
                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 00A651CD
                            • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00A651D1
                              • Part of subcall function 00A66FBA: DeleteObject.GDI32(00000000), ref: 00A66FE6
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A6520D
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A6521A
                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A6524D
                            • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00A65287
                            • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00A65296
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                            • String ID:
                            • API String ID: 3210457359-0
                            • Opcode ID: cb807abbbdeee92f0b0b831ff123e8780b38dd608860fb88829f3572d166e877
                            • Instruction ID: 0ab429ab5d390c49abcc72c55ca32f92196f9bd395ea60425d99f26fbf4b9685
                            • Opcode Fuzzy Hash: cb807abbbdeee92f0b0b831ff123e8780b38dd608860fb88829f3572d166e877
                            • Instruction Fuzzy Hash: 5651BF70E40A09BFEF20AF74CC5ABD93B75FB06321F148212F625962E0C3B5A990DB51
                            APIs
                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00A26890
                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00A268A9
                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A268B9
                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00A268D1
                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A268F2
                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,009E8874,00000000,00000000,00000000,000000FF,00000000), ref: 00A26901
                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A2691E
                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,009E8874,00000000,00000000,00000000,000000FF,00000000), ref: 00A2692D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                            • String ID:
                            • API String ID: 1268354404-0
                            • Opcode ID: b2575c49d15c4c6b57ca357643caeedbe0550be9590bf14cd2042d28f2380403
                            • Instruction ID: dc6e9408db7e63f78221bc90d05ff194b4a2ccadfc2fc6e1a9d665eadcd71d4c
                            • Opcode Fuzzy Hash: b2575c49d15c4c6b57ca357643caeedbe0550be9590bf14cd2042d28f2380403
                            • Instruction Fuzzy Hash: 1E51AA70600209EFDB21CFA9DC55BAA7BB5EB48760F144528F946972E0DBB0ED91DB40
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A4C182
                            • GetLastError.KERNEL32 ref: 00A4C195
                            • SetEvent.KERNEL32(?), ref: 00A4C1A9
                              • Part of subcall function 00A4C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A4C272
                              • Part of subcall function 00A4C253: GetLastError.KERNEL32 ref: 00A4C322
                              • Part of subcall function 00A4C253: SetEvent.KERNEL32(?), ref: 00A4C336
                              • Part of subcall function 00A4C253: InternetCloseHandle.WININET(00000000), ref: 00A4C341
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                            • String ID:
                            • API String ID: 337547030-0
                            • Opcode ID: aa7a18b7eb0d0123bd7d05c2a98c709c10476ff4a53c2bdd87bfb5dd42de5689
                            • Instruction ID: 9acebaafe7c0ea8eab808817df2235678fa66637335b8c670aeb3299ffd4fdd3
                            • Opcode Fuzzy Hash: aa7a18b7eb0d0123bd7d05c2a98c709c10476ff4a53c2bdd87bfb5dd42de5689
                            • Instruction Fuzzy Hash: 0E31C174102701AFDB60AFF4DD04AB6BBF8FF98320B10451DF98A82210D7B1E8119B60
                            APIs
                              • Part of subcall function 00A33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A33A57
                              • Part of subcall function 00A33A3D: GetCurrentThreadId.KERNEL32 ref: 00A33A5E
                              • Part of subcall function 00A33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A325B3), ref: 00A33A65
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A325BD
                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A325DB
                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00A325DF
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A325E9
                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A32601
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00A32605
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A3260F
                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A32623
                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00A32627
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                            • String ID:
                            • API String ID: 2014098862-0
                            • Opcode ID: 608ac96e70f3146d83b9e443ed1463fabb9bf7498336193052e80b1a834f1762
                            • Instruction ID: 52936f58982af30dad9506bdc578e85169fbd988e7cf357590b96b1f92f0dc06
                            • Opcode Fuzzy Hash: 608ac96e70f3146d83b9e443ed1463fabb9bf7498336193052e80b1a834f1762
                            • Instruction Fuzzy Hash: D501D831794220BBFB10B7A8DC8AF693F69DF4EB61F100011F354AE0D1C9E224458A69
                            APIs
                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00A31449,?,?,00000000), ref: 00A3180C
                            • HeapAlloc.KERNEL32(00000000,?,00A31449,?,?,00000000), ref: 00A31813
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A31449,?,?,00000000), ref: 00A31828
                            • GetCurrentProcess.KERNEL32(?,00000000,?,00A31449,?,?,00000000), ref: 00A31830
                            • DuplicateHandle.KERNEL32(00000000,?,00A31449,?,?,00000000), ref: 00A31833
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A31449,?,?,00000000), ref: 00A31843
                            • GetCurrentProcess.KERNEL32(00A31449,00000000,?,00A31449,?,?,00000000), ref: 00A3184B
                            • DuplicateHandle.KERNEL32(00000000,?,00A31449,?,?,00000000), ref: 00A3184E
                            • CreateThread.KERNEL32(00000000,00000000,00A31874,00000000,00000000,00000000), ref: 00A31868
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                            • String ID:
                            • API String ID: 1957940570-0
                            • Opcode ID: 53249b2d62459142d48e067ea7903badfe96706a1e950cfabeec1ca126457e84
                            • Instruction ID: 0df333218c524e6f03c2b5fa81052268ff6d35688e741c0688b04baed78c5029
                            • Opcode Fuzzy Hash: 53249b2d62459142d48e067ea7903badfe96706a1e950cfabeec1ca126457e84
                            • Instruction Fuzzy Hash: 9101BBB5240348BFE710EBA5DC4DF6B7BACEB8AB11F004511FA45DB2A1CAB19801CB30
                            APIs
                              • Part of subcall function 00A3D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00A3D501
                              • Part of subcall function 00A3D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00A3D50F
                              • Part of subcall function 00A3D4DC: CloseHandle.KERNEL32(00000000), ref: 00A3D5DC
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A5A16D
                            • GetLastError.KERNEL32 ref: 00A5A180
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A5A1B3
                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A5A268
                            • GetLastError.KERNEL32(00000000), ref: 00A5A273
                            • CloseHandle.KERNEL32(00000000), ref: 00A5A2C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                            • String ID: SeDebugPrivilege
                            • API String ID: 2533919879-2896544425
                            • Opcode ID: 65e59a3e158b581206de0d8476e0152e5a316e25ce6f8502145631e7b145c1cf
                            • Instruction ID: 7950db6478816e7c229ff0844088cf3989a034f17756b26467814333b2ae1fea
                            • Opcode Fuzzy Hash: 65e59a3e158b581206de0d8476e0152e5a316e25ce6f8502145631e7b145c1cf
                            • Instruction Fuzzy Hash: FB619F702046429FD710DF18C495F69BBE1BF54319F14858CE8568B7A3C776EC4ACB92
                            APIs
                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A63925
                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00A6393A
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A63954
                            • _wcslen.LIBCMT ref: 00A63999
                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A639C6
                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A639F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$Window_wcslen
                            • String ID: SysListView32
                            • API String ID: 2147712094-78025650
                            • Opcode ID: 18b005d38ec8fdf63bafa4c3c0ce048dd3eebd27277d6b616968b01f98ab3216
                            • Instruction ID: 18f8393fd5749d2d12b80741a56d894b263e3da0e6703d14bfc87462f3bc075f
                            • Opcode Fuzzy Hash: 18b005d38ec8fdf63bafa4c3c0ce048dd3eebd27277d6b616968b01f98ab3216
                            • Instruction Fuzzy Hash: 9A418272A00219ABEF219FA4CC45FEA7BB9EF48354F100526F958E7281D7B59981CB90
                            APIs
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A3BCFD
                            • IsMenu.USER32(00000000), ref: 00A3BD1D
                            • CreatePopupMenu.USER32 ref: 00A3BD53
                            • GetMenuItemCount.USER32(00B95A68), ref: 00A3BDA4
                            • InsertMenuItemW.USER32(00B95A68,?,00000001,00000030), ref: 00A3BDCC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                            • String ID: 0$2
                            • API String ID: 93392585-3793063076
                            • Opcode ID: 95fbd6b7ad45a3ec41dca9ae64f9798261541d6964994e16c8d1728d02afadc2
                            • Instruction ID: 7b0c50b415e8b98b04a24dc62f92133d2397d3d2edb32f20e45193302517d81c
                            • Opcode Fuzzy Hash: 95fbd6b7ad45a3ec41dca9ae64f9798261541d6964994e16c8d1728d02afadc2
                            • Instruction Fuzzy Hash: 6951BF70A102099BDF20DFA8D984BAEBBF6BF453A4F24411AF641E7291D7709941CB71
                            APIs
                            • LoadIconW.USER32(00000000,00007F03), ref: 00A3C913
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: IconLoad
                            • String ID: blank$info$question$stop$warning
                            • API String ID: 2457776203-404129466
                            • Opcode ID: 6a5eba254a968aa2ee76c5da39e7bdeb6885fbf19ef74bd2c65d37b1cd8c3273
                            • Instruction ID: 4c542e4b30c12bd87f1f9c4b9ff78c0f23e1a9c9c40ed1c7baeb231abc9b2936
                            • Opcode Fuzzy Hash: 6a5eba254a968aa2ee76c5da39e7bdeb6885fbf19ef74bd2c65d37b1cd8c3273
                            • Instruction Fuzzy Hash: 4511DD3278930ABAEB059B549C83EBB77ECDF15774F51046AF500B6282D7B5AF005364
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                            • String ID: 0.0.0.0
                            • API String ID: 642191829-3771769585
                            • Opcode ID: c4fde4d75e167dfd87c8608f43c579578b3c1b7d8467058ae90e32260693e273
                            • Instruction ID: ebe06fd90b04cd7960dd4b32bf0a3f5dddd9a0f09742e280b66c15be6de93ee8
                            • Opcode Fuzzy Hash: c4fde4d75e167dfd87c8608f43c579578b3c1b7d8467058ae90e32260693e273
                            • Instruction Fuzzy Hash: 5D110A31904218EFCB20AB60AC0AEFF7BBCDF50720F14016AF54596091EFB19A818B50
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • GetSystemMetrics.USER32(0000000F), ref: 00A69FC7
                            • GetSystemMetrics.USER32(0000000F), ref: 00A69FE7
                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A6A224
                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A6A242
                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A6A263
                            • ShowWindow.USER32(00000003,00000000), ref: 00A6A282
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00A6A2A7
                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A6A2CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                            • String ID:
                            • API String ID: 1211466189-0
                            • Opcode ID: 28a12dde997f58b8f0964db110007f46154198b95d22ef7cccb82ec2e0779839
                            • Instruction ID: 204c1b8afd52efb23059eaaeb9ab3ff8f34ab8279ffd532e2e4a558811cd0bce
                            • Opcode Fuzzy Hash: 28a12dde997f58b8f0964db110007f46154198b95d22ef7cccb82ec2e0779839
                            • Instruction Fuzzy Hash: 83B1B831600215EBDF14CF68C9957EE3BB2FF65711F088069EC89AB2A5D771A940CF61
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$LocalTime
                            • String ID:
                            • API String ID: 952045576-0
                            • Opcode ID: d687986b01aa5e072ab10c85fd855aec0dae914f66fbc536cdebebabc02754d5
                            • Instruction ID: bc55ca1ffe34e1531947458c8499d04ad62efec51e97f6a547e3f4495e2d2db1
                            • Opcode Fuzzy Hash: d687986b01aa5e072ab10c85fd855aec0dae914f66fbc536cdebebabc02754d5
                            • Instruction Fuzzy Hash: 6141B265D1021C75CB11EBF4888AADFB7A8AF85710F508466F628E3161FB34E255C3E5
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00A2682C,00000004,00000000,00000000), ref: 009EF953
                            • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00A2682C,00000004,00000000,00000000), ref: 00A2F3D1
                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00A2682C,00000004,00000000,00000000), ref: 00A2F454
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: 56488a76a5902e6622c0f259e1356864f88c7112cb1d12c53b4239af0fde0ba0
                            • Instruction ID: 76af1a1f97d49d56fff03255610a6c1e66bd69906489af6b24c12a1bd767836e
                            • Opcode Fuzzy Hash: 56488a76a5902e6622c0f259e1356864f88c7112cb1d12c53b4239af0fde0ba0
                            • Instruction Fuzzy Hash: BF4128302086C0BEC73ADB3ED8A873A7BB5AB46360F15443EE0C757562D6B5AC81CB11
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 00A62D1B
                            • GetDC.USER32(00000000), ref: 00A62D23
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A62D2E
                            • ReleaseDC.USER32(00000000,00000000), ref: 00A62D3A
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A62D76
                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A62D87
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A65A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00A62DC2
                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A62DE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                            • String ID:
                            • API String ID: 3864802216-0
                            • Opcode ID: 7715b1ad5b47aa0626946c877ef1a5b5bb9c25681dc741b897276308a6358ba8
                            • Instruction ID: fae54022e3261fde6e764d8d9f27a2eed4cbd944e998ed312ff4557c07764109
                            • Opcode Fuzzy Hash: 7715b1ad5b47aa0626946c877ef1a5b5bb9c25681dc741b897276308a6358ba8
                            • Instruction Fuzzy Hash: 7A316976201614BBEB218F90CC8AFFB3BA9EB09725F044055FE489A291C6B59C51CBA4
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: 827df5aad896a22f255eff738f3546c909c45e86308aa49b5152d439ba6183e9
                            • Instruction ID: 5f2183cb05df89659a95bd41ed202fdab76c4e8b97adb02a8be33fd200c2e799
                            • Opcode Fuzzy Hash: 827df5aad896a22f255eff738f3546c909c45e86308aa49b5152d439ba6183e9
                            • Instruction Fuzzy Hash: 8221A4B1E44A09BBD21456399E83FBA336DBF60384F880420FE059A681F760ED10C2E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: NULL Pointer assignment$Not an Object type
                            • API String ID: 0-572801152
                            • Opcode ID: 2a715854d8188e0f75d761f68f870670689040ed66fb7ab19db62781955b6231
                            • Instruction ID: 7fd46d14d13ede15532d10db626dbc0f21f6092f02bac2c9abadd9490effda85
                            • Opcode Fuzzy Hash: 2a715854d8188e0f75d761f68f870670689040ed66fb7ab19db62781955b6231
                            • Instruction Fuzzy Hash: FDD1D171E0060AAFDF10CFA8C8A0BAEB7B5BF48354F148169E915AB280E770DD49CB50
                            APIs
                            • GetCPInfo.KERNEL32(?,?), ref: 00A115CE
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00A11651
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A116E4
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00A116FB
                              • Part of subcall function 00A03820: RtlAllocateHeap.NTDLL(00000000,?,00AA1444,?,009EFDF5,?,?,009DA976,00000010,00AA1440,009D13FC,?,009D13C6,?,009D1129), ref: 00A03852
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A11777
                            • __freea.LIBCMT ref: 00A117A2
                            • __freea.LIBCMT ref: 00A117AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                            • String ID:
                            • API String ID: 2829977744-0
                            • Opcode ID: 152bccf2dcbe510ad80849ab05aad0329816943db815719d18cc367d7b2b848c
                            • Instruction ID: fddd3e0b00640eb3aae77e7511940718ac9e4a11a03986be311164c947c66571
                            • Opcode Fuzzy Hash: 152bccf2dcbe510ad80849ab05aad0329816943db815719d18cc367d7b2b848c
                            • Instruction Fuzzy Hash: 8091B672E002169EDF208F74DD81AEEBBBA9F49360F184659EA11E7281D735DDC1CB60
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInit
                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                            • API String ID: 2610073882-625585964
                            • Opcode ID: f16c7ad9f9151f9e8830b6a6f1850228b738987edda979833358a892bc4fdfa7
                            • Instruction ID: f2fd76fcd20050e3e26d187fd046dd68e3e8f731c3db7aec69902d3330d696c5
                            • Opcode Fuzzy Hash: f16c7ad9f9151f9e8830b6a6f1850228b738987edda979833358a892bc4fdfa7
                            • Instruction Fuzzy Hash: 00919471A00215AFDF20CFA5C848FAE7BB8FF49719F108559F905AB281D7709989CFA0
                            APIs
                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00A4125C
                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00A41284
                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00A412A8
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A412D8
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A4135F
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A413C4
                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A41430
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                            • String ID:
                            • API String ID: 2550207440-0
                            • Opcode ID: 25dade173216cb36d75c242781d6cb090d280bb2fdd18f3481c62685ea3fb813
                            • Instruction ID: 8606a04d7ef10fa98aee59b32f8bad8c0c594b25b1e51e3d816506268933b4de
                            • Opcode Fuzzy Hash: 25dade173216cb36d75c242781d6cb090d280bb2fdd18f3481c62685ea3fb813
                            • Instruction Fuzzy Hash: A191E479A002199FDB00DF98C888BFEB7B5FF85325F144429E950EB291D7B4E981CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: 435528907d4e2fe80b3fe3e123c52edcc6131c7e2fbf53ece46ed10e167d2fe7
                            • Instruction ID: 894398cb0e398d3a595ff58a6f8ab35a8461092faa4b289d8538461dc6043297
                            • Opcode Fuzzy Hash: 435528907d4e2fe80b3fe3e123c52edcc6131c7e2fbf53ece46ed10e167d2fe7
                            • Instruction Fuzzy Hash: 7A911571904219EFCB11CFA9CC84AEEBBB8FF89320F144555E915B7251D778AE42CB60
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00A5396B
                            • CharUpperBuffW.USER32(?,?), ref: 00A53A7A
                            • _wcslen.LIBCMT ref: 00A53A8A
                            • VariantClear.OLEAUT32(?), ref: 00A53C1F
                              • Part of subcall function 00A40CDF: VariantInit.OLEAUT32(00000000), ref: 00A40D1F
                              • Part of subcall function 00A40CDF: VariantCopy.OLEAUT32(?,?), ref: 00A40D28
                              • Part of subcall function 00A40CDF: VariantClear.OLEAUT32(?), ref: 00A40D34
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                            • API String ID: 4137639002-1221869570
                            • Opcode ID: e218449ef745fb8052d80104ef721a7c692d908ccee0d611fa7bcb18879ce981
                            • Instruction ID: e8bcefec4d29588b783b9cf10693928fbdce91b882885c57fba1965454a772f2
                            • Opcode Fuzzy Hash: e218449ef745fb8052d80104ef721a7c692d908ccee0d611fa7bcb18879ce981
                            • Instruction Fuzzy Hash: 519156756083059FCB00EF24C48096AB7E4BFC8755F14892EF88A9B351DB31EE49CB92
                            APIs
                              • Part of subcall function 00A3000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?,?,00A3035E), ref: 00A3002B
                              • Part of subcall function 00A3000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?), ref: 00A30046
                              • Part of subcall function 00A3000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?), ref: 00A30054
                              • Part of subcall function 00A3000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?), ref: 00A30064
                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00A54C51
                            • _wcslen.LIBCMT ref: 00A54D59
                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00A54DCF
                            • CoTaskMemFree.OLE32(?), ref: 00A54DDA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                            • String ID: NULL Pointer assignment
                            • API String ID: 614568839-2785691316
                            • Opcode ID: 9d606039bf4845cab3c67cf6b743bebe10d7f8e69c317eb3d79739f537a4f005
                            • Instruction ID: 580c86758277e5298d44154b97d2b658dadb50dfc183cbe8afba2f932e65de56
                            • Opcode Fuzzy Hash: 9d606039bf4845cab3c67cf6b743bebe10d7f8e69c317eb3d79739f537a4f005
                            • Instruction Fuzzy Hash: 3C913671D0021DAFDF14DFA4D891AEEB7B8BF48314F10816AE915A7281EB749E48CF60
                            APIs
                            • GetMenu.USER32(?), ref: 00A62183
                            • GetMenuItemCount.USER32(00000000), ref: 00A621B5
                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A621DD
                            • _wcslen.LIBCMT ref: 00A62213
                            • GetMenuItemID.USER32(?,?), ref: 00A6224D
                            • GetSubMenu.USER32(?,?), ref: 00A6225B
                              • Part of subcall function 00A33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A33A57
                              • Part of subcall function 00A33A3D: GetCurrentThreadId.KERNEL32 ref: 00A33A5E
                              • Part of subcall function 00A33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A325B3), ref: 00A33A65
                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A622E3
                              • Part of subcall function 00A3E97B: Sleep.KERNEL32 ref: 00A3E9F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                            • String ID:
                            • API String ID: 4196846111-0
                            • Opcode ID: 6bf25a01156725e7c0011151f07993741b2b1e32cf902c190d40eba2b555cf2f
                            • Instruction ID: 1cefb1ddf75cfb8dd429bb5e1d18adbee2d16108aa6d4a695248b6eddc0ec2fb
                            • Opcode Fuzzy Hash: 6bf25a01156725e7c0011151f07993741b2b1e32cf902c190d40eba2b555cf2f
                            • Instruction Fuzzy Hash: CB718C75E00605AFCB10DFA8C895BAEB7F5EF88320F148459E956EB341DB74EE418B90
                            APIs
                            • IsWindow.USER32(00B95950), ref: 00A67F37
                            • IsWindowEnabled.USER32(00B95950), ref: 00A67F43
                            • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00A6801E
                            • SendMessageW.USER32(00B95950,000000B0,?,?), ref: 00A68051
                            • IsDlgButtonChecked.USER32(?,?), ref: 00A68089
                            • GetWindowLongW.USER32(00B95950,000000EC), ref: 00A680AB
                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A680C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                            • String ID:
                            • API String ID: 4072528602-0
                            • Opcode ID: 1a1dbb6113cdcf8b4b3ce5f0ea2c057d5d081609f870498344390704b4de6053
                            • Instruction ID: 3ed57a9e2c35b104989dd70f094a0decc1cd924628598a6e9c5b89301a6acb5e
                            • Opcode Fuzzy Hash: 1a1dbb6113cdcf8b4b3ce5f0ea2c057d5d081609f870498344390704b4de6053
                            • Instruction Fuzzy Hash: 5071BB34618204AFEB21DFA4CC84FBEBBB9EF0A304F144559F995972A1CB75AC45CB20
                            APIs
                            • GetParent.USER32(?), ref: 00A3AEF9
                            • GetKeyboardState.USER32(?), ref: 00A3AF0E
                            • SetKeyboardState.USER32(?), ref: 00A3AF6F
                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A3AF9D
                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A3AFBC
                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A3AFFD
                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A3B020
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 4e58d44e0d8e114631076cd0f0e6fe576355f445329e2bcf39920586b89119f2
                            • Instruction ID: 9a5367425733a0d52ab9842bb9c7428f2b0b0185536729b6af341b882c469a40
                            • Opcode Fuzzy Hash: 4e58d44e0d8e114631076cd0f0e6fe576355f445329e2bcf39920586b89119f2
                            • Instruction Fuzzy Hash: 3051C2A06147E53DFB368334CC45BBBBEAA5B06304F088589F2D9598D2C3D9ACC8D761
                            APIs
                            • GetParent.USER32(00000000), ref: 00A3AD19
                            • GetKeyboardState.USER32(?), ref: 00A3AD2E
                            • SetKeyboardState.USER32(?), ref: 00A3AD8F
                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A3ADBB
                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A3ADD8
                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A3AE17
                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A3AE38
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: c107a83f418a4ecbf5b153f6ce7db6d4b583d6aeb77fb9486ab88eb202308eeb
                            • Instruction ID: 3fcb7fbe87cc102706bcacb0035ce179a4614db9329d997c67aba861575f9798
                            • Opcode Fuzzy Hash: c107a83f418a4ecbf5b153f6ce7db6d4b583d6aeb77fb9486ab88eb202308eeb
                            • Instruction Fuzzy Hash: 2651E4A16047F53DFB378374CC55BBABEA96B56300F188588F1D94A8C2D394EC88D762
                            APIs
                            • GetConsoleCP.KERNEL32(00A13CD6,?,?,?,?,?,?,?,?,00A05BA3,?,?,00A13CD6,?,?), ref: 00A05470
                            • __fassign.LIBCMT ref: 00A054EB
                            • __fassign.LIBCMT ref: 00A05506
                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00A13CD6,00000005,00000000,00000000), ref: 00A0552C
                            • WriteFile.KERNEL32(?,00A13CD6,00000000,00A05BA3,00000000,?,?,?,?,?,?,?,?,?,00A05BA3,?), ref: 00A0554B
                            • WriteFile.KERNEL32(?,?,00000001,00A05BA3,00000000,?,?,?,?,?,?,?,?,?,00A05BA3,?), ref: 00A05584
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                            • String ID:
                            • API String ID: 1324828854-0
                            • Opcode ID: 60a32f9b020e35ca953baaeb5f580f3ec6cc978a77fd94e13cc51cc261f21031
                            • Instruction ID: 560d050e0960b630373bd119bb5b56dd277f4c88438044c829881b40ae34da49
                            • Opcode Fuzzy Hash: 60a32f9b020e35ca953baaeb5f580f3ec6cc978a77fd94e13cc51cc261f21031
                            • Instruction Fuzzy Hash: 97518F71E006499FDB10CFA8EC85AEEBBF9EF0A310F14415AE555E7291D770AA41CF60
                            APIs
                            • _ValidateLocalCookies.LIBCMT ref: 009F2D4B
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 009F2D53
                            • _ValidateLocalCookies.LIBCMT ref: 009F2DE1
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 009F2E0C
                            • _ValidateLocalCookies.LIBCMT ref: 009F2E61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 1170836740-1018135373
                            • Opcode ID: 6cb1e5d7f453a4194c1adaab537f4e1cd7c9f0bafbf80b9b116e991227fd74b0
                            • Instruction ID: a918c9f86b2b506cef6d5010537ef8dad9579d31635de277d6556976ade7db09
                            • Opcode Fuzzy Hash: 6cb1e5d7f453a4194c1adaab537f4e1cd7c9f0bafbf80b9b116e991227fd74b0
                            • Instruction Fuzzy Hash: FE419334A0020DEBCF10DF68C845BBEBBB5BF85364F148155EA14AB392D7359A55CB90
                            APIs
                              • Part of subcall function 00A5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A5307A
                              • Part of subcall function 00A5304E: _wcslen.LIBCMT ref: 00A5309B
                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A51112
                            • WSAGetLastError.WSOCK32 ref: 00A51121
                            • WSAGetLastError.WSOCK32 ref: 00A511C9
                            • closesocket.WSOCK32(00000000), ref: 00A511F9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 2675159561-0
                            • Opcode ID: de5a6d3bdb4b96e6556a1d5d0b123a445c4165c0f72b541bcae57156911015a9
                            • Instruction ID: 46cdc7e4c0e7e2a536d2081a7bcf8af84f176a6fdcecf612523b03fc0e55cde0
                            • Opcode Fuzzy Hash: de5a6d3bdb4b96e6556a1d5d0b123a445c4165c0f72b541bcae57156911015a9
                            • Instruction Fuzzy Hash: 9641E131200604AFDB10DF64C884BB9BBB9FF84365F148299FD469B292D774AD46CBE0
                            APIs
                              • Part of subcall function 00A3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A3CF22,?), ref: 00A3DDFD
                              • Part of subcall function 00A3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A3CF22,?), ref: 00A3DE16
                            • lstrcmpiW.KERNEL32(?,?), ref: 00A3CF45
                            • MoveFileW.KERNEL32(?,?), ref: 00A3CF7F
                            • _wcslen.LIBCMT ref: 00A3D005
                            • _wcslen.LIBCMT ref: 00A3D01B
                            • SHFileOperationW.SHELL32(?), ref: 00A3D061
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                            • String ID: \*.*
                            • API String ID: 3164238972-1173974218
                            • Opcode ID: b32eb9442d6c9d8ec2c0c73ad3bc5902a8543e0956a031eb2ca5be6b062e03a1
                            • Instruction ID: 0ca2a534daa1b374265265bf7e626e157c02dbd85e2889ad722f0c182dfa0b99
                            • Opcode Fuzzy Hash: b32eb9442d6c9d8ec2c0c73ad3bc5902a8543e0956a031eb2ca5be6b062e03a1
                            • Instruction Fuzzy Hash: F1415671D452189FDF12EBA4DE81AEEB7B8AF48790F0000E6F545EB141EB34AA85CF50
                            APIs
                            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00A62E1C
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A62E4F
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A62E84
                            • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00A62EB6
                            • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00A62EE0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A62EF1
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A62F0B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LongWindow$MessageSend
                            • String ID:
                            • API String ID: 2178440468-0
                            • Opcode ID: 3ab65e1156d7d2ea742ab9ffcd2e3fcc2aeae1dcd7f83be14c0a1513ea129ffd
                            • Instruction ID: a9f2f7a0047649718db5a23e7ebe5247564766862a9227d3b9d466d15bc8ef36
                            • Opcode Fuzzy Hash: 3ab65e1156d7d2ea742ab9ffcd2e3fcc2aeae1dcd7f83be14c0a1513ea129ffd
                            • Instruction Fuzzy Hash: 38312434644641AFEB20CF98DC84F653BF0FB9A720F140165F9508F2B1CBB6A841DB01
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A37769
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A3778F
                            • SysAllocString.OLEAUT32(00000000), ref: 00A37792
                            • SysAllocString.OLEAUT32(?), ref: 00A377B0
                            • SysFreeString.OLEAUT32(?), ref: 00A377B9
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00A377DE
                            • SysAllocString.OLEAUT32(?), ref: 00A377EC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 7f9688f9d589310712ae7c6e7f7527ba1fa38a1414750cd0fcfc5a8626c444f3
                            • Instruction ID: 7f208278433a3aa26ba1873b2dca240e220d84d8a61d3058b761cbb71af0452c
                            • Opcode Fuzzy Hash: 7f9688f9d589310712ae7c6e7f7527ba1fa38a1414750cd0fcfc5a8626c444f3
                            • Instruction Fuzzy Hash: 192192B6608219AFDB20DFA9CC88DBF77ACEB09764B048026F915DB150D670DC42C760
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A37842
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A37868
                            • SysAllocString.OLEAUT32(00000000), ref: 00A3786B
                            • SysAllocString.OLEAUT32 ref: 00A3788C
                            • SysFreeString.OLEAUT32 ref: 00A37895
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00A378AF
                            • SysAllocString.OLEAUT32(?), ref: 00A378BD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 97379404e903321330265c156c17eeafdc5f511bbb3853b61c53123b335fa31b
                            • Instruction ID: ebe472ed24cb742325cfcf8ff44afb020c9eea912f45b5d91585a28f6803e628
                            • Opcode Fuzzy Hash: 97379404e903321330265c156c17eeafdc5f511bbb3853b61c53123b335fa31b
                            • Instruction Fuzzy Hash: 6C215E72609205AFDB20DBE9DC8CDBA77BCEB09760B108125F915DB2A1DA70DC81CB64
                            APIs
                            • GetStdHandle.KERNEL32(0000000C), ref: 00A404F2
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A4052E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateHandlePipe
                            • String ID: nul
                            • API String ID: 1424370930-2873401336
                            • Opcode ID: a23b1c9518213019314d85efb11dbbd20c0c5b610524f17de720e420823161c8
                            • Instruction ID: 22a740c1de708ed3d2cd16b2a06a6d58b3a87d61417eebcb0fd10e69dfcd9d41
                            • Opcode Fuzzy Hash: a23b1c9518213019314d85efb11dbbd20c0c5b610524f17de720e420823161c8
                            • Instruction Fuzzy Hash: C021A278500305ABCF209F69DC04E9A7BB4EF84720F208A19F9A1D72E0D7B09940EF21
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 00A405C6
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A40601
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateHandlePipe
                            • String ID: nul
                            • API String ID: 1424370930-2873401336
                            • Opcode ID: 87492b4da2ee3ef9a1262cf97e7d0d855477a552036bc6e2b9b22e09f49227e2
                            • Instruction ID: dc75ebbd6dad171d750a2b733f7edbe9b96f211d07300e000371d12d729ccbce
                            • Opcode Fuzzy Hash: 87492b4da2ee3ef9a1262cf97e7d0d855477a552036bc6e2b9b22e09f49227e2
                            • Instruction Fuzzy Hash: FB2174795003059BDB209F698C04E9ABBF4AFD5730F204A19EAA2D72D0D7F09851EB10
                            APIs
                              • Part of subcall function 009D600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009D604C
                              • Part of subcall function 009D600E: GetStockObject.GDI32(00000011), ref: 009D6060
                              • Part of subcall function 009D600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D606A
                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A64112
                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A6411F
                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A6412A
                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A64139
                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A64145
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$CreateObjectStockWindow
                            • String ID: Msctls_Progress32
                            • API String ID: 1025951953-3636473452
                            • Opcode ID: ffc94208c2c3014ef3eaa929c912b0fdd1d3a5731afd9a76525c0c026ef93dd6
                            • Instruction ID: 45f3d74d2084be92728d068525fa12b78a2db83b435257363474b83d6c91feb5
                            • Opcode Fuzzy Hash: ffc94208c2c3014ef3eaa929c912b0fdd1d3a5731afd9a76525c0c026ef93dd6
                            • Instruction Fuzzy Hash: D111B6B11501197EEF119F64CC85EE77F6DEF09798F014111FB18A2150C7769C61DBA4
                            APIs
                              • Part of subcall function 00A0D7A3: _free.LIBCMT ref: 00A0D7CC
                            • _free.LIBCMT ref: 00A0D82D
                              • Part of subcall function 00A029C8: HeapFree.KERNEL32(00000000,00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000), ref: 00A029DE
                              • Part of subcall function 00A029C8: GetLastError.KERNEL32(00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000,00000000), ref: 00A029F0
                            • _free.LIBCMT ref: 00A0D838
                            • _free.LIBCMT ref: 00A0D843
                            • _free.LIBCMT ref: 00A0D897
                            • _free.LIBCMT ref: 00A0D8A2
                            • _free.LIBCMT ref: 00A0D8AD
                            • _free.LIBCMT ref: 00A0D8B8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                            • Instruction ID: b9981c24394edab6c654e8573e23f0f001aed8659c41f23a684e6b55669c3741
                            • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                            • Instruction Fuzzy Hash: 50113072540B0CBAD621BFF4EE4BFCB7BDCAF84740F404825B299AA4D2DA75B5058760
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A3DA74
                            • LoadStringW.USER32(00000000), ref: 00A3DA7B
                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A3DA91
                            • LoadStringW.USER32(00000000), ref: 00A3DA98
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A3DADC
                            Strings
                            • %s (%d) : ==> %s: %s %s, xrefs: 00A3DAB9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message
                            • String ID: %s (%d) : ==> %s: %s %s
                            • API String ID: 4072794657-3128320259
                            • Opcode ID: d03bf6eaf848fc68cc9321ec997c8466a7270d1d5ee2df4a7c09141b3af3a82f
                            • Instruction ID: e260994ccddb9b91a3a4c0719414f167b96d2688723f3c1979a5c50be6d650a6
                            • Opcode Fuzzy Hash: d03bf6eaf848fc68cc9321ec997c8466a7270d1d5ee2df4a7c09141b3af3a82f
                            • Instruction Fuzzy Hash: A4014FF6900208BBE710DBE49D89EF7727CEB08351F400592F756E6041E6B49E854B74
                            APIs
                            • InterlockedExchange.KERNEL32(00B9EE78,00B9EE78), ref: 00A4097B
                            • EnterCriticalSection.KERNEL32(00B9EE58,00000000), ref: 00A4098D
                            • TerminateThread.KERNEL32(?,000001F6), ref: 00A4099B
                            • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00A409A9
                            • CloseHandle.KERNEL32(?), ref: 00A409B8
                            • InterlockedExchange.KERNEL32(00B9EE78,000001F6), ref: 00A409C8
                            • LeaveCriticalSection.KERNEL32(00B9EE58), ref: 00A409CF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                            • String ID:
                            • API String ID: 3495660284-0
                            • Opcode ID: 3c04128dddd5ea828fcfbc232de851ee6c2b7d3a89a466f80edbd7a1b3b2ea26
                            • Instruction ID: 22f16ac34a04ebab227dafcebbc043e658d86e28d8c770b07829e29a1607763f
                            • Opcode Fuzzy Hash: 3c04128dddd5ea828fcfbc232de851ee6c2b7d3a89a466f80edbd7a1b3b2ea26
                            • Instruction Fuzzy Hash: F3F03131442512FBD742AFE4EE9CBE6BB35FF41712F401015F241508A1C7B59466DFA0
                            APIs
                            • GetClientRect.USER32(?,?), ref: 009D5D30
                            • GetWindowRect.USER32(?,?), ref: 009D5D71
                            • ScreenToClient.USER32(?,?), ref: 009D5D99
                            • GetClientRect.USER32(?,?), ref: 009D5ED7
                            • GetWindowRect.USER32(?,?), ref: 009D5EF8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Rect$Client$Window$Screen
                            • String ID:
                            • API String ID: 1296646539-0
                            • Opcode ID: 4bed4e9f83521cc95dded155d58205cbf389fe30791a7214944e4b7f12dccb6b
                            • Instruction ID: 9201913009c167e0cc54c3165941d6b1294d31fd6608529c9d5d893f8b2b14c0
                            • Opcode Fuzzy Hash: 4bed4e9f83521cc95dded155d58205cbf389fe30791a7214944e4b7f12dccb6b
                            • Instruction Fuzzy Hash: 9FB17A34A0064ADBDB10DFA8C4807EEB7F1FF58310F14C91AE8A9D7250DB34AA91DB64
                            APIs
                            • __allrem.LIBCMT ref: 00A000BA
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A000D6
                            • __allrem.LIBCMT ref: 00A000ED
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A0010B
                            • __allrem.LIBCMT ref: 00A00122
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A00140
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                            • String ID:
                            • API String ID: 1992179935-0
                            • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                            • Instruction ID: 9c766f61a010ff6dd37ea34d8c5aa4c9ba008be13db4f8b63f1b50c5f4e801be
                            • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                            • Instruction Fuzzy Hash: 5281E672A00B0E9BE7209F68DD51FAB73E9EF41724F24463AF651D66C1E770D9408B90
                            APIs
                              • Part of subcall function 00A53149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00A5101C,00000000,?,?,00000000), ref: 00A53195
                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A51DC0
                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A51DE1
                            • WSAGetLastError.WSOCK32 ref: 00A51DF2
                            • inet_ntoa.WSOCK32(?), ref: 00A51E8C
                            • htons.WSOCK32(?,?,?,?,?), ref: 00A51EDB
                            • _strlen.LIBCMT ref: 00A51F35
                              • Part of subcall function 00A339E8: _strlen.LIBCMT ref: 00A339F2
                              • Part of subcall function 009D6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,009ECF58,?,?,?), ref: 009D6DBA
                              • Part of subcall function 009D6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,009ECF58,?,?,?), ref: 009D6DED
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                            • String ID:
                            • API String ID: 1923757996-0
                            • Opcode ID: 7f3d9aae98c045912a0ffa8b722afb4d3446563e8121bf106504f870bc795319
                            • Instruction ID: 9aa26b022289baaf76aae888be02bc12357164b382010a843e1f3ac6f505afd2
                            • Opcode Fuzzy Hash: 7f3d9aae98c045912a0ffa8b722afb4d3446563e8121bf106504f870bc795319
                            • Instruction Fuzzy Hash: F9A1AC31204340AFC724EB24C895F3ABBA5BFC4318F54894DF8565B2A2DB71ED4ACB91
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,009F82D9,009F82D9,?,?,?,00A0644F,00000001,00000001,8BE85006), ref: 00A06258
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00A0644F,00000001,00000001,8BE85006,?,?,?), ref: 00A062DE
                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00A063D8
                            • __freea.LIBCMT ref: 00A063E5
                              • Part of subcall function 00A03820: RtlAllocateHeap.NTDLL(00000000,?,00AA1444,?,009EFDF5,?,?,009DA976,00000010,00AA1440,009D13FC,?,009D13C6,?,009D1129), ref: 00A03852
                            • __freea.LIBCMT ref: 00A063EE
                            • __freea.LIBCMT ref: 00A06413
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                            • String ID:
                            • API String ID: 1414292761-0
                            • Opcode ID: 99b102fd20f11e51591abe20116480189eda355109335b2be102fd9c88653641
                            • Instruction ID: f8dbaafeda124b81670ca91e7c8809884d16497e76cbaf1e4d9ef944ecee5a93
                            • Opcode Fuzzy Hash: 99b102fd20f11e51591abe20116480189eda355109335b2be102fd9c88653641
                            • Instruction Fuzzy Hash: 2F51D172A0021AABEF258F64ED91EBF77A9EF44758F144629FC05DA1C0DB34DC60C6A1
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5B6AE,?,?), ref: 00A5C9B5
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5C9F1
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA68
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5BCCA
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A5BD25
                            • RegCloseKey.ADVAPI32(00000000), ref: 00A5BD6A
                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A5BD99
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A5BDF3
                            • RegCloseKey.ADVAPI32(?), ref: 00A5BDFF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                            • String ID:
                            • API String ID: 1120388591-0
                            • Opcode ID: 9c8945ce1889a4b5903f19a62e3cadfffcad5d3502289f13915fabf51a0a8445
                            • Instruction ID: 25aa8002243bc636828c9eee1cceba2776149ce3ab9a24a308e6a8caf2b16fd6
                            • Opcode Fuzzy Hash: 9c8945ce1889a4b5903f19a62e3cadfffcad5d3502289f13915fabf51a0a8445
                            • Instruction Fuzzy Hash: 89817C31218241AFD714DF24C891E2ABBF5FF84349F14855DF8994B2A2DB31ED49CBA2
                            APIs
                            • VariantInit.OLEAUT32(00000035), ref: 00A2F7B9
                            • SysAllocString.OLEAUT32(00000001), ref: 00A2F860
                            • VariantCopy.OLEAUT32(00A2FA64,00000000), ref: 00A2F889
                            • VariantClear.OLEAUT32(00A2FA64), ref: 00A2F8AD
                            • VariantCopy.OLEAUT32(00A2FA64,00000000), ref: 00A2F8B1
                            • VariantClear.OLEAUT32(?), ref: 00A2F8BB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearCopy$AllocInitString
                            • String ID:
                            • API String ID: 3859894641-0
                            • Opcode ID: 531b768c049502b6bba02cbc78f61c8676440639c4d1778960f187c85b4a7ab4
                            • Instruction ID: da7d2172ef82611ec258ccaa8f21deaa49c27f329ca3ece97720adf091353e70
                            • Opcode Fuzzy Hash: 531b768c049502b6bba02cbc78f61c8676440639c4d1778960f187c85b4a7ab4
                            • Instruction Fuzzy Hash: 71519635600320BEDF24AB69E895B39B3B4EF45710B249477F906DF295DB708C80C796
                            APIs
                              • Part of subcall function 009D7620: _wcslen.LIBCMT ref: 009D7625
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00A494E5
                            • _wcslen.LIBCMT ref: 00A49506
                            • _wcslen.LIBCMT ref: 00A4952D
                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00A49585
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$FileName$OpenSave
                            • String ID: X
                            • API String ID: 83654149-3081909835
                            • Opcode ID: 3b46c4f02e8328ef0a19e2ccf951187540418a291957c2ef0d336dc6feba5074
                            • Instruction ID: 6009b5ea143cfc9bd34161867dd5b2bb654cde5983599a01aec93ada3033d143
                            • Opcode Fuzzy Hash: 3b46c4f02e8328ef0a19e2ccf951187540418a291957c2ef0d336dc6feba5074
                            • Instruction Fuzzy Hash: 29E16C356043409FD724EF24C881B6BB7E4AFC5314F14896DE8999B3A2DB31ED05CB92
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • BeginPaint.USER32(?,?,?), ref: 009E9241
                            • GetWindowRect.USER32(?,?), ref: 009E92A5
                            • ScreenToClient.USER32(?,?), ref: 009E92C2
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009E92D3
                            • EndPaint.USER32(?,?,?,?,?), ref: 009E9321
                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00A271EA
                              • Part of subcall function 009E9339: BeginPath.GDI32(00000000), ref: 009E9357
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                            • String ID:
                            • API String ID: 3050599898-0
                            • Opcode ID: c148e61a2f3a31820168315fe5b2b97caa530ed2bd728a60a73e693847a87541
                            • Instruction ID: 62d386ab6b88583103c79a861e78d04ecbb9a2528518beb0de83634ba7bbff6a
                            • Opcode Fuzzy Hash: c148e61a2f3a31820168315fe5b2b97caa530ed2bd728a60a73e693847a87541
                            • Instruction Fuzzy Hash: 0941BF30104251AFD712DF65D884FBA7BB8EF46320F140629F9A4872F1C7709C46DB62
                            APIs
                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A4080C
                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00A40847
                            • EnterCriticalSection.KERNEL32(?), ref: 00A40863
                            • LeaveCriticalSection.KERNEL32(?), ref: 00A408DC
                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00A408F3
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A40921
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                            • String ID:
                            • API String ID: 3368777196-0
                            • Opcode ID: d3f41e09f14858bcae81a071f7be92dea19f307c65825f220bcd2206c3760a4e
                            • Instruction ID: f4d605fa858d936e6f7dec73caf2b9b6ffce58cbe17fc6c0db22f310090c51fe
                            • Opcode Fuzzy Hash: d3f41e09f14858bcae81a071f7be92dea19f307c65825f220bcd2206c3760a4e
                            • Instruction Fuzzy Hash: 58418B71900205EBDF05EFA4DC85AAA7778FF84310F1040A9EE009A297DB70EE61DBA0
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00A2F3AB,00000000,?,?,00000000,?,00A2682C,00000004,00000000,00000000), ref: 00A6824C
                            • EnableWindow.USER32(?,00000000), ref: 00A68272
                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00A682D1
                            • ShowWindow.USER32(?,00000004), ref: 00A682E5
                            • EnableWindow.USER32(?,00000001), ref: 00A6830B
                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00A6832F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Show$Enable$MessageSend
                            • String ID:
                            • API String ID: 642888154-0
                            • Opcode ID: 0a859b0683163b5214b9f80ad6f6857003cd0fae791a9abcbf06c8f37d34d9cd
                            • Instruction ID: 1247eeded8d2b28db7eca493f44132cf08fea372c4ae528b6505a09a5204b956
                            • Opcode Fuzzy Hash: 0a859b0683163b5214b9f80ad6f6857003cd0fae791a9abcbf06c8f37d34d9cd
                            • Instruction Fuzzy Hash: 1841E634601641AFDB22CF65C8A9BE47BF4FB0A714F180369E5584F2B2CB39A842CB40
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00A34C95
                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A34CB2
                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A34CEA
                            • _wcslen.LIBCMT ref: 00A34D08
                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A34D10
                            • _wcsstr.LIBVCRUNTIME ref: 00A34D1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                            • String ID:
                            • API String ID: 72514467-0
                            • Opcode ID: ff68cf90920ce90fdd260f481cd5f7519e7582972b5c71f975e6fb69856ce83c
                            • Instruction ID: f1c8ca97460dcab0db25de89fac942bdc50c25b38c07f21be3bfe0783ae916db
                            • Opcode Fuzzy Hash: ff68cf90920ce90fdd260f481cd5f7519e7582972b5c71f975e6fb69856ce83c
                            • Instruction Fuzzy Hash: 98213B32204200BBEB159B75EC09F7B7BACDF49760F10803EF805CA191DEA5EC0187A0
                            APIs
                              • Part of subcall function 009D3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D3A97,?,?,009D2E7F,?,?,?,00000000), ref: 009D3AC2
                            • _wcslen.LIBCMT ref: 00A4587B
                            • CoInitialize.OLE32(00000000), ref: 00A45995
                            • CoCreateInstance.OLE32(00A6FCF8,00000000,00000001,00A6FB68,?), ref: 00A459AE
                            • CoUninitialize.OLE32 ref: 00A459CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 3172280962-24824748
                            • Opcode ID: 9474bd77a8f7c5d3ccbb414e91770b82071f256300f56f3e82725a92dd23c66f
                            • Instruction ID: c90e1024fc65b542e797630088abb7b9c246728120214182d3901239e87a0326
                            • Opcode Fuzzy Hash: 9474bd77a8f7c5d3ccbb414e91770b82071f256300f56f3e82725a92dd23c66f
                            • Instruction Fuzzy Hash: BAD14279A086019FC714DF28C484A2ABBE1FFC9714F14895DF8899B362DB31EC45CB92
                            APIs
                              • Part of subcall function 00A30FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A30FCA
                              • Part of subcall function 00A30FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A30FD6
                              • Part of subcall function 00A30FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A30FE5
                              • Part of subcall function 00A30FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A30FEC
                              • Part of subcall function 00A30FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A31002
                            • GetLengthSid.ADVAPI32(?,00000000,00A31335), ref: 00A317AE
                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A317BA
                            • HeapAlloc.KERNEL32(00000000), ref: 00A317C1
                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A317DA
                            • GetProcessHeap.KERNEL32(00000000,00000000,00A31335), ref: 00A317EE
                            • HeapFree.KERNEL32(00000000), ref: 00A317F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                            • String ID:
                            • API String ID: 3008561057-0
                            • Opcode ID: 7efb47afcb834bf0e8a9c92e7088ea29d06c7acc61368ae76d165697901fae86
                            • Instruction ID: 5c9ad1e63a076b4cab301d055a9afc8681f737e2a0817fb0d361534189b61001
                            • Opcode Fuzzy Hash: 7efb47afcb834bf0e8a9c92e7088ea29d06c7acc61368ae76d165697901fae86
                            • Instruction Fuzzy Hash: EB117932600205EFDB21DFA4CC49FBE7BB9EB46369F184119F481A7210D776A945CF60
                            APIs
                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A314FF
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00A31506
                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A31515
                            • CloseHandle.KERNEL32(00000004), ref: 00A31520
                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A3154F
                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A31563
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                            • String ID:
                            • API String ID: 1413079979-0
                            • Opcode ID: 1d109add480919fcee8916ec0687e7450265ae146bef093e7afb3d2a02ce5394
                            • Instruction ID: a1ed67cb6ddf9e292e64b1611fdb15ee11d576def641511c44935db1772fe5c7
                            • Opcode Fuzzy Hash: 1d109add480919fcee8916ec0687e7450265ae146bef093e7afb3d2a02ce5394
                            • Instruction Fuzzy Hash: B1112972500249ABDF11CFD8DD49FEE7BB9EF48754F044015FA45A2160C3B58E61DB60
                            APIs
                            • GetLastError.KERNEL32(?,?,009F3379,009F2FE5), ref: 009F3390
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 009F339E
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009F33B7
                            • SetLastError.KERNEL32(00000000,?,009F3379,009F2FE5), ref: 009F3409
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: ac82da2115f455fb3758491cc4862124a1b5aec11a684591803124aa0d031f91
                            • Instruction ID: f56765a500cdb31dcf8be4c449dee789a20338ce07f851b6bbd038463d961932
                            • Opcode Fuzzy Hash: ac82da2115f455fb3758491cc4862124a1b5aec11a684591803124aa0d031f91
                            • Instruction Fuzzy Hash: B6014C33308B19BEE61567F47C867372A98DB45379760822AF710C42F0FF994D125344
                            APIs
                            • GetLastError.KERNEL32(?,?,00A05686,00A13CD6,?,00000000,?,00A05B6A,?,?,?,?,?,009FE6D1,?,00A98A48), ref: 00A02D78
                            • _free.LIBCMT ref: 00A02DAB
                            • _free.LIBCMT ref: 00A02DD3
                            • SetLastError.KERNEL32(00000000,?,?,?,?,009FE6D1,?,00A98A48,00000010,009D4F4A,?,?,00000000,00A13CD6), ref: 00A02DE0
                            • SetLastError.KERNEL32(00000000,?,?,?,?,009FE6D1,?,00A98A48,00000010,009D4F4A,?,?,00000000,00A13CD6), ref: 00A02DEC
                            • _abort.LIBCMT ref: 00A02DF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_free$_abort
                            • String ID:
                            • API String ID: 3160817290-0
                            • Opcode ID: 463753bfe27a1e533a07663b8439bdac536d24052a49167fe0088eb2b84a2506
                            • Instruction ID: e0273f822dd7fbd0315853e23da5efd5601492814aa2587d6dc75d571c85cf75
                            • Opcode Fuzzy Hash: 463753bfe27a1e533a07663b8439bdac536d24052a49167fe0088eb2b84a2506
                            • Instruction Fuzzy Hash: 0AF02232604B0827DA237378BD0EF6A266DAFC27B0F310519F824932E2EF208C024320
                            APIs
                              • Part of subcall function 009E9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009E9693
                              • Part of subcall function 009E9639: SelectObject.GDI32(?,00000000), ref: 009E96A2
                              • Part of subcall function 009E9639: BeginPath.GDI32(?), ref: 009E96B9
                              • Part of subcall function 009E9639: SelectObject.GDI32(?,00000000), ref: 009E96E2
                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00A68A4E
                            • LineTo.GDI32(?,00000003,00000000), ref: 00A68A62
                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00A68A70
                            • LineTo.GDI32(?,00000000,00000003), ref: 00A68A80
                            • EndPath.GDI32(?), ref: 00A68A90
                            • StrokePath.GDI32(?), ref: 00A68AA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                            • String ID:
                            • API String ID: 43455801-0
                            • Opcode ID: 14fdca17dfe22c8b55db7ce1741524885a9afac0742fa306db4a55c03a4f003b
                            • Instruction ID: 0157a023385b1703d85f44914ce8a2fe6c4dd18fd4a2f32b7c13f3401145e97d
                            • Opcode Fuzzy Hash: 14fdca17dfe22c8b55db7ce1741524885a9afac0742fa306db4a55c03a4f003b
                            • Instruction Fuzzy Hash: AB11F776000109FFDB12DFD4EC88EAA7F6CEB083A0F018012FA599A1A1C7719D56DBA0
                            APIs
                            • GetDC.USER32(00000000), ref: 00A35218
                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A35229
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A35230
                            • ReleaseDC.USER32(00000000,00000000), ref: 00A35238
                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A3524F
                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00A35261
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CapsDevice$Release
                            • String ID:
                            • API String ID: 1035833867-0
                            • Opcode ID: 89c31c14e72d0de284f8ee96129e20f17c291b0fe4e3fec2801a73e3ce36f931
                            • Instruction ID: 1ce0d3408ad461c5ad2f79e180674f6bed195f68c467cd1fa0d204847c854811
                            • Opcode Fuzzy Hash: 89c31c14e72d0de284f8ee96129e20f17c291b0fe4e3fec2801a73e3ce36f931
                            • Instruction Fuzzy Hash: 28018F75E00718BBEB109BF99C49A5EBFB8EF48361F044066FA04A7280D6B09801CBA0
                            APIs
                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009D1BF4
                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 009D1BFC
                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009D1C07
                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009D1C12
                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 009D1C1A
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 009D1C22
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Virtual
                            • String ID:
                            • API String ID: 4278518827-0
                            • Opcode ID: 7a1caeaa53a5c4105f576dea24b04555c2c355269ca32ed6edd7e88b45d8e2c7
                            • Instruction ID: ffb36eb83b23ebb67a5b8b5deffd5ba4479437fd91c59546aa936ac78c775548
                            • Opcode Fuzzy Hash: 7a1caeaa53a5c4105f576dea24b04555c2c355269ca32ed6edd7e88b45d8e2c7
                            • Instruction Fuzzy Hash: 0E0144B0902B5ABDE3008F6A8C85A52FEA8FF19354F00411BA15C4BA42C7F5A864CBE5
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A3EB30
                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A3EB46
                            • GetWindowThreadProcessId.USER32(?,?), ref: 00A3EB55
                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A3EB64
                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A3EB6E
                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A3EB75
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                            • String ID:
                            • API String ID: 839392675-0
                            • Opcode ID: e054270823e0d6af94dffd5f23a1e2fce7c26705193d557084ddb58f145fb679
                            • Instruction ID: bb4201644d911c68bb4a657a5589d1a9b3146dc7111db49b235735507ff35d5d
                            • Opcode Fuzzy Hash: e054270823e0d6af94dffd5f23a1e2fce7c26705193d557084ddb58f145fb679
                            • Instruction Fuzzy Hash: 3AF01D76240158BBE621AB92DC0DEBB7A7CEFCAB21F004158F642D119196E45A0286B5
                            APIs
                            • GetClientRect.USER32(?), ref: 00A27452
                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 00A27469
                            • GetWindowDC.USER32(?), ref: 00A27475
                            • GetPixel.GDI32(00000000,?,?), ref: 00A27484
                            • ReleaseDC.USER32(?,00000000), ref: 00A27496
                            • GetSysColor.USER32(00000005), ref: 00A274B0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClientColorMessagePixelRectReleaseSendWindow
                            • String ID:
                            • API String ID: 272304278-0
                            • Opcode ID: 82a0c8479606cbce65a4ff48b1d84dbc67cf8f9fbbeb6da3cebbea4c3abb0889
                            • Instruction ID: 807227fe86a1a3a27d57e57cd5cae4c222b819a52a1abc9d3674fc79c827c5d1
                            • Opcode Fuzzy Hash: 82a0c8479606cbce65a4ff48b1d84dbc67cf8f9fbbeb6da3cebbea4c3abb0889
                            • Instruction Fuzzy Hash: 58018B31400215EFDB51AFA4EC08BBE7BB6FB04321F105160F956A21E0CB711E42AB50
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A3187F
                            • UnloadUserProfile.USERENV(?,?), ref: 00A3188B
                            • CloseHandle.KERNEL32(?), ref: 00A31894
                            • CloseHandle.KERNEL32(?), ref: 00A3189C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00A318A5
                            • HeapFree.KERNEL32(00000000), ref: 00A318AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                            • String ID:
                            • API String ID: 146765662-0
                            • Opcode ID: b787f5759f84084e262d8cd018634accf1292c45354c87bceb633fbc66c65cab
                            • Instruction ID: 79ee430b1fabf24473196583965074cdbd2e997188c520f50ec6bc73c4dd219c
                            • Opcode Fuzzy Hash: b787f5759f84084e262d8cd018634accf1292c45354c87bceb633fbc66c65cab
                            • Instruction Fuzzy Hash: 46E0E536004101BBDB01AFE2ED0C91AFF39FF4AB32B108221F26585170CBB29422DF60
                            APIs
                              • Part of subcall function 009D7620: _wcslen.LIBCMT ref: 009D7625
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A3C6EE
                            • _wcslen.LIBCMT ref: 00A3C735
                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A3C79C
                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A3C7CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ItemMenu$Info_wcslen$Default
                            • String ID: 0
                            • API String ID: 1227352736-4108050209
                            • Opcode ID: 269399ee28691b870d3a68e71f3cc5b9b82880cc68a5eee2c765f3808ff28e81
                            • Instruction ID: 330eaec45ab04a3638d2cc5fd426e317411443884865c234299edacf1ca3f10e
                            • Opcode Fuzzy Hash: 269399ee28691b870d3a68e71f3cc5b9b82880cc68a5eee2c765f3808ff28e81
                            • Instruction Fuzzy Hash: 5E51AD71604341ABD7159F28CC89B6BB7E8AF89320F040A2EF995F32E1DB60DD04CB52
                            APIs
                            • ShellExecuteExW.SHELL32(0000003C), ref: 00A5AEA3
                              • Part of subcall function 009D7620: _wcslen.LIBCMT ref: 009D7625
                            • GetProcessId.KERNEL32(00000000), ref: 00A5AF38
                            • CloseHandle.KERNEL32(00000000), ref: 00A5AF67
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseExecuteHandleProcessShell_wcslen
                            • String ID: <$@
                            • API String ID: 146682121-1426351568
                            • Opcode ID: 57fa4c8e94ef7e573fa3183f690e388f15cc561d54b7d9e03f391d222773ed98
                            • Instruction ID: e5077595cff9a6958fe1656f13fe98913dc60c3bf766039d3ee33c8822891b87
                            • Opcode Fuzzy Hash: 57fa4c8e94ef7e573fa3183f690e388f15cc561d54b7d9e03f391d222773ed98
                            • Instruction Fuzzy Hash: 09714671A00219DFCB14EF94D485A9EBBF0BF48310F04859AE816AB352DB74ED49CB91
                            APIs
                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A37206
                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A3723C
                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A3724D
                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A372CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$AddressCreateInstanceProc
                            • String ID: DllGetClassObject
                            • API String ID: 753597075-1075368562
                            • Opcode ID: e4597897f62ca4b82626737ecc3de588b4d629d877f0c29e2e89927c3dc5fadf
                            • Instruction ID: 75d21e3520c36e433fa98204aecf66bb770b9919d9f048db201b53ababe1c6c1
                            • Opcode Fuzzy Hash: e4597897f62ca4b82626737ecc3de588b4d629d877f0c29e2e89927c3dc5fadf
                            • Instruction Fuzzy Hash: 07412CB1A04205AFDB25CF94C884AAF7BB9EF49710F1480A9FD059F20AD7B1D945CBA0
                            APIs
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A63E35
                            • IsMenu.USER32(?), ref: 00A63E4A
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A63E92
                            • DrawMenuBar.USER32 ref: 00A63EA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$Item$DrawInfoInsert
                            • String ID: 0
                            • API String ID: 3076010158-4108050209
                            • Opcode ID: c7008068d7009ab80cc206779954740b5ae1612491d2f1515c072080835f0f31
                            • Instruction ID: b01b6ea87d0a1f299d05431f572bd533a75cf84e36da06c83ec90ca1af240744
                            • Opcode Fuzzy Hash: c7008068d7009ab80cc206779954740b5ae1612491d2f1515c072080835f0f31
                            • Instruction Fuzzy Hash: 93414776A01209EFDF10DFA0D884AAABBF9FF49360F044129F905A7250D775AE56CF60
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A31E66
                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A31E79
                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A31EA9
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen$ClassName
                            • String ID: ComboBox$ListBox
                            • API String ID: 2081771294-1403004172
                            • Opcode ID: b0f4d5b64f6e60474ea16d5e213636305928e439d1e5c6f84f47a00933df0bc5
                            • Instruction ID: 26a66976a9749cbac38fa7b184458304588cb9747eb85f343d0da97394afe236
                            • Opcode Fuzzy Hash: b0f4d5b64f6e60474ea16d5e213636305928e439d1e5c6f84f47a00933df0bc5
                            • Instruction Fuzzy Hash: 07213871A40104BEDB14ABB4DC46DFFB7B8EF85760F20851AF825A72E1DB794D0A9620
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: HKEY_LOCAL_MACHINE$HKLM
                            • API String ID: 176396367-4004644295
                            • Opcode ID: 5214e1b4127a8d08ef98218081efb715a19e5f5cc2ca11ea4dfad59ac17b4c0c
                            • Instruction ID: 93f2d50ba0b723af8d618557243661e1aacf6f5fe46f9670ddc031a7f615baec
                            • Opcode Fuzzy Hash: 5214e1b4127a8d08ef98218081efb715a19e5f5cc2ca11ea4dfad59ac17b4c0c
                            • Instruction Fuzzy Hash: 3131A77270066A4FCB20DF6C99405BF3B937BA17E6B154029EE456B34DE671CD48D3A0
                            APIs
                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A62F8D
                            • LoadLibraryW.KERNEL32(?), ref: 00A62F94
                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A62FA9
                            • DestroyWindow.USER32(?), ref: 00A62FB1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$DestroyLibraryLoadWindow
                            • String ID: SysAnimate32
                            • API String ID: 3529120543-1011021900
                            • Opcode ID: ebbdeacee1ccc9aa0b2347763647ff286745ce3df8a1101f69c1ae6d0fb5679f
                            • Instruction ID: 22094e2a3162f43a56b4276505efbbde2c241138de038895b02b3ba4d0a91893
                            • Opcode Fuzzy Hash: ebbdeacee1ccc9aa0b2347763647ff286745ce3df8a1101f69c1ae6d0fb5679f
                            • Instruction Fuzzy Hash: 83218CB1204605ABEB108FA4DC80FBB77B9EF99364F104619FA50D61A0D7B1DC619760
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,009F4D1E,00A028E9,?,009F4CBE,00A028E9,00A988B8,0000000C,009F4E15,00A028E9,00000002), ref: 009F4D8D
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009F4DA0
                            • FreeLibrary.KERNEL32(00000000,?,?,?,009F4D1E,00A028E9,?,009F4CBE,00A028E9,00A988B8,0000000C,009F4E15,00A028E9,00000002,00000000), ref: 009F4DC3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: 3badae4d0fe699e19954aafdeb9e6e77f0e4a1431c18326527ca8a30f259f716
                            • Instruction ID: 475ccb5b850d1c4259efdd84141f047ce81a597edba4c5713d2bcc65c30efef0
                            • Opcode Fuzzy Hash: 3badae4d0fe699e19954aafdeb9e6e77f0e4a1431c18326527ca8a30f259f716
                            • Instruction Fuzzy Hash: 26F04F34A4020CBBDB159FD4DC49BBEBBB9EF44762F4041A5F909A62A0DB74A941CB90
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,009D4EDD,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4E9C
                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009D4EAE
                            • FreeLibrary.KERNEL32(00000000,?,?,009D4EDD,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4EC0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                            • API String ID: 145871493-3689287502
                            • Opcode ID: 962c1132b79dab12bea7976635fde1506e1c0a51c5322aa94e58e8fad3eb45b4
                            • Instruction ID: 1ff0d741fb952d801d7e4028b2de81dbda08e346109fac6dd64227823978d5bf
                            • Opcode Fuzzy Hash: 962c1132b79dab12bea7976635fde1506e1c0a51c5322aa94e58e8fad3eb45b4
                            • Instruction Fuzzy Hash: 64E08636A415227BD22157656C18A7B6678AF82F727094216FC40D2200DBB4CD0240B0
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A13CDE,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4E62
                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009D4E74
                            • FreeLibrary.KERNEL32(00000000,?,?,00A13CDE,?,00AA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009D4E87
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                            • API String ID: 145871493-1355242751
                            • Opcode ID: 3ef18d5a66c6c906fcfd55f7d314d629cd79a102a532e90ae57972f850637672
                            • Instruction ID: f4c83fe99a35b7d0e77598ec18005540323df18f0818587b78f3dbe278d011a1
                            • Opcode Fuzzy Hash: 3ef18d5a66c6c906fcfd55f7d314d629cd79a102a532e90ae57972f850637672
                            • Instruction Fuzzy Hash: 48D0C23264266177CA221B64BC08DAB2B3CBFC6F713054712F841A2210CFB4CD0281E1
                            APIs
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A42C05
                            • DeleteFileW.KERNEL32(?), ref: 00A42C87
                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A42C9D
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A42CAE
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A42CC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: File$Delete$Copy
                            • String ID:
                            • API String ID: 3226157194-0
                            • Opcode ID: b7b16e6ba2309a61fac87c7d4040f8960d6eff9d087adc4356d015c5919168a9
                            • Instruction ID: d0419f8d3194822e35880500fa04d382a369ae0fa08b980b1da9a8a9f6b0d3fe
                            • Opcode Fuzzy Hash: b7b16e6ba2309a61fac87c7d4040f8960d6eff9d087adc4356d015c5919168a9
                            • Instruction Fuzzy Hash: 2CB14D7690011DABDF11EBA4CD85FEEBBBDEF88350F5040A6F609E7151EA309A448F61
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 00A5A427
                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A5A435
                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A5A468
                            • CloseHandle.KERNEL32(?), ref: 00A5A63D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$CloseCountersCurrentHandleOpen
                            • String ID:
                            • API String ID: 3488606520-0
                            • Opcode ID: 5ac743dbe0081675896b1d4d8ba400689cf306f32964773a568461f7ecc0027b
                            • Instruction ID: ea78b084953de52a0ebe7d9b1b022e6d34e1f980f791271047af11da66a4ee1a
                            • Opcode Fuzzy Hash: 5ac743dbe0081675896b1d4d8ba400689cf306f32964773a568461f7ecc0027b
                            • Instruction Fuzzy Hash: 82A19D716043019FD720DF28D886F2AB7E1AF94714F14891DF99A9B392E7B0EC45CB92
                            APIs
                              • Part of subcall function 00A3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A3CF22,?), ref: 00A3DDFD
                              • Part of subcall function 00A3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A3CF22,?), ref: 00A3DE16
                              • Part of subcall function 00A3E199: GetFileAttributesW.KERNEL32(?,00A3CF95), ref: 00A3E19A
                            • lstrcmpiW.KERNEL32(?,?), ref: 00A3E473
                            • MoveFileW.KERNEL32(?,?), ref: 00A3E4AC
                            • _wcslen.LIBCMT ref: 00A3E5EB
                            • _wcslen.LIBCMT ref: 00A3E603
                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00A3E650
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                            • String ID:
                            • API String ID: 3183298772-0
                            • Opcode ID: 0440f3d6b8ae3de901f17a3ee90e24e55c6044cf4a6b225a2e068e11bd376f39
                            • Instruction ID: 1c5fb66f4cbbaa1f45d7430f6106152dcba9d8f4d6d4d159c80551276b3c4306
                            • Opcode Fuzzy Hash: 0440f3d6b8ae3de901f17a3ee90e24e55c6044cf4a6b225a2e068e11bd376f39
                            • Instruction Fuzzy Hash: B25165B25083459BC724EBA0DC81AEF77ECAF84354F00491EF6C9D3191EF75A5888756
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5B6AE,?,?), ref: 00A5C9B5
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5C9F1
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA68
                              • Part of subcall function 00A5C998: _wcslen.LIBCMT ref: 00A5CA9E
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5BAA5
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A5BB00
                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A5BB63
                            • RegCloseKey.ADVAPI32(?,?), ref: 00A5BBA6
                            • RegCloseKey.ADVAPI32(00000000), ref: 00A5BBB3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                            • String ID:
                            • API String ID: 826366716-0
                            • Opcode ID: 9cd91194b870fb7c455cd3c6c653716b6e046a9d57bbf190962ecad02a93f91c
                            • Instruction ID: 36a835b46462667d377102d734452ee4c9f2b7a469d2b34bc9148d6315e073f4
                            • Opcode Fuzzy Hash: 9cd91194b870fb7c455cd3c6c653716b6e046a9d57bbf190962ecad02a93f91c
                            • Instruction Fuzzy Hash: 2B61B031218241AFC314DF24C490E2ABBF5FF84349F15855DF8998B2A2DB31ED49CBA2
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 00A38BCD
                            • VariantClear.OLEAUT32 ref: 00A38C3E
                            • VariantClear.OLEAUT32 ref: 00A38C9D
                            • VariantClear.OLEAUT32(?), ref: 00A38D10
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A38D3B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$Clear$ChangeInitType
                            • String ID:
                            • API String ID: 4136290138-0
                            • Opcode ID: 711f3979e26cb93c4801de7aa60cd75f05986ab5d4d1bdecc6204d422d7fa7b3
                            • Instruction ID: c65d0775844e8500c21d62d85e5d01cbe0c2242f5f02458b2cc732bd085c66ea
                            • Opcode Fuzzy Hash: 711f3979e26cb93c4801de7aa60cd75f05986ab5d4d1bdecc6204d422d7fa7b3
                            • Instruction Fuzzy Hash: 33515AB5A00219EFCB14CF68C894AAAB7F8FF89310F158559F905DB350EB34E911CB90
                            APIs
                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A48BAE
                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00A48BDA
                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A48C32
                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A48C57
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A48C5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: PrivateProfile$SectionWrite$String
                            • String ID:
                            • API String ID: 2832842796-0
                            • Opcode ID: 6f2dd6e4ac4465dbdfc276749399ac1e95d847b5ad5f3e26a2ce8cd48d3d97ac
                            • Instruction ID: 1b4563b93d46449bdf924db991775f3a5ff38388cd02d259acdfa4eb66c67033
                            • Opcode Fuzzy Hash: 6f2dd6e4ac4465dbdfc276749399ac1e95d847b5ad5f3e26a2ce8cd48d3d97ac
                            • Instruction Fuzzy Hash: 13515A35A002159FCB01DFA5D880AADBBF5FF88314F08C059E849AB362DB35ED41CB91
                            APIs
                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00A58F40
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00A58FD0
                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00A58FEC
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00A59032
                            • FreeLibrary.KERNEL32(00000000), ref: 00A59052
                              • Part of subcall function 009EF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00A41043,?,753CE610), ref: 009EF6E6
                              • Part of subcall function 009EF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00A2FA64,00000000,00000000,?,?,00A41043,?,753CE610,?,00A2FA64), ref: 009EF70D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                            • String ID:
                            • API String ID: 666041331-0
                            • Opcode ID: 1f11a2c5b327866898911c1835b3a2f4b921766597c0f0ff88157cb4a52b7cdc
                            • Instruction ID: daecacf5506e2a436651a1398f6c98acb49a307eacffba0a81b41edf3ada0c2d
                            • Opcode Fuzzy Hash: 1f11a2c5b327866898911c1835b3a2f4b921766597c0f0ff88157cb4a52b7cdc
                            • Instruction Fuzzy Hash: FD513935600205DFC711EF58C4949ADBBF1FF49325B0581A9EC0AAB362DB31ED8ACB91
                            APIs
                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00A66C33
                            • SetWindowLongW.USER32(?,000000EC,?), ref: 00A66C4A
                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00A66C73
                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00A4AB79,00000000,00000000), ref: 00A66C98
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00A66CC7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Long$MessageSendShow
                            • String ID:
                            • API String ID: 3688381893-0
                            • Opcode ID: cba8a23289048a895dd531772f2e950d3035f5d42d0493773132dde5ac23ba86
                            • Instruction ID: f890e739ec9c3b7b5edafda1a76da8067115c54b26a4c0f221d3165359ee6cf0
                            • Opcode Fuzzy Hash: cba8a23289048a895dd531772f2e950d3035f5d42d0493773132dde5ac23ba86
                            • Instruction Fuzzy Hash: E041B135A04504BFDB24CF68CD58FBA7BB9EB09360F150268F899A72E0C371AD41CA90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 7e1743d63b1caaaf4edc22c0fa78a429bfe5a1f8161a93df83b07fc9b151396e
                            • Instruction ID: 4585cfce37bec15bc9538d73a472c469d8e1f98d19dac5207c1a66d3da68b0c3
                            • Opcode Fuzzy Hash: 7e1743d63b1caaaf4edc22c0fa78a429bfe5a1f8161a93df83b07fc9b151396e
                            • Instruction Fuzzy Hash: AD41D132A003089FCB24DF78D985B5EB7B5EF89314F1545A9E615EB392DA31AD01CB90
                            APIs
                            • GetCursorPos.USER32(?), ref: 009E9141
                            • ScreenToClient.USER32(00000000,?), ref: 009E915E
                            • GetAsyncKeyState.USER32(00000001), ref: 009E9183
                            • GetAsyncKeyState.USER32(00000002), ref: 009E919D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AsyncState$ClientCursorScreen
                            • String ID:
                            • API String ID: 4210589936-0
                            • Opcode ID: 72e409ae1914ee2d59c7c87834f660b5f3c23acf751fc08d6ccee56a3952f354
                            • Instruction ID: a8a4dad8424b20908aa4fc67877aac307ceafe5cf7208925035036f21b1f0227
                            • Opcode Fuzzy Hash: 72e409ae1914ee2d59c7c87834f660b5f3c23acf751fc08d6ccee56a3952f354
                            • Instruction Fuzzy Hash: 9141403190855AFBDF159F69D844BEEB774FF05320F204325E429A72A0C7746E54CB51
                            APIs
                            • GetInputState.USER32 ref: 00A438CB
                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00A43922
                            • TranslateMessage.USER32(?), ref: 00A4394B
                            • DispatchMessageW.USER32(?), ref: 00A43955
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A43966
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                            • String ID:
                            • API String ID: 2256411358-0
                            • Opcode ID: 0d4878d6c0a8d3cff536ea0dba88659c1263b65318c84b28bccfb95483dddc2e
                            • Instruction ID: 866cf0a1416e4eeffbec575810432109eb83e3c34a07e765d89abaad266da0e5
                            • Opcode Fuzzy Hash: 0d4878d6c0a8d3cff536ea0dba88659c1263b65318c84b28bccfb95483dddc2e
                            • Instruction Fuzzy Hash: B331F976904342EEEF35CB749C58BB777E8AB86300F044559D4A2C21E1E3F49686CB21
                            APIs
                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00A4C21E,00000000), ref: 00A4CF38
                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00A4CF6F
                            • GetLastError.KERNEL32(?,00000000,?,?,?,00A4C21E,00000000), ref: 00A4CFB4
                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A4C21E,00000000), ref: 00A4CFC8
                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A4C21E,00000000), ref: 00A4CFF2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                            • String ID:
                            • API String ID: 3191363074-0
                            • Opcode ID: 47c89afe21da876786cb10a261858764bf05c6fadaa1b9fe24833166afb3a124
                            • Instruction ID: dffa214be59df689c482d5b85a8e8f729f2e02d8d2cec683f703ca98c4ab6972
                            • Opcode Fuzzy Hash: 47c89afe21da876786cb10a261858764bf05c6fadaa1b9fe24833166afb3a124
                            • Instruction Fuzzy Hash: A2318CB5601305EFDB60DFA5C884AABBBF9EB94321B10442EF50AD2141EB74AE45DB60
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00A31915
                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 00A319C1
                            • Sleep.KERNEL32(00000000,?,?,?), ref: 00A319C9
                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 00A319DA
                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00A319E2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessagePostSleep$RectWindow
                            • String ID:
                            • API String ID: 3382505437-0
                            • Opcode ID: 3aca8b42f4afc7225597f8a876c0b6c08e2ddf2e702ced5db72ad1fe0d8a6b5b
                            • Instruction ID: 448771c4a1decaaeae353d2727d6d2f3fa2ddc15efb73027045b4e7ab13271ce
                            • Opcode Fuzzy Hash: 3aca8b42f4afc7225597f8a876c0b6c08e2ddf2e702ced5db72ad1fe0d8a6b5b
                            • Instruction Fuzzy Hash: D031B471A00219EFCB04CFA8CD99BEE7BB5EB45325F104225F961A72D1C7B09D54DB90
                            APIs
                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A65745
                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A6579D
                            • _wcslen.LIBCMT ref: 00A657AF
                            • _wcslen.LIBCMT ref: 00A657BA
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A65816
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen
                            • String ID:
                            • API String ID: 763830540-0
                            • Opcode ID: e7dec30b3135b1fc9e39943a04525f1015c94367060e7a36b38a84d58d23f43c
                            • Instruction ID: ba50207a8361ad041c49d66d70f9232cc3e6bd7167dba62a8bba587d0688907c
                            • Opcode Fuzzy Hash: e7dec30b3135b1fc9e39943a04525f1015c94367060e7a36b38a84d58d23f43c
                            • Instruction Fuzzy Hash: CF218275D04618AADB20DFB0CC85AEE77B8FF44724F108656E929EB1C0DBB49985CF50
                            APIs
                            • IsWindow.USER32(00000000), ref: 00A50951
                            • GetForegroundWindow.USER32 ref: 00A50968
                            • GetDC.USER32(00000000), ref: 00A509A4
                            • GetPixel.GDI32(00000000,?,00000003), ref: 00A509B0
                            • ReleaseDC.USER32(00000000,00000003), ref: 00A509E8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$ForegroundPixelRelease
                            • String ID:
                            • API String ID: 4156661090-0
                            • Opcode ID: ae3a96ec4064c768b5f38bebbbd80c83672a1cb8cf58d62a4cc217827260aa86
                            • Instruction ID: f7e6cb04c50cf76a788aec5ee7f0de9dea524a5ec46531a3759b2b295ce0d187
                            • Opcode Fuzzy Hash: ae3a96ec4064c768b5f38bebbbd80c83672a1cb8cf58d62a4cc217827260aa86
                            • Instruction Fuzzy Hash: 7E216F39600204AFD704EFA9D985AAEBBF5FF84751F048069F85A97352CB70AC45CB50
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 00A0CDC6
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A0CDE9
                              • Part of subcall function 00A03820: RtlAllocateHeap.NTDLL(00000000,?,00AA1444,?,009EFDF5,?,?,009DA976,00000010,00AA1440,009D13FC,?,009D13C6,?,009D1129), ref: 00A03852
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00A0CE0F
                            • _free.LIBCMT ref: 00A0CE22
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A0CE31
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                            • String ID:
                            • API String ID: 336800556-0
                            • Opcode ID: ebb4a37c0d93747e105a18b7d63fdb14e6b360c8d0bc4bfc79b9191a5087d37d
                            • Instruction ID: e168347f51ca50fad1f0919ef153a86a3917c328ae04f71f02f68084a51d4c90
                            • Opcode Fuzzy Hash: ebb4a37c0d93747e105a18b7d63fdb14e6b360c8d0bc4bfc79b9191a5087d37d
                            • Instruction Fuzzy Hash: 8701B1726012197FE32167F6BC8CD7B697DDAC6BB13150229FD05C7280EA608D0291B0
                            APIs
                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009E9693
                            • SelectObject.GDI32(?,00000000), ref: 009E96A2
                            • BeginPath.GDI32(?), ref: 009E96B9
                            • SelectObject.GDI32(?,00000000), ref: 009E96E2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: 7469100ab82f2ea3ab57308d1fec4e5dec612637fe5b55dc4b0e4f3e32e8b907
                            • Instruction ID: a58962834916ee549ff135a1290c1c1c66e5344d7b2eb2fb09520949159ba580
                            • Opcode Fuzzy Hash: 7469100ab82f2ea3ab57308d1fec4e5dec612637fe5b55dc4b0e4f3e32e8b907
                            • Instruction Fuzzy Hash: 44218330801346FBDB12DFA5EC187AA7BB8BB42765F100216F420961F0D3749D92CB94
                            APIs
                            • GetSysColor.USER32(00000008), ref: 009E98CC
                            • SetTextColor.GDI32(?,?), ref: 009E98D6
                            • SetBkMode.GDI32(?,00000001), ref: 009E98E9
                            • GetStockObject.GDI32(00000005), ref: 009E98F1
                            • GetWindowLongW.USER32(?,000000EB), ref: 009E9952
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Color$LongModeObjectStockTextWindow
                            • String ID:
                            • API String ID: 1860813098-0
                            • Opcode ID: b2a75ea74ac63d8c409044e11df57e6b4a745acfe2ecf5cd22b86da7d2eacdaa
                            • Instruction ID: ea79a59d1c4aefff381ceeec3a586b8a45530e929ad2ccb0cf952bc2cb8935e4
                            • Opcode Fuzzy Hash: b2a75ea74ac63d8c409044e11df57e6b4a745acfe2ecf5cd22b86da7d2eacdaa
                            • Instruction Fuzzy Hash: 302102321452A0ABCB238F66EC54AFA3B34EF27331F18015AF9828B1A2D7754D51CB91
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: e681e68ea5d01b843dda3191e56571fd2edae3c5290b0b06f5292524c7c85421
                            • Instruction ID: 7ae4a7b5e7fc5a7ae188a0298b368c68a91a13b2db66b011343652b45a1a1e34
                            • Opcode Fuzzy Hash: e681e68ea5d01b843dda3191e56571fd2edae3c5290b0b06f5292524c7c85421
                            • Instruction Fuzzy Hash: D3017571A45609FFD6085629ED82FBB736DAF71394F414821FE04AA641F761ED10C3E1
                            APIs
                            • GetLastError.KERNEL32(?,?,?,009FF2DE,00A03863,00AA1444,?,009EFDF5,?,?,009DA976,00000010,00AA1440,009D13FC,?,009D13C6), ref: 00A02DFD
                            • _free.LIBCMT ref: 00A02E32
                            • _free.LIBCMT ref: 00A02E59
                            • SetLastError.KERNEL32(00000000,009D1129), ref: 00A02E66
                            • SetLastError.KERNEL32(00000000,009D1129), ref: 00A02E6F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$_free
                            • String ID:
                            • API String ID: 3170660625-0
                            • Opcode ID: f18fb58a3acb42fa1a9669567cdd380f2ab83851374b0ddf5767f901c670965c
                            • Instruction ID: 761f3a6024ed81f922ba7751775fb3172fc2b365975eca93d135cadb3bc88053
                            • Opcode Fuzzy Hash: f18fb58a3acb42fa1a9669567cdd380f2ab83851374b0ddf5767f901c670965c
                            • Instruction Fuzzy Hash: 8201F93628570867C6136775BD8DF2B2E7DABD53B17350525F455932D2EF648C024320
                            APIs
                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?,?,00A3035E), ref: 00A3002B
                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?), ref: 00A30046
                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?), ref: 00A30054
                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?), ref: 00A30064
                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A2FF41,80070057,?,?), ref: 00A30070
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: From$Prog$FreeStringTasklstrcmpi
                            • String ID:
                            • API String ID: 3897988419-0
                            • Opcode ID: b836452567621f4c4c189654adf9638b6dd173948953e14a9af449ff77caf421
                            • Instruction ID: 9afb26e045e94014c91d30722930cba271809b5f7ffec9d2972e8e7a1afd589f
                            • Opcode Fuzzy Hash: b836452567621f4c4c189654adf9638b6dd173948953e14a9af449ff77caf421
                            • Instruction Fuzzy Hash: 7F018B72600218BFDB249FA8DC44FAA7ABDEB447A2F148124F945D7210E7B5DD418BA0
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?), ref: 00A3E997
                            • QueryPerformanceFrequency.KERNEL32(?), ref: 00A3E9A5
                            • Sleep.KERNEL32(00000000), ref: 00A3E9AD
                            • QueryPerformanceCounter.KERNEL32(?), ref: 00A3E9B7
                            • Sleep.KERNEL32 ref: 00A3E9F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterSleep$Frequency
                            • String ID:
                            • API String ID: 2833360925-0
                            • Opcode ID: ecb50397ae0b9e0b5779de0ab75a23bbad606975a62d5283e81aa9a439ade7bf
                            • Instruction ID: 4fbe35ba87ba64b0ead86bf19518d94d7fd34520ae3f9423fa486822db71b285
                            • Opcode Fuzzy Hash: ecb50397ae0b9e0b5779de0ab75a23bbad606975a62d5283e81aa9a439ade7bf
                            • Instruction Fuzzy Hash: C6011331C01629DBCF00EBE5DD59AEDFB78BB09712F000656E942B2281CB7096568BA2
                            APIs
                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A31114
                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A31120
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A3112F
                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A30B9B,?,?,?), ref: 00A31136
                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A3114D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 842720411-0
                            • Opcode ID: 3c011d31792b7b12593de62f77c70824b921adf41ff7524d4970ba72a5109acf
                            • Instruction ID: 6fdd09890407a8d9c6cd3286b5f1b8535f72082e5a0990b09dcd7f482be47c17
                            • Opcode Fuzzy Hash: 3c011d31792b7b12593de62f77c70824b921adf41ff7524d4970ba72a5109acf
                            • Instruction Fuzzy Hash: 4D011975200215BFDB128FA5DC49AAA3B7EEF8A3A4B204519FA85D7360DA71DC019A60
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A30FCA
                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A30FD6
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A30FE5
                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A30FEC
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A31002
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: c0a486f4b33f3c4c36526f62a7ba38defc9470e5be0ec18622c23090dce7882b
                            • Instruction ID: 84b84c83796e6baba29f486f4681b6ce907bac90a09190d4a1502789eb22c153
                            • Opcode Fuzzy Hash: c0a486f4b33f3c4c36526f62a7ba38defc9470e5be0ec18622c23090dce7882b
                            • Instruction Fuzzy Hash: 1CF04935200311BBDB218FA59C49F667BBDEF8A762F114424FA8AD6251CAB1DC418A60
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A3102A
                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A31036
                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A31045
                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A3104C
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A31062
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 9a0db3c8122079720217d3a3e9bcae39fce4da323b8c68a3b72b2238788da928
                            • Instruction ID: 5a1a7d5dacfe5e3a1560773eb42716c750734227463172deec8f6e2929d2b136
                            • Opcode Fuzzy Hash: 9a0db3c8122079720217d3a3e9bcae39fce4da323b8c68a3b72b2238788da928
                            • Instruction Fuzzy Hash: 22F06D35200311FBDB229FE5EC59F663BBDEF8A761F510424FA85D7250CAB1D8418A60
                            APIs
                            • CloseHandle.KERNEL32(?,?,?,?,00A4017D,?,00A432FC,?,00000001,00A12592,?), ref: 00A40324
                            • CloseHandle.KERNEL32(?,?,?,?,00A4017D,?,00A432FC,?,00000001,00A12592,?), ref: 00A40331
                            • CloseHandle.KERNEL32(?,?,?,?,00A4017D,?,00A432FC,?,00000001,00A12592,?), ref: 00A4033E
                            • CloseHandle.KERNEL32(?,?,?,?,00A4017D,?,00A432FC,?,00000001,00A12592,?), ref: 00A4034B
                            • CloseHandle.KERNEL32(?,?,?,?,00A4017D,?,00A432FC,?,00000001,00A12592,?), ref: 00A40358
                            • CloseHandle.KERNEL32(?,?,?,?,00A4017D,?,00A432FC,?,00000001,00A12592,?), ref: 00A40365
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID:
                            • API String ID: 2962429428-0
                            • Opcode ID: 45f8b5c40f7edf373bc9bfbee1540b9a50fe8e566d7942abf5da5ac972508a02
                            • Instruction ID: 9fea43d52b859a2a842716afae50281987151d198ace0c649cead9e1f3d995c1
                            • Opcode Fuzzy Hash: 45f8b5c40f7edf373bc9bfbee1540b9a50fe8e566d7942abf5da5ac972508a02
                            • Instruction Fuzzy Hash: 2001A276800B159FC7309F66D890812FBF5BF903153158A3FD29656931C3B1B955DF80
                            APIs
                            • _free.LIBCMT ref: 00A0D752
                              • Part of subcall function 00A029C8: HeapFree.KERNEL32(00000000,00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000), ref: 00A029DE
                              • Part of subcall function 00A029C8: GetLastError.KERNEL32(00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000,00000000), ref: 00A029F0
                            • _free.LIBCMT ref: 00A0D764
                            • _free.LIBCMT ref: 00A0D776
                            • _free.LIBCMT ref: 00A0D788
                            • _free.LIBCMT ref: 00A0D79A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 6a7b215578059f3db213a9776fa2085bb430c524cef2579dcb7501615b957e3a
                            • Instruction ID: db7e2f46f559eb183f504c1b959a3d252a912c729e6389dfdc1ae3651be7618b
                            • Opcode Fuzzy Hash: 6a7b215578059f3db213a9776fa2085bb430c524cef2579dcb7501615b957e3a
                            • Instruction Fuzzy Hash: 7AF0FF3364471CABC621EBA8FAC5D1677DDBB847607A40806F048E7581CB20FC8187A4
                            APIs
                            • GetDlgItem.USER32(?,000003E9), ref: 00A35C58
                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A35C6F
                            • MessageBeep.USER32(00000000), ref: 00A35C87
                            • KillTimer.USER32(?,0000040A), ref: 00A35CA3
                            • EndDialog.USER32(?,00000001), ref: 00A35CBD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                            • String ID:
                            • API String ID: 3741023627-0
                            • Opcode ID: fbacf62b55c0b61796490ccf106a79d5cdfee5dc5804275d1e550345cc6df76c
                            • Instruction ID: 4eb00f6e5be864ed76e33146f41629e915cc261f66fa3d642526114703cc16cc
                            • Opcode Fuzzy Hash: fbacf62b55c0b61796490ccf106a79d5cdfee5dc5804275d1e550345cc6df76c
                            • Instruction Fuzzy Hash: E9018634900B04ABEB259B64DD4EFA677B8BB00B05F04255AF583A14E1DBF4A985CA94
                            APIs
                            • _free.LIBCMT ref: 00A022BE
                              • Part of subcall function 00A029C8: HeapFree.KERNEL32(00000000,00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000), ref: 00A029DE
                              • Part of subcall function 00A029C8: GetLastError.KERNEL32(00000000,?,00A0D7D1,00000000,00000000,00000000,00000000,?,00A0D7F8,00000000,00000007,00000000,?,00A0DBF5,00000000,00000000), ref: 00A029F0
                            • _free.LIBCMT ref: 00A022D0
                            • _free.LIBCMT ref: 00A022E3
                            • _free.LIBCMT ref: 00A022F4
                            • _free.LIBCMT ref: 00A02305
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 71508f466f42ee5468de4f4667e2717dea9e7e6e8f88bf35fa28787de7cd0876
                            • Instruction ID: f59de7d79666d417a27387d9457aa2c351299edfe78abb187d894cadbaeddc94
                            • Opcode Fuzzy Hash: 71508f466f42ee5468de4f4667e2717dea9e7e6e8f88bf35fa28787de7cd0876
                            • Instruction Fuzzy Hash: ACF0177491072A9FCA12EFD8BD05E8C3AA4B75A7A0B50055BF410E22F1CB304813AFE4
                            APIs
                            • EndPath.GDI32(?), ref: 009E95D4
                            • StrokeAndFillPath.GDI32(?,?,00A271F7,00000000,?,?,?), ref: 009E95F0
                            • SelectObject.GDI32(?,00000000), ref: 009E9603
                            • DeleteObject.GDI32 ref: 009E9616
                            • StrokePath.GDI32(?), ref: 009E9631
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Path$ObjectStroke$DeleteFillSelect
                            • String ID:
                            • API String ID: 2625713937-0
                            • Opcode ID: f5a5d82176a592d70236f067ec7f7bd6acba6e6f74fbc257990d861777d42e90
                            • Instruction ID: 973f5c3fcc96f57e56dca7c7ea53fe3b509882a1cfbeaf6b867095864849122f
                            • Opcode Fuzzy Hash: f5a5d82176a592d70236f067ec7f7bd6acba6e6f74fbc257990d861777d42e90
                            • Instruction Fuzzy Hash: 70F0143000624AFBDB22DFAAED18B667B75BB06372F448215F8B5550F0DB748996DF20
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: __freea$_free
                            • String ID: a/p$am/pm
                            • API String ID: 3432400110-3206640213
                            • Opcode ID: 06ea11177eef33772c62e428537fbcac5e550c6d49ac112446b628eaec848798
                            • Instruction ID: 9bc32628473afd361f0a75411f35b540d314812b93541a64640bff7f476a89c8
                            • Opcode Fuzzy Hash: 06ea11177eef33772c62e428537fbcac5e550c6d49ac112446b628eaec848798
                            • Instruction Fuzzy Hash: 5FD1E27190020EDBDB689F68E895BFAB7B5FF05300F284269E9419F6D0D3759D80CB92
                            APIs
                              • Part of subcall function 009F0242: EnterCriticalSection.KERNEL32(00AA070C,00AA1884,?,?,009E198B,00AA2518,?,?,?,009D12F9,00000000), ref: 009F024D
                              • Part of subcall function 009F0242: LeaveCriticalSection.KERNEL32(00AA070C,?,009E198B,00AA2518,?,?,?,009D12F9,00000000), ref: 009F028A
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 009F00A3: __onexit.LIBCMT ref: 009F00A9
                            • __Init_thread_footer.LIBCMT ref: 00A57BFB
                              • Part of subcall function 009F01F8: EnterCriticalSection.KERNEL32(00AA070C,?,?,009E8747,00AA2514), ref: 009F0202
                              • Part of subcall function 009F01F8: LeaveCriticalSection.KERNEL32(00AA070C,?,009E8747,00AA2514), ref: 009F0235
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                            • String ID: 5$G$Variable must be of type 'Object'.
                            • API String ID: 535116098-3733170431
                            • Opcode ID: 48b40288c8e42576d4e7d4031b435b89af326499f63aa0ba52a301e45c2254b1
                            • Instruction ID: c92326216881258762e99ad116eb0f67c1d999ed63c157494007931fba88a7d7
                            • Opcode Fuzzy Hash: 48b40288c8e42576d4e7d4031b435b89af326499f63aa0ba52a301e45c2254b1
                            • Instruction Fuzzy Hash: 26918D75A04209AFCB04EF54E991EBDB7B1FF89301F108059FC46AB292DB71AE49CB51
                            APIs
                              • Part of subcall function 00A3B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A321D0,?,?,00000034,00000800,?,00000034), ref: 00A3B42D
                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A32760
                              • Part of subcall function 00A3B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00A3B3F8
                              • Part of subcall function 00A3B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00A3B355
                              • Part of subcall function 00A3B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A32194,00000034,?,?,00001004,00000000,00000000), ref: 00A3B365
                              • Part of subcall function 00A3B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A32194,00000034,?,?,00001004,00000000,00000000), ref: 00A3B37B
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A327CD
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A3281A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                            • String ID: @
                            • API String ID: 4150878124-2766056989
                            • Opcode ID: cc048fbb0bf3e7888322db15656806d92bc1df31c6453d78e11b74e8b3af351d
                            • Instruction ID: 750a6a6fa76d18ffa97b50e44e8335ae101071359610753816e1fcade40e7c47
                            • Opcode Fuzzy Hash: cc048fbb0bf3e7888322db15656806d92bc1df31c6453d78e11b74e8b3af351d
                            • Instruction Fuzzy Hash: 2A410976900218BFDB10DFA4CD85BEEBBB8AF09700F108099FA55B7181DB706E45DBA1
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00A01769
                            • _free.LIBCMT ref: 00A01834
                            • _free.LIBCMT ref: 00A0183E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free$FileModuleName
                            • String ID: C:\Users\user\Desktop\file.exe
                            • API String ID: 2506810119-1957095476
                            • Opcode ID: 4e9cb3b247f575538e6827e24655a2bd1322a345ea6e24d1125f1d77340fa9c8
                            • Instruction ID: 6b3585b97986f9eb375e1ab0ba35dd3bdfefa5fc156be7ff44ec3f7709c15fc9
                            • Opcode Fuzzy Hash: 4e9cb3b247f575538e6827e24655a2bd1322a345ea6e24d1125f1d77340fa9c8
                            • Instruction Fuzzy Hash: 63318C75A0021CABDB21DFD9A885EDEBBFCEB85350F104166F80497291D7B08E45CBA0
                            APIs
                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A3C306
                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00A3C34C
                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00AA1990,00B95A68), ref: 00A3C395
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$Delete$InfoItem
                            • String ID: 0
                            • API String ID: 135850232-4108050209
                            • Opcode ID: df527831e04e2251de5dd8d2f175a8fd2f5cf67703a4d38523eaf45458b1854f
                            • Instruction ID: 7e6afaf14c16dc265bfbc5169b264bf0a4896b1a7b47f4b9c092b247b8ceacf9
                            • Opcode Fuzzy Hash: df527831e04e2251de5dd8d2f175a8fd2f5cf67703a4d38523eaf45458b1854f
                            • Instruction Fuzzy Hash: 92419F712043019FD720DF25DC85B6AFBE4AF85320F148A1EF9A6AB2D1D770E904CB62
                            APIs
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A6CC08,00000000,?,?,?,?), ref: 00A644AA
                            • GetWindowLongW.USER32 ref: 00A644C7
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A644D7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID: SysTreeView32
                            • API String ID: 847901565-1698111956
                            • Opcode ID: 852cf9d28f38f21597508121a0eedf1ff08470d6b0891b83ffab4f7fa59d5ef0
                            • Instruction ID: ec8b96910a50e0f78ea6e1b2d039ba8384ce6d962f23e96c11d2fec770033daf
                            • Opcode Fuzzy Hash: 852cf9d28f38f21597508121a0eedf1ff08470d6b0891b83ffab4f7fa59d5ef0
                            • Instruction Fuzzy Hash: 04319A31210205AFDB218F78DC4ABEA7BB9EB49334F208715F976A21E0DB70AC519B50
                            APIs
                              • Part of subcall function 00A5335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00A53077,?,?), ref: 00A53378
                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A5307A
                            • _wcslen.LIBCMT ref: 00A5309B
                            • htons.WSOCK32(00000000,?,?,00000000), ref: 00A53106
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                            • String ID: 255.255.255.255
                            • API String ID: 946324512-2422070025
                            • Opcode ID: 82cd0cdb58e4d8e6e37b1da4252b69d3c15e402916493b4953f1c7ef23c301d6
                            • Instruction ID: 8f2b680a9feeec74210438e176e9fc5fd06b17ff73a5fa948c8f3390202c0c35
                            • Opcode Fuzzy Hash: 82cd0cdb58e4d8e6e37b1da4252b69d3c15e402916493b4953f1c7ef23c301d6
                            • Instruction Fuzzy Hash: EE31B2362002059FCF20DF68C585AAA77F0FF94399F248159E9158B392D771DE49C760
                            APIs
                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A63F40
                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A63F54
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A63F78
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$Window
                            • String ID: SysMonthCal32
                            • API String ID: 2326795674-1439706946
                            • Opcode ID: de502411ffc89a15b3431d28257061ad6f65da04f97b7320a0354d6c7d668b33
                            • Instruction ID: d73c12620644b1a3a8ec803635f56ad8be610f97a91e44b122701e82201924d8
                            • Opcode Fuzzy Hash: de502411ffc89a15b3431d28257061ad6f65da04f97b7320a0354d6c7d668b33
                            • Instruction Fuzzy Hash: 4A219C33610219BFDF25DF90CC46FEA3BB9EF48724F110214FA556B1D0D6B5A9518BA0
                            APIs
                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A64705
                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A64713
                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A6471A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$DestroyWindow
                            • String ID: msctls_updown32
                            • API String ID: 4014797782-2298589950
                            • Opcode ID: c2d1d3fac16eae7c644e3a8cc408e7b6c337637e697b2f17cf8e4807d9e95e2d
                            • Instruction ID: 4c841ce64e15b1e86d2bbed20acd03fd533036fba52a59d69995832277c0851b
                            • Opcode Fuzzy Hash: c2d1d3fac16eae7c644e3a8cc408e7b6c337637e697b2f17cf8e4807d9e95e2d
                            • Instruction Fuzzy Hash: 55215EB5600209AFEB10DF64DC91DB737BDEB9A3A4B040159FA009B2A1DB70EC52CA60
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                            • API String ID: 176396367-2734436370
                            • Opcode ID: 33befb3a261c9083cf8a159d1202cd7417ffbaf2f63653dd39304233b1687ff4
                            • Instruction ID: d4db7d155b20469fedbfcbb48db192240310862947fd8c14707641007db516bb
                            • Opcode Fuzzy Hash: 33befb3a261c9083cf8a159d1202cd7417ffbaf2f63653dd39304233b1687ff4
                            • Instruction Fuzzy Hash: F1212B722456116AD331BB249C13FB7B3E8AF91310F54842AF94A97181EBD1AD85C395
                            APIs
                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A63840
                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A63850
                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A63876
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend$MoveWindow
                            • String ID: Listbox
                            • API String ID: 3315199576-2633736733
                            • Opcode ID: 9717c783b234e6d0b8d0b96f6f3f8197699aab182edd2989fcaf3b695fbc48b9
                            • Instruction ID: 230694e394830cf35f7965f0ca536ee4b133e6bff45201aab694e4101e9c9967
                            • Opcode Fuzzy Hash: 9717c783b234e6d0b8d0b96f6f3f8197699aab182edd2989fcaf3b695fbc48b9
                            • Instruction Fuzzy Hash: D3217F72610118BBEF11DF95DC85EBB377AEF89760F108114F9549B190CAB59C5287A0
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 00A44A08
                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A44A5C
                            • SetErrorMode.KERNEL32(00000000,?,?,00A6CC08), ref: 00A44AD0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume
                            • String ID: %lu
                            • API String ID: 2507767853-685833217
                            • Opcode ID: 9f2d45208d4ff64582e5a873558f841d1a3de03b344a0f24d2320db6bb05a12e
                            • Instruction ID: d2087729bd29fbb1da0b79491eeb6035407c35024351e5c9e669f16ebfc861b0
                            • Opcode Fuzzy Hash: 9f2d45208d4ff64582e5a873558f841d1a3de03b344a0f24d2320db6bb05a12e
                            • Instruction Fuzzy Hash: 0E316175A00108AFDB10DF64C985EAA77F8EF49318F1480A5F909DB352DB71ED46CB61
                            APIs
                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A6424F
                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A64264
                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A64271
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: msctls_trackbar32
                            • API String ID: 3850602802-1010561917
                            • Opcode ID: fa662a90e6861331a75021c12c537b65c75cc4ebc4e6450df18cd86357cccbf1
                            • Instruction ID: 3beb4ed57571f828942cc782f0b59bc53c7897ccdb15ec18a715316621109eaa
                            • Opcode Fuzzy Hash: fa662a90e6861331a75021c12c537b65c75cc4ebc4e6450df18cd86357cccbf1
                            • Instruction Fuzzy Hash: FF11E331240208BEEF209F79CC46FEB3BBCEF89B64F110614FA55E2090D2B1D8519B20
                            APIs
                              • Part of subcall function 009D6B57: _wcslen.LIBCMT ref: 009D6B6A
                              • Part of subcall function 00A32DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A32DC5
                              • Part of subcall function 00A32DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A32DD6
                              • Part of subcall function 00A32DA7: GetCurrentThreadId.KERNEL32 ref: 00A32DDD
                              • Part of subcall function 00A32DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A32DE4
                            • GetFocus.USER32 ref: 00A32F78
                              • Part of subcall function 00A32DEE: GetParent.USER32(00000000), ref: 00A32DF9
                            • GetClassNameW.USER32(?,?,00000100), ref: 00A32FC3
                            • EnumChildWindows.USER32(?,00A3303B), ref: 00A32FEB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                            • String ID: %s%d
                            • API String ID: 1272988791-1110647743
                            • Opcode ID: 455a5e485815e8c66275ecc30e2ce9b89c588e225be88f035af57b1097610af6
                            • Instruction ID: 8314c3cd45090d30aac711fe57bc168df27c865c2eb5a1a41a1e089a36023803
                            • Opcode Fuzzy Hash: 455a5e485815e8c66275ecc30e2ce9b89c588e225be88f035af57b1097610af6
                            • Instruction Fuzzy Hash: 2311D2756042056BCF05BFB0DC85FED376AAF94314F048076F9099B252DE709A058B70
                            APIs
                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00A658C1
                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00A658EE
                            • DrawMenuBar.USER32(?), ref: 00A658FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Menu$InfoItem$Draw
                            • String ID: 0
                            • API String ID: 3227129158-4108050209
                            • Opcode ID: e35d85df6951cc2cfed6a322e9dd29f847a64089ff6cd338cadfc7cccc623f05
                            • Instruction ID: f9257e0ee8b133a06b71968fce010b1656bc925e184bc936fcc689f42ca42446
                            • Opcode Fuzzy Hash: e35d85df6951cc2cfed6a322e9dd29f847a64089ff6cd338cadfc7cccc623f05
                            • Instruction Fuzzy Hash: DA016D32900258EFDB219F61DC44BAEBBB5FB45360F10809AE889D6151DB709A84DF31
                            APIs
                            • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00A2D3BF
                            • FreeLibrary.KERNEL32 ref: 00A2D3E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: AddressFreeLibraryProc
                            • String ID: GetSystemWow64DirectoryW$X64
                            • API String ID: 3013587201-2590602151
                            • Opcode ID: b0e91c1cc3ac3db0a04337ab37c06ae11b4f8925810d63a1634854d4db9d836e
                            • Instruction ID: a0386c72ac57d5a32e3a6363de4def436df942a9044320dde049eacd5ba2ae56
                            • Opcode Fuzzy Hash: b0e91c1cc3ac3db0a04337ab37c06ae11b4f8925810d63a1634854d4db9d836e
                            • Instruction Fuzzy Hash: 40F05531902630EBDB329318AC14AF93330AF01B01B688A36E842EA107E760CC408392
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b2c74bd87b775c16c686e181dfdb8401f719248863c0da4243a780096629e325
                            • Instruction ID: 48e8c10f08dd4d815d2933ccc2bc59c2422c8aeed890dfc5b1ecf045c59600dd
                            • Opcode Fuzzy Hash: b2c74bd87b775c16c686e181dfdb8401f719248863c0da4243a780096629e325
                            • Instruction Fuzzy Hash: 65C13975A0021AAFDB14CFA8C8A8EAEB7B5FF48704F218598F505EB251D731ED41DB90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: __alldvrm$_strrchr
                            • String ID:
                            • API String ID: 1036877536-0
                            • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                            • Instruction ID: 3ac605ddbc8e9ef1cebeb982c229e134d9e146ab2d2436f7641f3c1f1a07b316
                            • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                            • Instruction Fuzzy Hash: EAA148B2D0038A9FEB15CF18E8917AEBBF4FF69350F14426DE6859B2C1C2389981C750
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Variant$ClearInitInitializeUninitialize
                            • String ID:
                            • API String ID: 1998397398-0
                            • Opcode ID: d84ae8dd5035b84501a48d2cbf11a1a9be03b4b48747bfcce9f10c6187dceb35
                            • Instruction ID: 59f76a4e1ea2d4e8d1ca9e12be145de200626743440899658c1b170febb6c82e
                            • Opcode Fuzzy Hash: d84ae8dd5035b84501a48d2cbf11a1a9be03b4b48747bfcce9f10c6187dceb35
                            • Instruction Fuzzy Hash: 4FA13B766042009FCB10DF68C585A2AB7E5FF88755F04895DFD8A9B362EB30EE05CB52
                            APIs
                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A6FC08,?), ref: 00A305F0
                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A6FC08,?), ref: 00A30608
                            • CLSIDFromProgID.OLE32(?,?,00000000,00A6CC40,000000FF,?,00000000,00000800,00000000,?,00A6FC08,?), ref: 00A3062D
                            • _memcmp.LIBVCRUNTIME ref: 00A3064E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FromProg$FreeTask_memcmp
                            • String ID:
                            • API String ID: 314563124-0
                            • Opcode ID: dc869cf0d6fbea9536285c943425cf8212a8bbb0c9be1c4e0a8879aa4e59aa8b
                            • Instruction ID: abb3562c0a7d638723fbf48a6b886848e4aff450a5e7dab794f24a4330b98e95
                            • Opcode Fuzzy Hash: dc869cf0d6fbea9536285c943425cf8212a8bbb0c9be1c4e0a8879aa4e59aa8b
                            • Instruction Fuzzy Hash: 26810B71A00109EFCB04DF94C994EEEB7B9FF89315F208599F516AB250DB71AE06CB60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: a7ec053bc3b4a7cd3b1b44dfcb0e498079b33520a1428efc8ba23efa829d4a88
                            • Instruction ID: e6b222098b2569673ad6f9235cbedef1723a3a148c369b02665ada24e3a6dc9c
                            • Opcode Fuzzy Hash: a7ec053bc3b4a7cd3b1b44dfcb0e498079b33520a1428efc8ba23efa829d4a88
                            • Instruction Fuzzy Hash: 3C416C71A00118ABDB216FF99C457FE3AB5EF81770F144225F729D61D2E63488C15362
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00A662E2
                            • ScreenToClient.USER32(?,?), ref: 00A66315
                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00A66382
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$ClientMoveRectScreen
                            • String ID:
                            • API String ID: 3880355969-0
                            • Opcode ID: 6d54b783b75bccbeb1ab54d9f47326b1021e2b41493da42f05701adbeec786a0
                            • Instruction ID: c2de407c8efe00a914c8acc85289b718840abba2f9a52e418c59ec9088cd83ca
                            • Opcode Fuzzy Hash: 6d54b783b75bccbeb1ab54d9f47326b1021e2b41493da42f05701adbeec786a0
                            • Instruction Fuzzy Hash: 8051FA74A00209AFDF10DF68D981AAE7BB5EB45364F10815AF9659B390D770ED81CB50
                            APIs
                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00A51AFD
                            • WSAGetLastError.WSOCK32 ref: 00A51B0B
                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A51B8A
                            • WSAGetLastError.WSOCK32 ref: 00A51B94
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorLast$socket
                            • String ID:
                            • API String ID: 1881357543-0
                            • Opcode ID: af44ebc4450d8f74ffebd248cf38a542c00f3ee7b3d02b9c2ecf9415583e9fb5
                            • Instruction ID: 20f6b4052eed8ef24508a32abfda883b19eb9fc9a3e70a949b683a654a4cc6f0
                            • Opcode Fuzzy Hash: af44ebc4450d8f74ffebd248cf38a542c00f3ee7b3d02b9c2ecf9415583e9fb5
                            • Instruction Fuzzy Hash: CE419F74640200AFE721AF24C886F3977E5AB84718F54C449F95A9F3D2E7B2DD42CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5260cef36a5e15e1f0288146c51e567e28ef0524810c25230c79e3467cc47937
                            • Instruction ID: 998b5f8abe1053dac5a60ee50ead19c68668dbdb6832bd4fa0397a351e437d4d
                            • Opcode Fuzzy Hash: 5260cef36a5e15e1f0288146c51e567e28ef0524810c25230c79e3467cc47937
                            • Instruction Fuzzy Hash: 32412B71A10308BFD7249F78DD41BAEBBE9EF88710F10856AF151DB6C1D372AA418790
                            APIs
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A45783
                            • GetLastError.KERNEL32(?,00000000), ref: 00A457A9
                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A457CE
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A457FA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateHardLink$DeleteErrorFileLast
                            • String ID:
                            • API String ID: 3321077145-0
                            • Opcode ID: f98148fb15c7abb1dc00dd26b392817eb192b3b49617c20ef3bd4419f02faf62
                            • Instruction ID: 55d7e00e3dfebcb0a0458b552dda5bb787422b75da0f22c949f2ccbbc60d637b
                            • Opcode Fuzzy Hash: f98148fb15c7abb1dc00dd26b392817eb192b3b49617c20ef3bd4419f02faf62
                            • Instruction Fuzzy Hash: 2B411B39600611DFCB11EF65C544A59BBE1EF89720B19C889FC4AAB362DB30FD01CB91
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,009F6D71,00000000,00000000,009F82D9,?,009F82D9,?,00000001,009F6D71,8BE85006,00000001,009F82D9,009F82D9), ref: 00A0D910
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A0D999
                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00A0D9AB
                            • __freea.LIBCMT ref: 00A0D9B4
                              • Part of subcall function 00A03820: RtlAllocateHeap.NTDLL(00000000,?,00AA1444,?,009EFDF5,?,?,009DA976,00000010,00AA1440,009D13FC,?,009D13C6,?,009D1129), ref: 00A03852
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                            • String ID:
                            • API String ID: 2652629310-0
                            • Opcode ID: b8f1ee8690d22fae0b8b0b5d10ef5a4eabfacd68d837ad32857f6dbbf506ea7d
                            • Instruction ID: 4149306fbc76450a229bc861751af6bc3a7c8bb52c4054acb72467e2ff152cad
                            • Opcode Fuzzy Hash: b8f1ee8690d22fae0b8b0b5d10ef5a4eabfacd68d837ad32857f6dbbf506ea7d
                            • Instruction Fuzzy Hash: 9031D072A0020AABDF24CFA4EC81EBE7BA5EB41760F054268FC04D7290EB35CD50CB90
                            APIs
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00A65352
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A65375
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A65382
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A653A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LongWindow$InvalidateMessageRectSend
                            • String ID:
                            • API String ID: 3340791633-0
                            • Opcode ID: 1ed015d56f878461bbc8b7cd00a58bebd03f16d5136c64630c00f82c80ac2f70
                            • Instruction ID: 92e8dccf6eb5ec834634de34306a114c36443fd6562b936a40847c3f2d719537
                            • Opcode Fuzzy Hash: 1ed015d56f878461bbc8b7cd00a58bebd03f16d5136c64630c00f82c80ac2f70
                            • Instruction Fuzzy Hash: D031BE34E55A08AFEB349F74CC26BE93775AB05B90F584102FA519E3E1C7B49980AB42
                            APIs
                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00A3ABF1
                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A3AC0D
                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A3AC74
                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00A3ACC6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: 3fdcc5b95a3af59c24054c3cb3c5d72d9c295ba6db3df6e5709a36988e349003
                            • Instruction ID: a05e95a3f6f7b1a988d1b665a743649398c5b8a602e82c793d31df6f6a282530
                            • Opcode Fuzzy Hash: 3fdcc5b95a3af59c24054c3cb3c5d72d9c295ba6db3df6e5709a36988e349003
                            • Instruction Fuzzy Hash: 03311430A043286FEB25CBE5CC097FA7BB5ABA9320F08621AF4C5921D1C3758D818752
                            APIs
                            • ClientToScreen.USER32(?,?), ref: 00A6769A
                            • GetWindowRect.USER32(?,?), ref: 00A67710
                            • PtInRect.USER32(?,?,00A68B89), ref: 00A67720
                            • MessageBeep.USER32(00000000), ref: 00A6778C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Rect$BeepClientMessageScreenWindow
                            • String ID:
                            • API String ID: 1352109105-0
                            • Opcode ID: d120d8fe919416be5f508d479c696263a05748fd2017c9bd8aba89e870f7e35f
                            • Instruction ID: 5eb82d9c59df4151c72d63a63de3dea87bb153b52468c8814e54fc27f5b41001
                            • Opcode Fuzzy Hash: d120d8fe919416be5f508d479c696263a05748fd2017c9bd8aba89e870f7e35f
                            • Instruction Fuzzy Hash: 2D419D38A15215EFDB01CFA8C894EADB7F5FF49318F1580A9E9159B2A1D730E942CF90
                            APIs
                            • GetForegroundWindow.USER32 ref: 00A616EB
                              • Part of subcall function 00A33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A33A57
                              • Part of subcall function 00A33A3D: GetCurrentThreadId.KERNEL32 ref: 00A33A5E
                              • Part of subcall function 00A33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A325B3), ref: 00A33A65
                            • GetCaretPos.USER32(?), ref: 00A616FF
                            • ClientToScreen.USER32(00000000,?), ref: 00A6174C
                            • GetForegroundWindow.USER32 ref: 00A61752
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                            • String ID:
                            • API String ID: 2759813231-0
                            • Opcode ID: 87a8c01bd0b9f9ed7e5296a898b437c2782a4b6e37b9dbc5a8720bf356c0e698
                            • Instruction ID: 6e6fcfc1226160697d420615a30698fba710d76c3d3ae76463804aed32c61bc6
                            • Opcode Fuzzy Hash: 87a8c01bd0b9f9ed7e5296a898b437c2782a4b6e37b9dbc5a8720bf356c0e698
                            • Instruction Fuzzy Hash: 42314F75D00149AFCB00EFA9C881DAEBBF9EF88304B5480AAE455E7351E7319E45CFA0
                            APIs
                              • Part of subcall function 009D7620: _wcslen.LIBCMT ref: 009D7625
                            • _wcslen.LIBCMT ref: 00A3DFCB
                            • _wcslen.LIBCMT ref: 00A3DFE2
                            • _wcslen.LIBCMT ref: 00A3E00D
                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00A3E018
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$ExtentPoint32Text
                            • String ID:
                            • API String ID: 3763101759-0
                            • Opcode ID: 27fb5da8d001d3a153fc40b732a5175fa6b7e10638f38c123f1050ca04b899f9
                            • Instruction ID: 67db83536e7924208601ef8263b1e5489bd268a838fa982d005edd61be9bb8eb
                            • Opcode Fuzzy Hash: 27fb5da8d001d3a153fc40b732a5175fa6b7e10638f38c123f1050ca04b899f9
                            • Instruction Fuzzy Hash: B8218371940214EFCB11DFA8D981B7EB7F8EF85750F148065F905BB285D6709E41CBA1
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00A3D501
                            • Process32FirstW.KERNEL32(00000000,?), ref: 00A3D50F
                            • Process32NextW.KERNEL32(00000000,?), ref: 00A3D52F
                            • CloseHandle.KERNEL32(00000000), ref: 00A3D5DC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                            • String ID:
                            • API String ID: 420147892-0
                            • Opcode ID: 4724fafe5134fb67b38d8da24d76b5e4b29425a5c9abb745619846581ec42f3a
                            • Instruction ID: cd97a5a687107ead4cd560eaacb861f4442406b503897ede17c6bfa404268989
                            • Opcode Fuzzy Hash: 4724fafe5134fb67b38d8da24d76b5e4b29425a5c9abb745619846581ec42f3a
                            • Instruction Fuzzy Hash: C0318F711083009FD301EF54D881BAFBBF8EFD9354F14492EF585862A1EB719949CB92
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • GetCursorPos.USER32(?), ref: 00A69001
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A27711,?,?,?,?,?), ref: 00A69016
                            • GetCursorPos.USER32(?), ref: 00A6905E
                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A27711,?,?,?), ref: 00A69094
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                            • String ID:
                            • API String ID: 2864067406-0
                            • Opcode ID: 143e6f6929bc7c19de30d3cec5a50baf3e13ddf55c0dcb36a4de250d2cea7cbf
                            • Instruction ID: ef2f37800dddb01d6f19a916b9862e06677d174ba2e64c637ffcf9e2ab5968db
                            • Opcode Fuzzy Hash: 143e6f6929bc7c19de30d3cec5a50baf3e13ddf55c0dcb36a4de250d2cea7cbf
                            • Instruction Fuzzy Hash: D4217C35601018AFCB26CF94CC58EFB7BB9EB8A360F154059F905472A1C3759951DB61
                            APIs
                            • GetFileAttributesW.KERNEL32(?,00A6CB68), ref: 00A3D2FB
                            • GetLastError.KERNEL32 ref: 00A3D30A
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A3D319
                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00A6CB68), ref: 00A3D376
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateDirectory$AttributesErrorFileLast
                            • String ID:
                            • API String ID: 2267087916-0
                            • Opcode ID: e8adbd44fc555ef8a7a1ace963318617218b49b48e38125a4de012242ba50468
                            • Instruction ID: 086a7678de4ededa2111d47e6b4c075e4ff0f33a18539e535e4a37f2e6b6b165
                            • Opcode Fuzzy Hash: e8adbd44fc555ef8a7a1ace963318617218b49b48e38125a4de012242ba50468
                            • Instruction Fuzzy Hash: 50219170549201DFC300EF64E8815AAB7E4EF96724F104A1EF499DB2A1E731DD4ACB93
                            APIs
                              • Part of subcall function 00A31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A3102A
                              • Part of subcall function 00A31014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A31036
                              • Part of subcall function 00A31014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A31045
                              • Part of subcall function 00A31014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A3104C
                              • Part of subcall function 00A31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A31062
                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A315BE
                            • _memcmp.LIBVCRUNTIME ref: 00A315E1
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A31617
                            • HeapFree.KERNEL32(00000000), ref: 00A3161E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                            • String ID:
                            • API String ID: 1592001646-0
                            • Opcode ID: 4c1caba71617d620121926865b40fc6e4d3ac3b977cc5074c7d4a0f47c5e7e7a
                            • Instruction ID: a20ce809abea1bf9fe0cf3104836bbc8c807ee5c51782c39607c5205f09f8aae
                            • Opcode Fuzzy Hash: 4c1caba71617d620121926865b40fc6e4d3ac3b977cc5074c7d4a0f47c5e7e7a
                            • Instruction Fuzzy Hash: 6821AC31E00209EFDF00DFE5C945BEEB7B8EF84354F098469E441AB241E770AA05CBA0
                            APIs
                            • GetWindowLongW.USER32(?,000000EC), ref: 00A6280A
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A62824
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A62832
                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00A62840
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Long$AttributesLayered
                            • String ID:
                            • API String ID: 2169480361-0
                            • Opcode ID: c206e23191c0506856460e53bb9f3e5a7a31a19106621eb8c56f1777f6f1414f
                            • Instruction ID: 5e6ffe376d3136b11937a644a96d283337bec78693ca5a1c78c94a2b764005e0
                            • Opcode Fuzzy Hash: c206e23191c0506856460e53bb9f3e5a7a31a19106621eb8c56f1777f6f1414f
                            • Instruction Fuzzy Hash: 5F21CF31205911AFD714DB24CC44FAA7BB5AF95324F148159F4668B6E2CBB1FC82CBD0
                            APIs
                              • Part of subcall function 00A38D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00A3790A,?,000000FF,?,00A38754,00000000,?,0000001C,?,?), ref: 00A38D8C
                              • Part of subcall function 00A38D7D: lstrcpyW.KERNEL32(00000000,?,?,00A3790A,?,000000FF,?,00A38754,00000000,?,0000001C,?,?,00000000), ref: 00A38DB2
                              • Part of subcall function 00A38D7D: lstrcmpiW.KERNEL32(00000000,?,00A3790A,?,000000FF,?,00A38754,00000000,?,0000001C,?,?), ref: 00A38DE3
                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00A38754,00000000,?,0000001C,?,?,00000000), ref: 00A37923
                            • lstrcpyW.KERNEL32(00000000,?,?,00A38754,00000000,?,0000001C,?,?,00000000), ref: 00A37949
                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A38754,00000000,?,0000001C,?,?,00000000), ref: 00A37984
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: lstrcmpilstrcpylstrlen
                            • String ID: cdecl
                            • API String ID: 4031866154-3896280584
                            • Opcode ID: 41c9742d29a7b7c172a90f364af78e0ed62729c24cba3834da1c4af7577bc1d8
                            • Instruction ID: 3b8a8b5004db49981fa02318f61f0ee52a267b49674b9e31a729876b46456b96
                            • Opcode Fuzzy Hash: 41c9742d29a7b7c172a90f364af78e0ed62729c24cba3834da1c4af7577bc1d8
                            • Instruction Fuzzy Hash: 5711D67A200341ABCB259F35D845E7A77A5FF85390F50412AF946C7264EB719811C751
                            APIs
                            • GetWindowLongW.USER32(?,000000F0), ref: 00A67D0B
                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00A67D2A
                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A67D42
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00A4B7AD,00000000), ref: 00A67D6B
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID:
                            • API String ID: 847901565-0
                            • Opcode ID: b6e297519dff3787c646b633c4d89c3bc2d4594994379cd65663292de2afdd6a
                            • Instruction ID: fb289705ebe18fc89ee625c44574d2dc2c41242d12a95bfa16b2b652ef439728
                            • Opcode Fuzzy Hash: b6e297519dff3787c646b633c4d89c3bc2d4594994379cd65663292de2afdd6a
                            • Instruction Fuzzy Hash: 99118C35624615AFCB119F68CC04ABA3BB5AF46374F158B24F839C72F0E7309951CB50
                            APIs
                            • SendMessageW.USER32(?,00001060,?,00000004), ref: 00A656BB
                            • _wcslen.LIBCMT ref: 00A656CD
                            • _wcslen.LIBCMT ref: 00A656D8
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A65816
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend_wcslen
                            • String ID:
                            • API String ID: 455545452-0
                            • Opcode ID: 2eab0a0734cee9c89fd6a4683ad23033f2f107fe70f85e5427d90be6b77e7e90
                            • Instruction ID: c71925ee15c9c2f199247e907e41ae628876a5105141789a878b9f1736bc455e
                            • Opcode Fuzzy Hash: 2eab0a0734cee9c89fd6a4683ad23033f2f107fe70f85e5427d90be6b77e7e90
                            • Instruction Fuzzy Hash: 3C11B176E00609A6DB20DFB1CC85AFE77BCAF11764F10806AF915D6081EBB48A80CB60
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f843a7166f297121f687e1a0fe476ef065dfc5b3f1e9c14819df5e225c1f874d
                            • Instruction ID: b26f0f20ac43b080ffb6bc8ec006f7feb383ca52a008275941dd16b516d02d74
                            • Opcode Fuzzy Hash: f843a7166f297121f687e1a0fe476ef065dfc5b3f1e9c14819df5e225c1f874d
                            • Instruction Fuzzy Hash: 3B0181B220961E7EF62127B87CC5FB7666DEF867B8F340325F521A11D2EB608C015170
                            APIs
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00A31A47
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A31A59
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A31A6F
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A31A8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 7bd944243e3a815eb5c439b6fa349a08ba08a1bde4ca542f593945f4f5e481dc
                            • Instruction ID: c12506bcfc6dac0d3f73a28e1c62981373a6ad290dd161d9c3a046959dfd5347
                            • Opcode Fuzzy Hash: 7bd944243e3a815eb5c439b6fa349a08ba08a1bde4ca542f593945f4f5e481dc
                            • Instruction Fuzzy Hash: 2111093AD01219FFEB11DBA5CD85FADBB78EB08750F200091EA04B7290D6716E51DB94
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00A3E1FD
                            • MessageBoxW.USER32(?,?,?,?), ref: 00A3E230
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A3E246
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A3E24D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                            • String ID:
                            • API String ID: 2880819207-0
                            • Opcode ID: 137a49846e2fdc9a69da150f71a548b736371267a3a362025ea8496933d580a3
                            • Instruction ID: 86733291641c13381ba754778044c1002821fac90bfb8ac3971513500046345d
                            • Opcode Fuzzy Hash: 137a49846e2fdc9a69da150f71a548b736371267a3a362025ea8496933d580a3
                            • Instruction Fuzzy Hash: D1110472904259BBCB01DFE8AC09AEF7FBCAB46320F004215F924E72D0D3B1990187B0
                            APIs
                            • CreateThread.KERNEL32(00000000,?,009FCFF9,00000000,00000004,00000000), ref: 009FD218
                            • GetLastError.KERNEL32 ref: 009FD224
                            • __dosmaperr.LIBCMT ref: 009FD22B
                            • ResumeThread.KERNEL32(00000000), ref: 009FD249
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                            • String ID:
                            • API String ID: 173952441-0
                            • Opcode ID: 035afab76809675c1fb2075128d36415cef4cf515baeb8ead928683d483e941c
                            • Instruction ID: eb11e9f5a7337de8a80b36d65f623ff2107f744096c27a42b3f3a17dc9a5eb69
                            • Opcode Fuzzy Hash: 035afab76809675c1fb2075128d36415cef4cf515baeb8ead928683d483e941c
                            • Instruction Fuzzy Hash: D001807690620CBBDB116BA5DC09BFA7A6EDF82731F204219FA35961D0DBB18901C7A0
                            APIs
                              • Part of subcall function 009E9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009E9BB2
                            • GetClientRect.USER32(?,?), ref: 00A69F31
                            • GetCursorPos.USER32(?), ref: 00A69F3B
                            • ScreenToClient.USER32(?,?), ref: 00A69F46
                            • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00A69F7A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Client$CursorLongProcRectScreenWindow
                            • String ID:
                            • API String ID: 4127811313-0
                            • Opcode ID: 1bc2e0171b8034479a03ffcfa6b6101ba42ac4ebd3a0782af9e65466ebb0d75a
                            • Instruction ID: db542b5aa6ff69060be63a0c53910c04ea4a40dbabaf3ceb8501c72a76b48512
                            • Opcode Fuzzy Hash: 1bc2e0171b8034479a03ffcfa6b6101ba42ac4ebd3a0782af9e65466ebb0d75a
                            • Instruction Fuzzy Hash: BD11453690011AABDB00DFA8C9899FF77BCFB45321F014455F912E3140D770BA82CBA1
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009D604C
                            • GetStockObject.GDI32(00000011), ref: 009D6060
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 009D606A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CreateMessageObjectSendStockWindow
                            • String ID:
                            • API String ID: 3970641297-0
                            • Opcode ID: 63e480c1cbe82bf163747f205680c34e107f3cdeb0c4d7b165f3cfe32c6b08ca
                            • Instruction ID: a6b867e7b8a1043960ca5d53db551db8452b1a87c2366ac39728654bb755a2bb
                            • Opcode Fuzzy Hash: 63e480c1cbe82bf163747f205680c34e107f3cdeb0c4d7b165f3cfe32c6b08ca
                            • Instruction Fuzzy Hash: 9011AD72101509BFEF129FA5CC44EEABB7DEF093A4F004202FA1452210D776DC60DBA0
                            APIs
                            • ___BuildCatchObject.LIBVCRUNTIME ref: 009F3B56
                              • Part of subcall function 009F3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 009F3AD2
                              • Part of subcall function 009F3AA3: ___AdjustPointer.LIBCMT ref: 009F3AED
                            • _UnwindNestedFrames.LIBCMT ref: 009F3B6B
                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 009F3B7C
                            • CallCatchBlock.LIBVCRUNTIME ref: 009F3BA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                            • String ID:
                            • API String ID: 737400349-0
                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                            • Instruction ID: a2b2e03f685ca497a8dafdf34a58cd3ded066ecdea28631886ca59a948d91095
                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                            • Instruction Fuzzy Hash: BD01D73210014DBBDF125E95CC46EFB7B6DEF98754F048015FE5866121C636E9619BA0
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,009D13C6,00000000,00000000,?,00A0301A,009D13C6,00000000,00000000,00000000,?,00A0328B,00000006,FlsSetValue), ref: 00A030A5
                            • GetLastError.KERNEL32(?,00A0301A,009D13C6,00000000,00000000,00000000,?,00A0328B,00000006,FlsSetValue,00A72290,FlsSetValue,00000000,00000364,?,00A02E46), ref: 00A030B1
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00A0301A,009D13C6,00000000,00000000,00000000,?,00A0328B,00000006,FlsSetValue,00A72290,FlsSetValue,00000000), ref: 00A030BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID:
                            • API String ID: 3177248105-0
                            • Opcode ID: 9fb0def5753d044684b173dfbc220d149790ffcb988fa2e1ad6fb5fc1a9621d4
                            • Instruction ID: 4a17a0fd395e22688519b55dc445ac872dcfeeabea69530f4d3174c09946f2da
                            • Opcode Fuzzy Hash: 9fb0def5753d044684b173dfbc220d149790ffcb988fa2e1ad6fb5fc1a9621d4
                            • Instruction Fuzzy Hash: FB01843371222AABCF218FB9BC549677BACAF45B71B114621F946E71C0D721D902C6E0
                            APIs
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00A3747F
                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00A37497
                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00A374AC
                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00A374CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Type$Register$FileLoadModuleNameUser
                            • String ID:
                            • API String ID: 1352324309-0
                            • Opcode ID: 34cd750b2c1b3e8b658bfebf8cdd50c2d009159931f366f61000d0e5cfa417c3
                            • Instruction ID: a38f8a6bf61bf3acfa3d979f73626593478ebd28afba1d5d57b5e9e4b80d7892
                            • Opcode Fuzzy Hash: 34cd750b2c1b3e8b658bfebf8cdd50c2d009159931f366f61000d0e5cfa417c3
                            • Instruction Fuzzy Hash: 39113CB52053159BE730CF54EC09BA67BF8EB00B14F10856AB656D6551D7B0F904DB50
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A3ACD3,?,00008000), ref: 00A3B0C4
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A3ACD3,?,00008000), ref: 00A3B0E9
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A3ACD3,?,00008000), ref: 00A3B0F3
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A3ACD3,?,00008000), ref: 00A3B126
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuerySleep
                            • String ID:
                            • API String ID: 2875609808-0
                            • Opcode ID: 139e591431c21bb67de5aeaea938706fd3747bd1e2bddb3e18dd6ec6e17735eb
                            • Instruction ID: c03d74216cb271abe253a71008f602c89084622db72d9636d767a099fb6127df
                            • Opcode Fuzzy Hash: 139e591431c21bb67de5aeaea938706fd3747bd1e2bddb3e18dd6ec6e17735eb
                            • Instruction Fuzzy Hash: FA11AD30C1062CE7CF04EFE4E9586FEBB78FF0A320F104286EA81B6185CB7086518B61
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00A67E33
                            • ScreenToClient.USER32(?,?), ref: 00A67E4B
                            • ScreenToClient.USER32(?,?), ref: 00A67E6F
                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A67E8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClientRectScreen$InvalidateWindow
                            • String ID:
                            • API String ID: 357397906-0
                            • Opcode ID: 112114044498d560fbdeb7bce57b0722a65d011cbbfab514e7f3cb97a0a08530
                            • Instruction ID: 7b1efcf77c42d618771cf24cdb807bf01da4108927ca37551745942bcf112ba7
                            • Opcode Fuzzy Hash: 112114044498d560fbdeb7bce57b0722a65d011cbbfab514e7f3cb97a0a08530
                            • Instruction Fuzzy Hash: A81153B9D0024AAFDB41CF98C884AEEBBF9FF08310F509066E955E3210D775AA55CF90
                            APIs
                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A32DC5
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A32DD6
                            • GetCurrentThreadId.KERNEL32 ref: 00A32DDD
                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A32DE4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                            • String ID:
                            • API String ID: 2710830443-0
                            • Opcode ID: d788d738c27019db6276807e7625f6614360103cf04851593b5ac28d1b3ca422
                            • Instruction ID: 0559fc94082277a2c8550b8715e60d35208c5880a535c3c41adcfe68a786809c
                            • Opcode Fuzzy Hash: d788d738c27019db6276807e7625f6614360103cf04851593b5ac28d1b3ca422
                            • Instruction Fuzzy Hash: 0EE0ED755012247ADB206BA2DC0DFFB7E7DEF56BB1F401115F506D10909AE58942C6B1
                            APIs
                              • Part of subcall function 009E9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009E9693
                              • Part of subcall function 009E9639: SelectObject.GDI32(?,00000000), ref: 009E96A2
                              • Part of subcall function 009E9639: BeginPath.GDI32(?), ref: 009E96B9
                              • Part of subcall function 009E9639: SelectObject.GDI32(?,00000000), ref: 009E96E2
                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00A68887
                            • LineTo.GDI32(?,?,?), ref: 00A68894
                            • EndPath.GDI32(?), ref: 00A688A4
                            • StrokePath.GDI32(?), ref: 00A688B2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                            • String ID:
                            • API String ID: 1539411459-0
                            • Opcode ID: ff3156d397d52ba028d02a17f23d22e6f539603d77dfd4adedbc827e903b5ad2
                            • Instruction ID: 9019737479aea4726edd8a8f3d0357aa2c0590c9127dea13c0ff6959b61854cb
                            • Opcode Fuzzy Hash: ff3156d397d52ba028d02a17f23d22e6f539603d77dfd4adedbc827e903b5ad2
                            • Instruction Fuzzy Hash: 7AF05E36041259FADB12AFD4AC09FDE3F69AF0A360F448100FA61650E2C7B95512CFE5
                            APIs
                            • GetSysColor.USER32(00000008), ref: 009E98CC
                            • SetTextColor.GDI32(?,?), ref: 009E98D6
                            • SetBkMode.GDI32(?,00000001), ref: 009E98E9
                            • GetStockObject.GDI32(00000005), ref: 009E98F1
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Color$ModeObjectStockText
                            • String ID:
                            • API String ID: 4037423528-0
                            • Opcode ID: d6c2bc03668eabe98f4b75b4f48ddc44e4886559cffaf7441b6b25618585860e
                            • Instruction ID: f298daf711e6f86ca52a8ce81d3d0536745254424416d4940e5ebdc3e0dae734
                            • Opcode Fuzzy Hash: d6c2bc03668eabe98f4b75b4f48ddc44e4886559cffaf7441b6b25618585860e
                            • Instruction Fuzzy Hash: 24E06531244280AADB219BB8BC09BED3F21AB12335F048329F6FA540E1C3B146519B11
                            APIs
                            • GetCurrentThread.KERNEL32 ref: 00A31634
                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A311D9), ref: 00A3163B
                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A311D9), ref: 00A31648
                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A311D9), ref: 00A3164F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CurrentOpenProcessThreadToken
                            • String ID:
                            • API String ID: 3974789173-0
                            • Opcode ID: 40e6bfc75fa1b88998a11f533698d46c27fd16cb5d915da82174e7507159bfbe
                            • Instruction ID: 871e434c7c952b6fe5c906c27333acee20f7dd9e9db7bb520125a5674d9a356f
                            • Opcode Fuzzy Hash: 40e6bfc75fa1b88998a11f533698d46c27fd16cb5d915da82174e7507159bfbe
                            • Instruction Fuzzy Hash: 38E08631601211EBD7206FF19D0DBA63B7CAF447A5F154808F685C9080D7B44542C750
                            APIs
                            • GetDesktopWindow.USER32 ref: 00A2D858
                            • GetDC.USER32(00000000), ref: 00A2D862
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A2D882
                            • ReleaseDC.USER32(?), ref: 00A2D8A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: 02c278a0818b1de75d2e6eb10f236c2810aa57a1b5e3fb1ded88082c6ba41e2f
                            • Instruction ID: dea3778b49779028b767ea5de8c3955c0d63ff36f80e8ceaff6bf9b4048607e3
                            • Opcode Fuzzy Hash: 02c278a0818b1de75d2e6eb10f236c2810aa57a1b5e3fb1ded88082c6ba41e2f
                            • Instruction Fuzzy Hash: D2E01AB9800245DFCB41DFE4D80867DBBB1FB08321F14A419E88AE7250C7B85902AF44
                            APIs
                            • GetDesktopWindow.USER32 ref: 00A2D86C
                            • GetDC.USER32(00000000), ref: 00A2D876
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A2D882
                            • ReleaseDC.USER32(?), ref: 00A2D8A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: af5e0dc5aaab9e4e19bdf87f47336924775ee502322ee7d2df723182f9dbacbd
                            • Instruction ID: a052c6f3512ae1e5140a606745be6f4011502c69d6a5f4a5ab09236c95b3a48e
                            • Opcode Fuzzy Hash: af5e0dc5aaab9e4e19bdf87f47336924775ee502322ee7d2df723182f9dbacbd
                            • Instruction Fuzzy Hash: 17E012B8800240EFCB41EFE0D80866DBBB1FB08321B14A409E98AE7250CBB85902AF44
                            APIs
                              • Part of subcall function 009D7620: _wcslen.LIBCMT ref: 009D7625
                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00A44ED4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Connection_wcslen
                            • String ID: *$LPT
                            • API String ID: 1725874428-3443410124
                            • Opcode ID: 872daad62c35ec227add00e8efae32ce8196cb070162ce20c091da95648be4e0
                            • Instruction ID: cd698dfb285d0b84575660ea7a53f89efffe168696b1cd0c80a3850528e6bf29
                            • Opcode Fuzzy Hash: 872daad62c35ec227add00e8efae32ce8196cb070162ce20c091da95648be4e0
                            • Instruction Fuzzy Hash: 37916079A002049FDB14DF58C485FAABBF1BF88704F198099E80A9F362D771ED85CB91
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 009FE30D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: 4f3205065c7c555d96837ef2fe6f387aa032d1c97043aaea1abbff4a0940b6a6
                            • Instruction ID: 26f0d456032491e3bfe42d39eba8c45e5790fae8b489e302ee97774222a2052c
                            • Opcode Fuzzy Hash: 4f3205065c7c555d96837ef2fe6f387aa032d1c97043aaea1abbff4a0940b6a6
                            • Instruction Fuzzy Hash: 37517D71E0D20E96CB15BB14ED453BD3BA8EB40740F308DA8E1D5822F9EB349CD29B46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID: #
                            • API String ID: 0-1885708031
                            • Opcode ID: 9aae62413e0e90db5d081636eb8b323392981648936d2c313b49b2c4bf669ba2
                            • Instruction ID: b93825f2f733911597a367495a0f6dd5b77f42cc587cc0f0ae85868780c94143
                            • Opcode Fuzzy Hash: 9aae62413e0e90db5d081636eb8b323392981648936d2c313b49b2c4bf669ba2
                            • Instruction Fuzzy Hash: 5B514535600296DFDF16DF68D0816FA7BA8EF55310F248069EDA19B3C0D7349D82CBA0
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 009EF2A2
                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 009EF2BB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: GlobalMemorySleepStatus
                            • String ID: @
                            • API String ID: 2783356886-2766056989
                            • Opcode ID: 7d4bba96a19dbc8e706bc75084cb0a6ddf8ca952af277435c5dea5a567b841f7
                            • Instruction ID: afe3e17b399ee72356278b4c25dbb5214741f3df90aee920c51f242fae98e609
                            • Opcode Fuzzy Hash: 7d4bba96a19dbc8e706bc75084cb0a6ddf8ca952af277435c5dea5a567b841f7
                            • Instruction Fuzzy Hash: 1A5138714087459BD320EF54DC86BABBBF8FBC4300F81885EF1D991295EB708529CB66
                            APIs
                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00A557E0
                            • _wcslen.LIBCMT ref: 00A557EC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: BuffCharUpper_wcslen
                            • String ID: CALLARGARRAY
                            • API String ID: 157775604-1150593374
                            • Opcode ID: fc0ae4222d8156228fe83afa2c6fb017d1013454a013d2694613b4be2a21e8a0
                            • Instruction ID: 760f6769cb3c5989ccac0247ef85dfd7f02d1d4c243ce9840cac43688cd6cd8f
                            • Opcode Fuzzy Hash: fc0ae4222d8156228fe83afa2c6fb017d1013454a013d2694613b4be2a21e8a0
                            • Instruction Fuzzy Hash: 4241B031E002099FCB04DFB9C8919BEBBB5FF99321F10802AF805A7251E7719D85DBA0
                            APIs
                            • _wcslen.LIBCMT ref: 00A4D130
                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A4D13A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CrackInternet_wcslen
                            • String ID: |
                            • API String ID: 596671847-2343686810
                            • Opcode ID: c0072d59fc88e555842e1bd08651e44a66a3e0f50535a908a840c5367445d83a
                            • Instruction ID: 90fef041bb290195c17b03d923e4fd676e6bdeafa50f62654649712efe3d44f9
                            • Opcode Fuzzy Hash: c0072d59fc88e555842e1bd08651e44a66a3e0f50535a908a840c5367445d83a
                            • Instruction Fuzzy Hash: 05313B75D00209ABCF15EFA4CC85AEEBFB9FF45300F10411AF915A6262E731AA56DB60
                            APIs
                            • DestroyWindow.USER32(?,?,?,?), ref: 00A63621
                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A6365C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$DestroyMove
                            • String ID: static
                            • API String ID: 2139405536-2160076837
                            • Opcode ID: 64b3f02ede5d6d942f8ef69d615f877bd8e0c303e765f5250ee85a484f2b395e
                            • Instruction ID: 894ea225420530ebe772d4aa59d1df3df5a11734a855c873f589b750f5b11cd4
                            • Opcode Fuzzy Hash: 64b3f02ede5d6d942f8ef69d615f877bd8e0c303e765f5250ee85a484f2b395e
                            • Instruction Fuzzy Hash: AC318B72100204AEDB10DF68DC80FFB73B9FF88724F00961AF9A597290DA74AD82C760
                            APIs
                            • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00A6461F
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A64634
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: '
                            • API String ID: 3850602802-1997036262
                            • Opcode ID: c9a6cc997440fa78f54733112199cc7618ff7dabbd4e20694fe3075c319e843e
                            • Instruction ID: 79e57d0cc9ff0029e0b4c876909d8edf7d20f39a79dd6f88e9ff887a35aa8ced
                            • Opcode Fuzzy Hash: c9a6cc997440fa78f54733112199cc7618ff7dabbd4e20694fe3075c319e843e
                            • Instruction Fuzzy Hash: 86310A74A0131AAFDF14CFA9C991BDA7BB5FF49700F14406AE905AB391E770A941CF90
                            APIs
                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A6327C
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A63287
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Combobox
                            • API String ID: 3850602802-2096851135
                            • Opcode ID: 8bdf0c2db14f2f3b45270060c84ea40c356bf7e390a9aa0642b290cf27aa5fe9
                            • Instruction ID: 2265c70cbf5f9d472f6fee68ef8ecdccb15407713013dc7ae9cb82bbead6126e
                            • Opcode Fuzzy Hash: 8bdf0c2db14f2f3b45270060c84ea40c356bf7e390a9aa0642b290cf27aa5fe9
                            • Instruction Fuzzy Hash: B71193723001097FEF119FA4DC90EFB37BAEBA5364F104125F51497290D6759D528760
                            APIs
                              • Part of subcall function 009D600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009D604C
                              • Part of subcall function 009D600E: GetStockObject.GDI32(00000011), ref: 009D6060
                              • Part of subcall function 009D600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D606A
                            • GetWindowRect.USER32(00000000,?), ref: 00A6377A
                            • GetSysColor.USER32(00000012), ref: 00A63794
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                            • String ID: static
                            • API String ID: 1983116058-2160076837
                            • Opcode ID: f0e13ee58f2a957a911750c284dd38c43e21c158528fcda0ff69d0e36bb8946d
                            • Instruction ID: db9ffebd298eb9a5521a4e54d4013df99aca2c49bd7cfa2b8b1ba5e6fc52d1b9
                            • Opcode Fuzzy Hash: f0e13ee58f2a957a911750c284dd38c43e21c158528fcda0ff69d0e36bb8946d
                            • Instruction Fuzzy Hash: 39113AB2610209AFDF01DFA8CD45EFA7BB8FB09354F004915F956E3250D775E8519B50
                            APIs
                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A4CD7D
                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A4CDA6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Internet$OpenOption
                            • String ID: <local>
                            • API String ID: 942729171-4266983199
                            • Opcode ID: d4c40c869d5463075ed7d3cd5c821d94bad86395ae5865e9b875bf350b331686
                            • Instruction ID: 953e5249aa0c7f9df78d0b50bbfe9c2a04fa3e06c63b0cbbc80c83f8b1c9b8f8
                            • Opcode Fuzzy Hash: d4c40c869d5463075ed7d3cd5c821d94bad86395ae5865e9b875bf350b331686
                            • Instruction Fuzzy Hash: D1110679A026317AD7784B668C44EF3BEACEF927B4F004226B10D83080D3749841D6F0
                            APIs
                            • GetWindowTextLengthW.USER32(00000000), ref: 00A634AB
                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A634BA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LengthMessageSendTextWindow
                            • String ID: edit
                            • API String ID: 2978978980-2167791130
                            • Opcode ID: f20c013490525c078fe994a8c33d500812b9b08f90a90c923f204f1246840723
                            • Instruction ID: 63d75fe100164bda6b41ef29659841917c80584ef1593fce6cc538c761bff5e0
                            • Opcode Fuzzy Hash: f20c013490525c078fe994a8c33d500812b9b08f90a90c923f204f1246840723
                            • Instruction Fuzzy Hash: 71118C72100208ABEF128FA5DC88ABB777AEF05775F504724FA61931E0CB75DC929B60
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                            • CharUpperBuffW.USER32(?,?,?), ref: 00A36CB6
                            • _wcslen.LIBCMT ref: 00A36CC2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen$BuffCharUpper
                            • String ID: STOP
                            • API String ID: 1256254125-2411985666
                            • Opcode ID: 84a9eed8bbeb29593f8e5a34aa9e908ef5947bd92c2ca6cd56fe66cafcc91753
                            • Instruction ID: 675f90ab269a3aba531855c184663695bd19f3aa46173e90925deb922060f342
                            • Opcode Fuzzy Hash: 84a9eed8bbeb29593f8e5a34aa9e908ef5947bd92c2ca6cd56fe66cafcc91753
                            • Instruction Fuzzy Hash: 87012632A00926ABCB20AFFDDC809BF73B4FBA0754F008529F85297291EB31D900C750
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A31D4C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: 6cd5ad6c97d16f2d4b6adfa4241bf47b1854cc4df58bc2f37e4d467f8a406e6b
                            • Instruction ID: aed319f125d9c18f43a1e59b71afb1c9b5517bf4bb46681264f4e57f490f4a73
                            • Opcode Fuzzy Hash: 6cd5ad6c97d16f2d4b6adfa4241bf47b1854cc4df58bc2f37e4d467f8a406e6b
                            • Instruction Fuzzy Hash: 3301B175B41218AB8F08FBB4DD529FE73A8FB57390F444A1AF862673C1EA3459088760
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A31C46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: ca94a855d9ebb61345561cbe3ae9e3c1b3cfd056fb494f623d5a1a3271eb0b52
                            • Instruction ID: 9f65c5b51dccb1e3e0cb60d9689e2af61ac1fbfb9b2618c654d45a058ad839de
                            • Opcode Fuzzy Hash: ca94a855d9ebb61345561cbe3ae9e3c1b3cfd056fb494f623d5a1a3271eb0b52
                            • Instruction Fuzzy Hash: FB01A275B811086ACF04FBA1CA52AFF77E89B51340F14541AF85667281EA649E0C97B1
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A31CC8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: 66f35f08fd27b52b51fe3fb1a4dd48cee71a5659a0878dfe2743c6bb97a819a7
                            • Instruction ID: b442ec5f9d5d7fe6dd8c28a7cb3eb194565dd703b373dd1cc88a13ddd12745ff
                            • Opcode Fuzzy Hash: 66f35f08fd27b52b51fe3fb1a4dd48cee71a5659a0878dfe2743c6bb97a819a7
                            • Instruction Fuzzy Hash: CA01D1B6B8021867CF04FBA0CB02AFE73E8AB11340F145416B84673281EA609F19D671
                            APIs
                              • Part of subcall function 009D9CB3: _wcslen.LIBCMT ref: 009D9CBD
                              • Part of subcall function 00A33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A33CCA
                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00A31DD3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 624084870-1403004172
                            • Opcode ID: f951b2c6b208f5d2d2510492fa564bbabbcedbbb42bcdbcbd72268b961d98b3e
                            • Instruction ID: 7fa2a43cb09275b1490aa6f7e2c3257223d9e88e8a343c04ecae2d8d2791e474
                            • Opcode Fuzzy Hash: f951b2c6b208f5d2d2510492fa564bbabbcedbbb42bcdbcbd72268b961d98b3e
                            • Instruction Fuzzy Hash: 44F0C271B9121866DB04F7B4DD52FFF77B8AF42790F040D1AF862633C1EA605A0C8260
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: _wcslen
                            • String ID: 3, 3, 16, 1
                            • API String ID: 176396367-3042988571
                            • Opcode ID: 694164169722d7793c9d8a560b83e236dedc24035ca94ed6497195fb9b87eac3
                            • Instruction ID: 5ab9503c7e75bf8ca9e7fa7e396456af9e77781ea18814bf8490bf396573a58b
                            • Opcode Fuzzy Hash: 694164169722d7793c9d8a560b83e236dedc24035ca94ed6497195fb9b87eac3
                            • Instruction Fuzzy Hash: 3CE02B423142202092311379BCC1A7F5699EFC5B91714182FFE85D6266EAE48DD193A1
                            APIs
                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A30B23
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Message
                            • String ID: AutoIt$Error allocating memory.
                            • API String ID: 2030045667-4017498283
                            • Opcode ID: f1868ff10dd9e6efcfc1073a9421cb24f44cfca89460d4f416a0cb71d050e2d9
                            • Instruction ID: 6ce7a2ac72894dbfd4f18ff891f99c03cda77eabce33bdf08183ad817985da9b
                            • Opcode Fuzzy Hash: f1868ff10dd9e6efcfc1073a9421cb24f44cfca89460d4f416a0cb71d050e2d9
                            • Instruction Fuzzy Hash: 8AE0DF323843483AD3113B957C03F9A7AD49F05B20F10482BFBD8A55C38AE2289007A9
                            APIs
                              • Part of subcall function 009EF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,009F0D71,?,?,?,009D100A), ref: 009EF7CE
                            • IsDebuggerPresent.KERNEL32(?,?,?,009D100A), ref: 009F0D75
                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009D100A), ref: 009F0D84
                            Strings
                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 009F0D7F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                            • API String ID: 55579361-631824599
                            • Opcode ID: 13173e069c03ee28ab391bf8484696f493c350e3f27c91afaafc46d7862a659b
                            • Instruction ID: 0fc8292abaa7238e362bc357f3730c7afa9af09a25f18e2bca2ae4640c9355f0
                            • Opcode Fuzzy Hash: 13173e069c03ee28ab391bf8484696f493c350e3f27c91afaafc46d7862a659b
                            • Instruction Fuzzy Hash: F9E06D742003518FD770EFB8E4043667BF8AB44744F00892EE982C6692DBB2E4458BA1
                            APIs
                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00A4302F
                            • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00A43044
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: Temp$FileNamePath
                            • String ID: aut
                            • API String ID: 3285503233-3010740371
                            • Opcode ID: ca307f06b722ef9c04b2b98aef6686c5801c0f948ec100722c2fcd86c5fc2ae6
                            • Instruction ID: 94e1ccb860e37ade3439b017e450de1028661d140fd4575a8fa800d288951caa
                            • Opcode Fuzzy Hash: ca307f06b722ef9c04b2b98aef6686c5801c0f948ec100722c2fcd86c5fc2ae6
                            • Instruction Fuzzy Hash: 05D05E7250032877DA20E7E4EC0EFDB3A7CDB04760F0006A2BA95E60D1DAF49985CAD0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: LocalTime
                            • String ID: %.3d$X64
                            • API String ID: 481472006-1077770165
                            • Opcode ID: 54fc40396eb37a0fb0161cc248b906f66b11c28bc3c26c5cbd532b7f81634602
                            • Instruction ID: 4106a6c9f8ca889dcde1cab68173f503eaab17caa9c4d0444ae1d2473c20e72a
                            • Opcode Fuzzy Hash: 54fc40396eb37a0fb0161cc248b906f66b11c28bc3c26c5cbd532b7f81634602
                            • Instruction Fuzzy Hash: 9BD012B1809128E9CF5097E4EC459FAB3BCBB08301F648472FD06A1042D624C908A761
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A6232C
                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00A6233F
                              • Part of subcall function 00A3E97B: Sleep.KERNEL32 ref: 00A3E9F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: d82f97bc55ef9bf692ce242442572f85140b11e7594373943ada860a0414c41c
                            • Instruction ID: bf9ed561b8fb864f0b878bfbdaa5a4c9ed23c62cd5b5ba83baa05ed48d40b0cc
                            • Opcode Fuzzy Hash: d82f97bc55ef9bf692ce242442572f85140b11e7594373943ada860a0414c41c
                            • Instruction Fuzzy Hash: 4FD012363D4310B7EA64F7B0EC0FFD6BA64AF04B20F004916B786AA1D0C9F4A802CB54
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A6236C
                            • PostMessageW.USER32(00000000), ref: 00A62373
                              • Part of subcall function 00A3E97B: Sleep.KERNEL32 ref: 00A3E9F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: ecfc228618b512633dcd8a44c84edac31f78a5df0773a8f5b175610179bbc1fc
                            • Instruction ID: d750a6b087d7edcce7f7913703f3b98e40e7db967b65b6637052ca29a6ff35a9
                            • Opcode Fuzzy Hash: ecfc228618b512633dcd8a44c84edac31f78a5df0773a8f5b175610179bbc1fc
                            • Instruction Fuzzy Hash: 1BD0C7353C131076E564F7B0DC0FFD665545B04710F004915B646A51D0C9E464018654
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00A0BE93
                            • GetLastError.KERNEL32 ref: 00A0BEA1
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A0BEFC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2935031352.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                            • Associated: 00000000.00000002.2935005283.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935105984.0000000000A92000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935162251.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2935197451.0000000000AA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_9d0000_file.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast
                            • String ID:
                            • API String ID: 1717984340-0
                            • Opcode ID: d98643705036ed6910f5bceb8b49b64d7750b22cbf1b9681492cca24912c9b66
                            • Instruction ID: e2dd0f448ccacc78048b99dbb202c8db4e80d186aeb695a7018461aee761d20e
                            • Opcode Fuzzy Hash: d98643705036ed6910f5bceb8b49b64d7750b22cbf1b9681492cca24912c9b66
                            • Instruction Fuzzy Hash: 9041C63461020AAFCF21CFA4EE54ABABBB5AF41720F144169FA59971E1DB30CD01CB70