Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QuickTextPaste (2).exe

Overview

General Information

Sample name:QuickTextPaste (2).exe
Analysis ID:1562565
MD5:4bc6dc45d87f46354cf96b0d60d849e5
SHA1:2af2591cf4fa6a2625f99012c24377378143010d
SHA256:e58e9f7cce5acebd12f2fbe7a8f4da092982291f0cf553066e515359ec71af81
Tags:Compilazioneprotetticopyrightexeuser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to register a low level keyboard hook
Drops large PE files
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Stores large binary data to the registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • QuickTextPaste (2).exe (PID: 7112 cmdline: "C:\Users\user\Desktop\QuickTextPaste (2).exe" MD5: 4BC6DC45D87F46354CF96B0D60D849E5)
    • csc.exe (PID: 6812 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\QuickTextPaste (2).exe, ProcessId: 7112, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopInfo
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-25T18:03:34.268004+010020355951Domain Observed Used for C2 Detected64.95.10.1956001192.168.2.1249719TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: QuickTextPaste (2).exeAvira: detected
Source: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen2
Source: QuickTextPaste (2).exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: QuickTextPaste (2).exeJoe Sandbox ML: detected

Compliance

barindex
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeUnpacked PE file: 0.2.QuickTextPaste (2).exe.730000.2.unpack
Source: QuickTextPaste (2).exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

Networking

barindex
Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 64.95.10.19:56001 -> 192.168.2.12:49719
Source: global trafficTCP traffic: 192.168.2.12:49719 -> 64.95.10.19:56001
Source: Joe Sandbox ViewASN Name: BRAHMAN-NYUS BRAHMAN-NYUS
Source: csc.exe, 00000004.00000003.2796297037.0000000004B70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: csc.exe, 00000004.00000003.2796297037.0000000004B70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00426601 SetWindowsHookExW 0000000D,0041ED8B,00000000,000000000_2_00426601
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00433F0D OpenClipboard,RegisterClipboardFormatW,GetClipboardData,GlobalLock,CloseClipboard,0_2_00433F0D
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00433F0D OpenClipboard,RegisterClipboardFormatW,GetClipboardData,GlobalLock,CloseClipboard,0_2_00433F0D
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004324DC IsWindow,GetKeyboardState,GetKeyboardState,keybd_event,keybd_event,SetForegroundWindow,GetKeyboardState,keybd_event,0_2_004324DC

System Summary

barindex
Source: 0.2.QuickTextPaste (2).exe.49eb26.1.raw.unpack, RegistryRefExpression.csLarge array initialization: ManageRule: array initializer size 298256
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeFile dump: DesktopInfo.exe.0.dr 979567349Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00416231 NtQueryDefaultLocale,lstrlenW,GetDlgItem,0_2_00416231
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00416F82 NtQueryDefaultLocale,0_2_00416F82
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00416087 NtQueryDefaultLocale,0_2_00416087
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0041616C NtQueryDefaultLocale,0_2_0041616C
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00416473 NtQueryDefaultLocale,0_2_00416473
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004157C3 NtQueryDefaultLocale,0_2_004157C3
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004162310_2_00416231
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00416F820_2_00416F82
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0040287C0_2_0040287C
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004078010_2_00407801
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004028C20_2_004028C2
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004020C40_2_004020C4
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004028CD0_2_004028CD
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004020D30_2_004020D3
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004020F90_2_004020F9
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0040288F0_2_0040288F
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0041E95A0_2_0041E95A
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0040F1650_2_0040F165
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0040497C0_2_0040497C
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0051D18E0_2_0051D18E
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00404A720_2_00404A72
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004072C90_2_004072C9
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0051DB4C0_2_0051DB4C
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0040EBC70_2_0040EBC7
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0041E3970_2_0041E397
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0040745E0_2_0040745E
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004074DD0_2_004074DD
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00402DAB0_2_00402DAB
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0041EE590_2_0041EE59
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004076390_2_00407639
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004026E30_2_004026E3
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_0041E6EC0_2_0041E6EC
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004046F00_2_004046F0
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004026F50_2_004026F5
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004026820_2_00402682
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004046B00_2_004046B0
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00406EBE0_2_00406EBE
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00401F520_2_00401F52
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004157C30_2_004157C3
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004027A70_2_004027A7
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004027B20_2_004027B2
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: String function: 00437C80 appears 39 times
Source: QuickTextPaste (2).exeBinary or memory string: OriginalFilename vs QuickTextPaste (2).exe
Source: QuickTextPaste (2).exe, 00000000.00000002.2541169472.000000000078A000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCjmjchusqsd.exe" vs QuickTextPaste (2).exe
Source: QuickTextPaste (2).exeBinary or memory string: OriginalFilenameQuickTextPaste.exe( vs QuickTextPaste (2).exe
Source: QuickTextPaste (2).exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 0.2.QuickTextPaste (2).exe.49eb26.1.raw.unpack, RegistryRefExpression.csCryptographic APIs: 'CreateDecryptor'
Source: 0.2.QuickTextPaste (2).exe.49eb26.1.raw.unpack, ConnectionSerializerModel.csCryptographic APIs: 'CreateDecryptor'
Source: 0.2.QuickTextPaste (2).exe.49eb26.1.raw.unpack, ConnectionSerializerModel.csCryptographic APIs: 'CreateDecryptor'
Source: 0.2.QuickTextPaste (2).exe.49eb26.1.raw.unpack, ConnectionSerializerModel.csTask registration methods: 'RegisterRule'
Source: classification engineClassification label: mal100.spyw.evad.winEXE@3/1@0/1
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00426601 GetModuleHandleW,SetWindowsHookExW,GetLastError,FormatMessageW,MessageBoxW,LocalFree,0_2_00426601
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeFile created: C:\Users\user\Pictures\DesktopInfoJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\86e9217bf3f8
Source: QuickTextPaste (2).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: QuickTextPaste (2).exeReversingLabs: Detection: 68%
Source: QuickTextPaste (2).exeString found in binary or memory: <!--StartFrag
Source: QuickTextPaste (2).exeString found in binary or memory: <!--StartFragment-->
Source: QuickTextPaste (2).exeString found in binary or memory: EndSelectionStartSelection<!--EndFragEndFragment<!--StartFragStartFragmentEndHTML%08u<html>StartHTML<!--EndFragment--></body>
Source: QuickTextPaste (2).exeString found in binary or memory: <!--StartFragment-->HTML Format
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeFile read: C:\Users\user\Desktop\QuickTextPaste (2).exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\QuickTextPaste (2).exe "C:\Users\user\Desktop\QuickTextPaste (2).exe"
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeSection loaded: k7rn7l32.dllJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeSection loaded: ntd3ll.dllJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: QuickTextPaste (2).exeStatic file information: File size 1363968 > 1048576

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeUnpacked PE file: 0.2.QuickTextPaste (2).exe.730000.2.unpack
Source: 0.2.QuickTextPaste (2).exe.49eb26.1.raw.unpack, ConnectionSerializerModel.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00434350 LoadLibraryW,GetProcAddress,0_2_00434350
Source: QuickTextPaste (2).exeStatic PE information: real checksum: 0x844df should be: 0x1515bf
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00437C80 push eax; ret 0_2_00437C9E
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00437CA0 push eax; ret 0_2_00437CCE
Source: QuickTextPaste (2).exeStatic PE information: section name: .text entropy: 6.867077590981686
Source: DesktopInfo.exe.0.drStatic PE information: section name: .text entropy: 6.867077590981686
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeFile created: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exeJump to dropped file
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DesktopInfoJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DesktopInfoJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\15036547B1E75A4B687ED1F301A71B42 4555936c9bfd67fc4c92d88fec2bb6b0Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 67C0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6AB0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 8AB0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 3243Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 6548Jump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeDropped PE file which has not been started: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exeJump to dropped file
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-11557
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeAPI coverage: 0.6 %
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 5248Thread sleep time: -31359464925306218s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: csc.exe, 00000004.00000003.2796297037.0000000004B70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeAPI call chain: ExitProcess graph end nodegraph_0-11535
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00434350 LoadLibraryW,GetProcAddress,0_2_00434350
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4A40000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4A40000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4A40000Jump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 476E008Jump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_004324DC IsWindow,GetKeyboardState,GetKeyboardState,keybd_event,keybd_event,SetForegroundWindow,GetKeyboardState,keybd_event,0_2_004324DC
Source: QuickTextPaste (2).exeBinary or memory string: Shell_TrayWnd
Source: QuickTextPaste (2).exe, DesktopInfo.exe.0.drBinary or memory string: WidthBytes: %d bmWidth:%d bmBitsPixel:%d hb:%dNo-HBitmap<br>0};%d,UCHAR img_data[]={int ys=%d;int xs=%d;No HBITMAPShell_TrayWndTrayNotifyWndC:\shell32SetMenuInfoNULL
Source: QuickTextPaste (2).exe, DesktopInfo.exe.0.drBinary or memory string: GDtGDXGDHGDWorkerWSysListView32SHELLDLL_DefViewProgram ManagerUniformResourceLocatorToolbarWindow32SHAutoCompleteSHLWAPI.DLLBackInternet Explorer_Server
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: GetLocaleInfoW,0_2_0043271F
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: GetLocaleInfoW,0_2_004327AB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\QuickTextPaste (2).exeCode function: 0_2_00421838 __EH_prolog,GetLocalTime,0_2_00421838
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: csc.exe, 00000004.00000003.2796297037.0000000004B70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
Windows Management Instrumentation
1
Scheduled Task/Job
32
Process Injection
1
Masquerading
111
Input Capture
1
System Time Discovery
Remote Services111
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Scheduled Task/Job
1
Modify Registry
LSASS Memory431
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
11
Disable or Modify Tools
Security Account Manager1
Process Discovery
SMB/Windows Admin Shares2
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts2
Native API
Login Hook1
DLL Side-Loading
341
Virtualization/Sandbox Evasion
NTDS341
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script32
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
Deobfuscate/Decode Files or Information
Cached Domain Credentials224
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Software Packing
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
QuickTextPaste (2).exe68%ReversingLabsWin32.Trojan.Generic
QuickTextPaste (2).exe100%AviraTR/Crypt.XPACK.Gen2
QuickTextPaste (2).exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe100%AviraTR/Crypt.XPACK.Gen2
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
64.95.10.19
unknownUnited States
31982BRAHMAN-NYUStrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562565
Start date and time:2024-11-25 18:02:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 8m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:QuickTextPaste (2).exe
Detection:MAL
Classification:mal100.spyw.evad.winEXE@3/1@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size exceeded maximum capacity and may have missing network information.
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
  • VT rate limit hit for: QuickTextPaste (2).exe
TimeTypeDescription
12:03:33API Interceptor7197609x Sleep call for process: csc.exe modified
18:03:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run DesktopInfo C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe
18:03:38AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run DesktopInfo C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
BRAHMAN-NYUShttp://elizgallery.com/js.phpGet hashmaliciousUnknownBrowse
  • 64.95.11.184
https://elizgallery.com/nazvanie.jsGet hashmaliciousUnknownBrowse
  • 64.95.11.184
#U2749Factura_#U2749_#U2462#U2465#U2460#U2463#U2463#U2460#U2462#U2461.htaGet hashmaliciousUnknownBrowse
  • 64.95.10.38
#U2749Factura_#U2749_#U2466#U2461#U2466#U2462#U2467#U2465#U2465#U2465.htaGet hashmaliciousUnknownBrowse
  • 64.95.10.38
6723653391970.vbsGet hashmaliciousUnknownBrowse
  • 64.95.10.38
672365339196e.vbsGet hashmaliciousUnknownBrowse
  • 64.95.10.38
v.ps1Get hashmaliciousPureLog StealerBrowse
  • 64.95.11.29
p.exeGet hashmaliciousUnknownBrowse
  • 64.95.10.162
p.exeGet hashmaliciousUnknownBrowse
  • 64.95.10.162
file.exeGet hashmaliciousUnknownBrowse
  • 64.95.13.143
No context
No context
Process:C:\Users\user\Desktop\QuickTextPaste (2).exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):979567349
Entropy (8bit):0.023647584229054917
Encrypted:false
SSDEEP:
MD5:905B69AEE10ACEB242AD7F218E615809
SHA1:048A1862B9DB812ED8AFCB0BCDEE6735C3DEBB54
SHA-256:269CE61F65E973A36576224F6364ED7CF0286939F0FD53DCA54F18304F49FCD7
SHA-512:605942EE996518BF660332DD391E7B023EF45F584F7FDF0989AC66F0398CA30B6FFC905460A38E5D604D9B949FA042449F3B25B0EDF1FE69748575954D139ED2
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........................................................9......._.....Rich...................PE..L.....7g.....................(.......~............@..................................D..................................................h............"...)..............................................................4............................text.............................. ..`.rdata...w.......x..................@..@.data........@..."... ..............@....rsrc...h............B..............@..@................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.31815796011667
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:QuickTextPaste (2).exe
File size:1'363'968 bytes
MD5:4bc6dc45d87f46354cf96b0d60d849e5
SHA1:2af2591cf4fa6a2625f99012c24377378143010d
SHA256:e58e9f7cce5acebd12f2fbe7a8f4da092982291f0cf553066e515359ec71af81
SHA512:821e127a75609cbd83d076eaac6dd2f3c9b75378d699ab143cdc4f80f913285a6d877168ce9590149d3abd7557b7207587500b32fe65a101cf7a5e1bc9203e47
SSDEEP:24576:QsV37etHLvLRhQEjhmeHziIA01B5lfYeXEgDm1mTn:QU6tXRhmqzSw5lJE+T
TLSH:3255BE01FF47C9DED692183DAA0A6141E1859FB83817980731DF7B5F7B38AC62D19E22
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9..........._.......Rich....................PE..L.....7g...
Icon Hash:0f2fcaabb0aaf830
Entrypoint:0x437ee0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x67371DD6 [Fri Nov 15 10:09:26 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:e65d5d56989c1441945255d78668884e
Signature Valid:
Signature Issuer:
Signature Validation Error:
Error Number:
Not Before, Not After
    Subject Chain
      Version:
      Thumbprint MD5:
      Thumbprint SHA-1:
      Thumbprint SHA-256:
      Serial:
      Instruction
      push ebp
      mov ebp, esp
      push FFFFFFFFh
      push 0043D1E8h
      push 00438066h
      mov eax, dword ptr fs:[00000000h]
      push eax
      mov dword ptr fs:[00000000h], esp
      sub esp, 68h
      push ebx
      push esi
      push edi
      mov dword ptr [ebp-18h], esp
      xor ebx, ebx
      mov dword ptr [ebp-04h], ebx
      push 00000002h
      pop edi
      push edi
      call 00007F7378C62641h
      nop
      pop ecx
      or dword ptr [004808F4h], FFFFFFFFh
      or dword ptr [004808F8h], FFFFFFFFh
      call dword ptr [0043C330h]
      mov ecx, dword ptr [004808C8h]
      mov dword ptr [eax], ecx
      call dword ptr [0043C2ACh]
      mov ecx, dword ptr [004808C4h]
      mov dword ptr [eax], ecx
      mov eax, dword ptr [0043C234h]
      mov eax, dword ptr [eax]
      mov dword ptr [004808F0h], eax
      call 00007F7378C9964Dh
      cmp dword ptr [00456140h], ebx
      jne 00007F7378C9950Eh
      push 00438096h
      call dword ptr [0043C238h]
      pop ecx
      call 00007F7378C9961Fh
      push 004440ECh
      push 004440E8h
      call 00007F7378C9960Ah
      mov eax, dword ptr [004808C0h]
      mov dword ptr [ebp-6Ch], eax
      lea eax, dword ptr [ebp-6Ch]
      push eax
      push dword ptr [004808BCh]
      lea eax, dword ptr [ebp-64h]
      push eax
      lea eax, dword ptr [ebp-70h]
      push eax
      lea eax, dword ptr [ebp-60h]
      push eax
      call dword ptr [0043C240h]
      push 004440E4h
      push 00444000h
      Programming Language:
      • [C++] VS98 (6.0) SP6 build 8804
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x418e80xdc.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x810000xf8d68.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x722000x2908.data
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x634.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x3a2ea0x3a400979724df3711a870677cfb26c430abd1False0.5212957685085837data6.867077590981686IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x3c0000x77cc0x780091c6ff2fd3bb8dc0dd623e04098000efFalse0.3382161458333333data4.707298007686286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x440000x3c8fc0x12200044dced594e170048a01f833f33579cdFalse0.8952586206896552data7.634244653448693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x810000xf8d680xf8e00626056e55bb235472731bc6f5fa2a38bFalse0.6497883051858363data7.300439922564435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      PNG0x81f6c0xefecdata0.9566916313904266
      TEXTINCLUDE0x90f580x49ASCII text, with CRLF line terminators1.0136986301369864
      RT_BITMAP0x90fa40x3668Device independent bitmap graphic, 512 x 54 x 4, image size 13824, 16 important colorsGermanGermany0.16082711085582999
      RT_BITMAP0x9460c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128GermanGermany0.3620689655172414
      RT_BITMAP0x946f40xd4Device independent bitmap graphic, 18 x 9 x 4, image size 108GermanGermany0.42924528301886794
      RT_BITMAP0x947c80x158Device independent bitmap graphic, 32 x 15 x 4, image size 240GermanGermany0.3081395348837209
      RT_BITMAP0x949200xd4Device independent bitmap graphic, 18 x 9 x 4, image size 108, resolution 2867 x 2867 px/m, 16 important colorsGermanGermany0.6132075471698113
      RT_BITMAP0x949f40x3e8Device independent bitmap graphic, 112 x 16 x 4, image size 896GermanGermany0.303
      RT_BITMAP0x94ddc0x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
      RT_BITMAP0x952c40x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
      RT_BITMAP0x957ac0x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
      RT_BITMAP0x95c940x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
      RT_BITMAP0x9617c0x1aa8Device independent bitmap graphic, 128 x 105 x 4, image size 6720GermanGermany0.011137162954279016
      RT_BITMAP0x97c240x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152EnglishUnited States0.04856687898089172
      RT_BITMAP0x9810c0xd10Device independent bitmap graphic, 144 x 45 x 4, image size 3240GermanGermany0.0215311004784689
      RT_BITMAP0x98e1c0x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
      RT_ICON0x993040x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GermanGermany0.3398014440433213
      RT_ICON0x99bac0x568Device independent bitmap graphic, 16 x 32 x 8, image size 0GermanGermany0.24783236994219654
      RT_ICON0x9a1140x128Device independent bitmap graphic, 16 x 32 x 4, image size 192GermanGermany0.3783783783783784
      RT_ICON0x9a23c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640GermanGermany0.1827956989247312
      RT_ICON0x9a5240x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsGermanGermany0.2668918918918919
      RT_ICON0x9a64c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.7322695035460993
      RT_ICON0x9aab40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.4294090056285178
      RT_ICON0x9bb5c0x368Device independent bitmap graphic, 16 x 32 x 24, image size 832GermanGermany0.6353211009174312
      RT_ICON0x9bec40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.5032833020637899
      RT_ICON0x9cf6c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320GermanGermany0.3432080924855491
      RT_DIALOG0x9d4d40xbcdataGermanGermany0.7287234042553191
      RT_DIALOG0x9d5900x98dataGermanGermany0.7763157894736842
      RT_DIALOG0x9d6280x5adataGermanGermany0.8111111111111111
      RT_DIALOG0x9d6840xa4dataGermanGermany0.7012195121951219
      RT_DIALOG0x9d7280xa8dataGermanGermany0.7797619047619048
      RT_DIALOG0x9d7d00x3b6dataGermanGermany0.4610526315789474
      RT_DIALOG0x9db880x36dataGermanGermany0.7962962962962963
      RT_DIALOG0x9dbc00xcadataGermanLiechtenstein0.6782178217821783
      RT_DIALOG0x9dc8c0xb6dataGermanGermany0.6813186813186813
      RT_DIALOG0x9dd440x80dataGermanGermany0.796875
      RT_DIALOG0x9ddc40x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9de540x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9dee40x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9df740x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e0040x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e0940x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e1240x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e1b40xa6dataGermanGermany0.7469879518072289
      RT_DIALOG0x9e25c0x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e2ec0x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e37c0x90dataGermanGermany0.7361111111111112
      RT_DIALOG0x9e40c0xf2data0.6776859504132231
      RT_STRING0x9e5000x80dataGermanGermany0.453125
      RT_STRING0x9e5800x50dataGermanGermany0.6625
      RT_GROUP_ICON0x9e5d00x22dataGermanGermany0.9705882352941176
      RT_GROUP_ICON0x9e5f40x14dataGermanGermany1.25
      RT_GROUP_ICON0x9e6080x14dataGermanGermany1.2
      RT_GROUP_ICON0x9e61c0x14dataGermanGermany1.2
      RT_GROUP_ICON0x9e6300x14dataGermanGermany1.25
      RT_GROUP_ICON0x9e6440x14dataGermanGermany1.25
      RT_GROUP_ICON0x9e6580x14dataGermanGermany1.2
      RT_GROUP_ICON0x9e66c0x14dataGermanGermany1.25
      RT_GROUP_ICON0x9e6800x14dataGermanGermany1.25
      RT_VERSION0x9e6940x45cdata0.3888888888888889
      RT_VXD0x9eaf00x57a36PC bitmap, Windows 3.x format, 45030 x 2 x 53, image size 359391, cbSize 358966, bits offset 540.9471816272293198
      RT_ANIICON0xf65280xcc4bPC bitmap, Windows 3.x format, 7458 x 2 x 49, image size 52506, cbSize 52299, bits offset 540.42759899806879675
      RT_ANIICON0x1031740x8993PC bitmap, Windows 3.x format, 5185 x 2 x 43, image size 35726, cbSize 35219, bits offset 540.4152872029302365
      RT_ANIICON0x10bb080xbdb9PC bitmap, Windows 3.x format, 6970 x 2 x 44, image size 48619, cbSize 48569, bits offset 540.349914554551257
      RT_ANIICON0x1178c40x34e8cPC bitmap, Windows 3.x format, 27810 x 2 x 43, image size 217639, cbSize 216716, bits offset 540.472466269218701
      RT_ANIICON0x14c7500x2d14ePC bitmap, Windows 3.x format, 23452 x 2 x 48, image size 184806, cbSize 184654, bits offset 540.498548636910113
      RT_MANIFEST0x1798a00x334XML 1.0 document, ASCII text, with CRLF line terminators0.4975609756097561
      None0x179bd40xaadataGermanGermany0.40588235294117647
      None0x179c800xaadataGermanGermany0.40588235294117647
      None0x179d2c0xcWindows metafileGermanGermany1.5
      None0x179d380xcdataGermanGermany1.6666666666666667
      None0x179d440x22dataGermanGermany1.0
      DLLImport
      KERNEL32.dllGetStartupInfoW, CreateThread, TerminateThread, FindFirstFileW, FindClose, FormatMessageW, GetEnvironmentVariableW, GetComputerNameW, GetLocaleInfoW, Sleep, LocalFree, CreateMutexW, MulDiv, lstrcpynW, OutputDebugStringA, GetLocalTime, GetPrivateProfileStringW, WritePrivateProfileStringW, CreateDirectoryW, GetUserDefaultLangID, GetFileAttributesW, InitializeCriticalSection, DeleteCriticalSection, GlobalHandle, FreeResource, DeleteFileW, lstrcmpW, lstrcatW, CopyFileW, GetTempPathW, GetTimeZoneInformation, GetModuleFileNameW, GetModuleHandleW, GetCurrentThreadId, GetVersionExW, GlobalReAlloc, FindResourceW, LoadResource, LockResource, FreeLibrary, LoadLibraryW, GetProcAddress, lstrlenA, InterlockedDecrement, InterlockedIncrement, GetLastError, WriteFile, CreateFileW, GetFileSize, ReadFile, CloseHandle, OutputDebugStringW, lstrcmpiW, GlobalSize, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, EnterCriticalSection, LeaveCriticalSection, lstrlenW, GetCurrentProcess, FlushInstructionCache, lstrcpyW, InterlockedExchange
      USER32.dllGetWindowRect, IsWindowVisible, FindWindowExW, PtInRect, GetCursorPos, ScreenToClient, GetWindowTextW, GetDlgCtrlID, GetScrollPos, SetWindowTextW, GetKeyState, SetFocus, LoadCursorW, SendMessageW, RegisterClassExW, CreateWindowExW, LoadImageW, GetWindowLongW, GetSysColor, DefWindowProcW, CallWindowProcW, SetMenuItemInfoW, EndDialog, SystemParametersInfoW, CharNextW, EnumClipboardFormats, GetClipboardFormatNameW, GetClipboardData, MessageBoxW, RegisterClipboardFormatW, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, SetWindowLongW, EnumChildWindows, CharLowerW, SetParent, CopyRect, DestroyWindow, PostQuitMessage, KillTimer, GetActiveWindow, SetTimer, DispatchMessageW, TranslateMessage, GetMessageW, PeekMessageW, CreateDialogParamW, GetSystemMetrics, MapWindowPoints, GetSysColorBrush, ReleaseDC, GetDC, GetClientRect, GetDlgItem, LoadBitmapW, SetWindowPos, ShowWindow, IsDialogMessageW, GetParent, IsChild, GetFocus, TrackPopupMenuEx, DestroyMenu, GetWindow, CreateDialogIndirectParamW, GetClassInfoExW, RegisterWindowMessageW, GetWindowTextLengthW, EndPaint, FillRect, BeginPaint, IsWindow, RedrawWindow, GetClassNameW, GetDesktopWindow, CreateAcceleratorTableW, wsprintfW, LoadStringW, ReleaseCapture, GetIconInfo, SetCapture, DrawAnimatedRects, DestroyIcon, CopyImage, GetKeyboardState, MessageBoxA, DrawEdge, GetCapture, SetCursor, GetMessagePos, GetSubMenu, SetRectEmpty, GetWindowPlacement, RegisterHotKey, UnregisterHotKey, UnhookWindowsHookEx, SetDlgItemTextW, GetDlgItemTextW, EnableWindow, IsCharLowerW, SendMessageA, EnableMenuItem, CheckMenuItem, GetForegroundWindow, GetWindowThreadProcessId, AttachThreadInput, GetCaretPos, SetRect, SetForegroundWindow, SetActiveWindow, GetMenuItemRect, GetMenuItemCount, GetMenuState, GetMenuItemID, CreatePopupMenu, CharUpperW, keybd_event, MapVirtualKeyW, DialogBoxParamW, GetDlgItemInt, UpdateWindow, LoadIconW, LoadAcceleratorsW, EnumWindows, SendMessageTimeoutW, AppendMenuW, DrawFocusRect, InflateRect, IntersectRect, IsRectEmpty, ClientToScreen, MoveWindow, PostMessageW, SetWindowsHookExW, CallNextHookEx, GetWindowDC, GetMenuItemInfoW, OffsetRect, SetPropW, InvalidateRgn, DrawTextW, InvalidateRect, CreateIconIndirect
      GDI32.dllLPtoDP, RestoreDC, LineTo, MoveToEx, CreatePen, SaveDC, DPtoLP, CreatePatternBrush, SetBitmapBits, GetBitmapBits, SetPixel, GetPixel, SetWindowOrgEx, GetBkColor, ExcludeClipRect, SetPixelV, GetTextExtentPoint32W, OffsetWindowOrgEx, GetClipBox, CreateSolidBrush, GetDeviceCaps, CreateDCW, CreateEnhMetaFileW, CloseEnhMetaFile, SelectPalette, RealizePalette, CreateCompatibleBitmap, GetCurrentObject, CreateBitmap, GetStockObject, SetBkMode, SetTextColor, GetDIBits, GetObjectW, CreateDIBSection, CreateCompatibleDC, SelectObject, SetBkColor, ExtTextOutW, CreateFontIndirectW, DeleteObject, BitBlt, DeleteDC, PatBlt
      comdlg32.dllGetOpenFileNameW
      ADVAPI32.dllCryptAcquireContextW, CryptDestroyHash, CryptReleaseContext, CryptHashData, CryptGetHashParam, RegDeleteValueW, RegSetValueExW, RegCloseKey, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyW, GetUserNameW, CryptCreateHash, OpenProcessToken, GetTokenInformation, RegOpenKeyExW
      SHELL32.dllSHGetFileInfoW, SHAppBarMessage, Shell_NotifyIconW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, SHGetSpecialFolderPathW, ShellExecuteW, ShellExecuteExW
      ole32.dllRegisterDragDrop, CreateStreamOnHGlobal, CoInitialize, CoCreateInstance, OleInitialize, OleUninitialize, CLSIDFromProgID, CLSIDFromString, StringFromCLSID, OleLockRunning, CoTaskMemAlloc, DoDragDrop, CoTaskMemFree
      OLEAUT32.dllVariantTimeToSystemTime, OleCreateFontIndirect, SysAllocStringLen, SafeArrayDestroy, VariantInit, SafeArrayCreateVector, SafeArrayAccessData, SafeArrayUnaccessData, SysAllocString, SysStringLen, LoadRegTypeLib, DispCallFunc, VariantClear, SysFreeString, SystemTimeToVariantTime
      COMCTL32.dllImageList_ReplaceIcon, ImageList_GetIcon, ImageList_GetImageCount, ImageList_Create, ImageList_Add, ImageList_Draw, ImageList_LoadImageW, InitCommonControlsEx, ImageList_DrawEx
      Language of compilation systemCountry where language is spokenMap
      GermanGermany
      EnglishUnited States
      GermanLiechtenstein
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-11-25T18:03:34.268004+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert164.95.10.1956001192.168.2.1249719TCP
      TimestampSource PortDest PortSource IPDest IP
      Nov 25, 2024 18:03:32.747004032 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:32.874039888 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:32.874139071 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:32.879654884 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:33.000081062 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:33.085032940 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:33.205506086 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:34.141583920 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:34.141661882 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:34.141735077 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:34.147566080 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:34.268003941 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:34.574831009 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:34.750193119 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:35.538220882 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:35.658703089 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:35.658756971 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:35.779825926 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:39.669173956 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:39.859616995 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:39.870390892 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:39.881263971 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.001909971 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.002182007 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.126776934 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.404522896 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.404917002 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.404928923 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.404941082 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.405153990 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.405153990 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.405168056 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.413611889 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.413691044 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.413952112 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.421787024 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.421900988 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.422060966 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.430330038 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.430444002 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.430535078 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.438827038 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.438843966 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.438904047 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.447359085 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.447372913 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.447468042 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.712291956 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.712308884 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.712380886 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813601971 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813621044 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813632965 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813644886 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813657045 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813668013 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813724995 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813735962 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813786030 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813785076 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813785076 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813786030 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813800097 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813811064 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813822985 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813843012 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813853979 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813858986 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813874960 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813889027 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813904047 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813904047 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813916922 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813927889 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813939095 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813949108 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813960075 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813972950 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.813987017 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.813987017 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.814006090 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.814018965 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.814117908 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.814130068 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.814173937 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.814173937 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.814173937 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.814173937 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.839143991 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.839178085 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.839591026 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.842701912 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.842763901 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.842895031 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.934875011 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.935005903 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.935868025 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.938535929 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.938638926 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.938898087 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.946331978 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.946408987 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.946496010 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.954071045 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.954279900 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.954381943 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.961780071 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.961905956 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.961966038 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.970561028 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.970673084 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.970814943 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.976957083 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.977030993 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.978898048 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.982574940 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.982682943 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.982897997 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.988020897 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.988136053 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.988403082 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.993732929 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.993956089 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.994261026 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:40.999746084 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.999914885 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:40.999984980 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.005825043 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.005948067 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.006361008 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.010962009 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.011044979 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.011188030 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.015964985 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.016084909 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.017143011 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.021080971 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.021429062 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.021487951 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.026716948 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.026793003 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.026875019 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.032182932 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.032268047 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.033463001 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.037718058 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.037930012 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.038113117 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.043150902 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.043297052 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.044255972 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.048747063 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.048856020 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.051343918 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.054300070 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.054371119 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.054546118 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.060132980 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.060182095 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.060666084 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.065291882 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.065382957 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.065428972 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.070797920 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.070899963 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.073693037 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.076387882 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.076553106 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.077023983 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.081830978 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.081897974 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.083331108 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.087418079 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.087518930 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.087702036 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.092819929 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.092945099 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.093015909 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.098407030 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.098747969 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.098906994 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.104218006 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.104305029 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.104723930 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.109368086 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.109469891 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.109569073 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.115004063 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.115221977 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.115304947 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.120649099 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.120712042 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.120809078 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.126003027 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.126089096 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.126152039 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.131582022 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.131716013 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.131791115 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.136841059 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.136951923 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.137044907 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.141815901 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.141866922 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.141949892 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.146640062 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.146779060 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.146882057 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.151267052 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.151412964 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.151488066 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.155786037 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.155831099 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.155934095 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.160847902 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.160861969 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.160933971 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.164808035 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.164879084 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.164978027 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.168272018 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.168339968 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.168457985 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.172705889 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.172765970 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.172816038 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.176422119 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.176537037 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.176601887 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.180639029 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.180777073 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.181046963 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.184223890 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.184370995 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.184468985 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.187621117 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.187665939 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.187778950 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.191066027 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.191287994 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.191332102 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.194797039 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.194940090 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.196827888 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.196928024 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.196949005 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.196997881 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.198987961 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.199115038 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.199189901 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.201133966 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.201280117 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.201745033 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.203522921 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.203605890 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.203689098 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.205432892 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.205534935 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.205795050 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.207582951 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.207809925 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.207869053 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.209671974 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.209790945 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.209986925 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.211807966 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.211919069 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.211986065 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.213923931 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.214030981 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.214155912 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.216068983 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.216176033 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.216231108 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.219615936 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.245243073 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.245351076 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.245409012 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.246175051 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.246234894 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.246411085 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.248202085 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.248311996 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.248387098 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.250273943 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.250339031 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.250380993 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.252403975 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.252480030 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.252540112 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.254276037 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.254390001 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.254390001 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.256309986 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.256366968 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.256393909 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.258569956 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.258621931 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.258686066 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.260782957 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.260795116 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.260850906 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.262377977 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.262420893 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.262434959 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.264494896 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.264606953 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.264681101 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.266437054 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.266449928 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.266520977 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.268418074 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.268529892 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.268614054 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.270428896 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.270451069 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.270529985 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.272612095 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.272696018 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.272758007 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.274419069 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.274528027 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.274579048 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.276443958 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.276623011 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.276730061 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.278403044 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.278456926 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.278536081 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.280353069 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.280459881 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.280544996 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.282341957 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.282423019 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.282437086 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.284399033 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.284451962 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.284503937 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.286300898 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.286410093 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.286458969 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.288160086 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.288261890 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.288333893 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.290476084 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.290518999 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.290555000 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.292768955 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.292789936 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.292836905 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.294753075 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.294840097 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.294898987 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.297135115 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.297230959 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.297431946 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.298626900 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.298737049 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.298774958 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.300090075 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.300147057 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.300239086 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.301605940 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.301817894 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.301826954 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.303423882 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.303517103 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.303520918 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.305166960 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.305269957 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.305392981 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.307039022 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.307143927 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.307239056 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.308840990 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.308927059 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.308959007 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.310651064 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.310772896 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.310853958 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.312670946 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.312772036 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.312829018 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.314311028 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.314517021 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.314573050 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.316065073 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.316344023 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.316414118 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.317909002 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.318017960 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.318123102 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.319658041 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.319807053 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.319874048 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.321650982 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.321722031 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.321813107 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.323611975 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.323745966 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.323833942 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.324960947 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.325037956 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.325123072 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.326555014 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.326630116 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.326703072 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.328310013 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.328363895 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.328419924 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.329936028 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.329993963 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.330136061 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.331582069 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.331684113 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.331801891 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.333246946 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.333316088 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.333343029 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.334836006 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.334887028 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.334939003 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.336596966 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.336653948 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.336682081 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.338411093 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.338423967 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.338489056 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.339674950 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.342528105 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.448884964 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.448923111 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.449161053 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.449229956 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.449238062 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.450045109 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.450128078 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.450236082 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.450865984 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.450941086 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.451091051 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.451412916 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.451740026 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.451801062 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.451853037 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.452584982 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.452686071 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.453418016 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.453560114 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.453566074 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.453629017 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.454333067 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.454540014 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.454942942 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.455159903 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.455214024 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.455279112 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.456018925 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.456207037 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.456276894 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.456824064 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.456929922 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.457010031 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.457690954 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.457751036 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.457828045 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.458916903 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.458937883 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.458993912 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.459494114 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.459584951 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.459640980 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.460170984 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.460313082 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.461055994 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.461097002 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.461180925 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.461261034 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.461894989 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.461949110 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.462682009 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.462728977 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.462764978 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.462960958 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.463725090 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.463900089 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.464013100 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.464572906 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.464651108 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.464782953 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.465239048 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.465356112 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.465426922 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.466136932 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.466358900 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.466413021 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.466932058 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.467068911 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.467148066 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.467689991 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.467781067 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.468489885 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.468553066 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.468646049 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.469495058 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.469562054 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.469634056 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.469679117 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.470202923 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.470300913 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.470360041 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.470988989 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.471084118 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.471211910 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.471803904 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.471836090 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.471899033 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.472657919 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.472788095 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.472877979 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.473402977 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.473465919 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.473563910 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.474268913 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.474348068 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.474459887 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.475081921 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.475183010 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.475433111 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.475893974 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.476053953 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.476102114 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.476846933 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.476897955 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.476969004 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.477580070 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.477720976 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.477813005 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.478363991 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.478492022 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.478940964 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.479147911 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.479280949 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.479332924 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.480072021 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.480181932 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.480247021 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.480874062 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.480988026 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.481405020 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:41.481580973 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:03:41.547090054 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:48.826325893 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:48.947148085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:48.947341919 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:48.948405027 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:49.069540977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:49.070935011 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:49.198147058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:50.133071899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:50.133711100 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:50.254276037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:50.254699945 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:50.375118017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.252513885 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.252913952 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.376322031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376699924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376740932 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376830101 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376838923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376955032 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376965046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376972914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376974106 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.376982927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.376993895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.377002001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.497833014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.525681019 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.525801897 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.652920961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.652935982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.652947903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.653022051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.653202057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.653211117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.653310061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.653318882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.852335930 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.852442026 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:51.973064899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.973259926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.973294973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.973373890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.973475933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:51.973505020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.083178997 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:52.083178997 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:52.204226971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.204297066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.204329967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.204463959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.204498053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.204590082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.530078888 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:52.530498981 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:52.650590897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651019096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651035070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651146889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651158094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651174068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651452065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651462078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651473045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651547909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651556969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:52.651566982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.230195999 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:53.230243921 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:53.350704908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.350713968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.350840092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.350843906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.350939989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.350990057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.351052999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.351094961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.351269007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.351273060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.351372957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:53.351411104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.068202972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.068202972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.189003944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189026117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189150095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189189911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189222097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189299107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189393044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189404011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189439058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189448118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189475060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.189534903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.336642981 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.336642981 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.457571030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457597017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457606077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457700968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457751036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457879066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457887888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457951069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.457995892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.458041906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.458075047 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.458162069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.585741043 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.585880041 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.710031033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710139036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710169077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710185051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710263014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710300922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710347891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710356951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710536957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710546970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710647106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.710656881 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.784310102 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.784410954 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:54.904927015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.904968977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905036926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905066013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905114889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905143023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905193090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905221939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905249119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905298948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905325890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:54.905353069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.042485952 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:55.042639017 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:55.164419889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164527893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164674997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164710045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164737940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164843082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164870977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164896965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.164988995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.165154934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.165182114 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.165209055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.587522030 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:55.587522030 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:55.712106943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712152958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712233067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712265968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712330103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712363005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712476015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712503910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712599039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712650061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.712965965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:55.713011026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.030653954 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.033786058 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.151350021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154267073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154303074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154360056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154371023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154380083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154599905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154609919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154817104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.154917002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.155042887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.155051947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.357043982 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.357172966 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.480096102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.480566025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.480618954 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.480787039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.480834007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.480938911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.480957031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.481004000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.481040955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.481065035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.481096029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.481151104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.604391098 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.604473114 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.729423046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729480028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729490042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729501963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729561090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729569912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729649067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729667902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729720116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729758978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729809046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.729850054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.832773924 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.832835913 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.953172922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953290939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953299999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953478098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953522921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953743935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953752995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953761101 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953769922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953778982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953794003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.953804016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:56.991252899 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:56.991328955 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.111903906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.111918926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.111931086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.111989975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.111999035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112051010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112148046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112158060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112165928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112214088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112224102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112271070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.112283945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.147025108 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.147202969 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.267410040 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.267597914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.267662048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.267672062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.267883062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.267977953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268142939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268182993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268322945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268378019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268493891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268587112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.268595934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.302737951 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.302830935 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.423729897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.423862934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.423904896 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.423974991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424020052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424052000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424099922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424149036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424175024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424257994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424329996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.424362898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.443887949 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.444010019 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.565903902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.565952063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566008091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566040039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566138029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566297054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566323996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566442966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566471100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566587925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566811085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.566915035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.584696054 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.584805012 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.706922054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.706983089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707063913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707110882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707192898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707237005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707289934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707357883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707442045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707496881 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707722902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.707751036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.741703033 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.741802931 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.865892887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.865977049 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866151094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866245985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866296053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866344929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866457939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866581917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866610050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866641998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866672039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.866719961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:57.883467913 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:57.883697033 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.004937887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005109072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005206108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005390882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005399942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005459070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005469084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005475998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005486012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005616903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005625963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.005635023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.021651983 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.021760941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.142232895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142250061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142268896 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142277002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142359018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142471075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142510891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142550945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142601013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142649889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142735958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.142755032 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.164324999 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.164499998 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.286973000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287048101 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287098885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287151098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287179947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287206888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287286043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287336111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287388086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287437916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287575006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.287604094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.318412066 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.318492889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.460076094 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.578063011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578219891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578248978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578373909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578402042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578486919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578514099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578630924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578680992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.578999043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.579025984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.598109961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.600123882 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.666928053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.670030117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.670067072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.672993898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.673023939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.673055887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.678503036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.698113918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.698131084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.698328018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721025944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721049070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721194029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721255064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721263885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721304893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721380949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721390963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721443892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721452951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.721493006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.756609917 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.756736994 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.877290010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877506971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877558947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877573967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877580881 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877583027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877665997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877731085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877882004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.877927065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.878062963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.878082991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:58.895261049 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:58.895359993 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.017826080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.017900944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.017910004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018060923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018069983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018184900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018193960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018203974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018253088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018369913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018378973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.018388987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.036287069 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.036287069 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.158154964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158181906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158237934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158294916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158392906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158401966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158559084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158571959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158598900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158727884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.158737898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.177752972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.177886963 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.304951906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305021048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305149078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305270910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305320024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305468082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305479050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305567026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305651903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305738926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305818081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.305927992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.333870888 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.333997011 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.458682060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.458777905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.458787918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.458839893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.458921909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.458931923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.458942890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.459069967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.459079981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.459220886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.459229946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.459295988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.490375042 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.490520000 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.611399889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611464024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611515999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611613035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611622095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611643076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611891031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.611900091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.612037897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.612047911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.612225056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.612234116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.630609035 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.630791903 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.751158953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751194000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751293898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751485109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751497984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751535892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751655102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751688004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751730919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751770020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751818895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.751877069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.787667036 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.787806988 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.908046007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908200026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908267021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908319950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908382893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908395052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908552885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908597946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908735037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908824921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908970118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.908979893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:03:59.943331003 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:03:59.943485022 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.064102888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064255953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064383984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064393997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064567089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064598083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064691067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064734936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064867020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.064928055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.065030098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.130986929 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.131030083 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.251725912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.251744032 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.251831055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.251980066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252125978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252224922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252361059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252399921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252448082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252496004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.252561092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.287503004 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.287697077 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.408190966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408277035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408287048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408349037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408359051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408413887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408422947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408507109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408515930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408629894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408639908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.408647060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.444104910 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.444252968 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.565901041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.565943956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.565999985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566030025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566059113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566086054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566137075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566179991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566230059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566256046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566304922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.566332102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.600145102 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.600362062 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.722366095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722532034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722599030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722652912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722714901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722743034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722793102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722821951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722853899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722902060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.722997904 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.723026037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.739603996 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.739701986 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.860812902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.860867977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.860929012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861049891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861058950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861107111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861125946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861191988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861218929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861232996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861279964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.861321926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:00.896975040 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:00.897231102 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.018630028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.018867970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.018909931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.018922091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019012928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019020081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019167900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019180059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019200087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019208908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019256115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.019268036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.037559032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.037707090 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.159779072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.159797907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.159817934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.159827948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.159892082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.159950018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.160048962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.160072088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.160196066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.160217047 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.160314083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.182241917 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.182379007 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.310097933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310132027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310143948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310247898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310257912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310379028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310430050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310535908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310545921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310583115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310592890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.310601950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.332910061 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.333092928 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.479732990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.479788065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.479798079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.479940891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.479960918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.480000973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.480024099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.480118036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.480171919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.480205059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.480257988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.521622896 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.521789074 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.643228054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643310070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643424034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643471956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643600941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643666029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643771887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643790007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643949032 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643959999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.643968105 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.662564993 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.662699938 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.802771091 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:01.829463005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829478025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829488993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829493999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829497099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829504967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829514980 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829521894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829530954 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829540014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829549074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.829556942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:01.942894936 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.033556938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033571005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033576012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033584118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033593893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033601999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033612013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033622026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033629894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033638954 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.033653975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.063901901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064001083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064009905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064059973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064125061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064136028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064209938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064218998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064311981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064320087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.064382076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.083029985 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.083194971 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.205178022 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205221891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205248117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205338001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205348969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205419064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205427885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205471992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205482960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205532074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205564022 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.205574989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.227157116 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.227246046 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.350779057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350806952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350856066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350866079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350951910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350960970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350980997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.350990057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.351083994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.351092100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.351182938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.365869045 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.366087914 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.486499071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486565113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486578941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486649990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486663103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486685038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486696959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486788034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486808062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486888885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.486901045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.709605932 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.709717035 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.850868940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.850899935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.854445934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.854489088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.854614973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.854676008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.854687929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.866020918 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:02.885097027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.885143042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.888870001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.888906956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.889373064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.989993095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.990089893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.990103960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.990150928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.990175962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.990267992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.990293026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:02.994422913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.007905006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.007939100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.011663914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.056216955 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.056406021 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.177473068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177637100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177746058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177757025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177829981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177843094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177890062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177901030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.177973986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.178046942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.178061962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.178066015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.178127050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.251071930 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.251230001 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.371797085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371834993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371845961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371855021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371864080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371896982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371968031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.371977091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.372109890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.372131109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.372226954 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.372279882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.372318983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.398930073 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.399115086 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.520121098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520179987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520231009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520299911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520309925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520409107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520430088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520603895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520770073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.520809889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.557718992 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.557810068 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.678318977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.678356886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.678417921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.678514957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.678601980 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.678802013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.678812027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.706315041 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.734915972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.735032082 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.828949928 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.829114914 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.856054068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.856132984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.856317043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.856328011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.856417894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.856607914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:03.885220051 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.885334015 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:03.949600935 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.005846977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.005865097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.005892992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.006027937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.006110907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.006155968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.006186008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.037197113 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.037303925 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.157891035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.157921076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.158071041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.158212900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.158288956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.158334970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.158410072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.176821947 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.176959991 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.226366043 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.281618118 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.298341990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.298547983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.298741102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.298921108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.298983097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.299057007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.299067020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.339890003 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.340034008 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.427334070 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.432260036 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.462631941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.462966919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.463057041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.463157892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.463166952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.463213921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.463231087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.489767075 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.489908934 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.554286957 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.554470062 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.611047983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.611085892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.611279011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.611427069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.611578941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.611728907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.611763000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.631367922 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.633049965 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.674930096 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.753089905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.754643917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.754699945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.754991055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.755328894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.772181034 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.772315979 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.892544985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.892818928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.892910004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.892971992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.893078089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.893130064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.893191099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:04.913288116 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:04.913403988 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.033885956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.033904076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.033919096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.034061909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.034104109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.034187078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.034291029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.062397957 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.062508106 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.182861090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.182987928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.183082104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.183183908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.183293104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.183398008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.183413029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.223964930 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.224087954 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.344829082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.344870090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.345005035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.345071077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.345082998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.345133066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.345145941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.381268978 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.381391048 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.502933025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.503170967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.503257990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.503451109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.503563881 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.503705978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.521064997 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.521163940 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.641679049 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.641798019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.641900063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.641942024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.642034054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.642115116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.642127037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.678308010 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.678405046 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.799308062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.799427986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.799506903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.799585104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.799631119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.799738884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.799751997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.817851067 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.817967892 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.938556910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.938628912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.938749075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.938847065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.938870907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.939090967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:05.990462065 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:05.990609884 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.112683058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.112735987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.112967014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.113204956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.113284111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.152739048 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.152873039 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.277137041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.277674913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.334932089 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.335078955 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.467552900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.467566013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.467680931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.467689991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.467730999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.467847109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.473295927 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.473444939 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.597347021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.597369909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.598546028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.599710941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.600833893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.602217913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.602256060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.614710093 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.614852905 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.744504929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.745110989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.779747963 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.892860889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.893027067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.893172026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.893367052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.893410921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.900404930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.933217049 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:06.979923010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:06.986455917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.000375032 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.002974033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.003031969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.097245932 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.100236893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.121267080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.121293068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.123368979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.130544901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.133120060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.220596075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.228924990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.239803076 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.241565943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.243609905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.250895977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.251111031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.361882925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.363883018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.371862888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.372082949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.375047922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.375854969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.380842924 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.380984068 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.513319969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.513391972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.520149946 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.529647112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.533305883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.538429976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.547245026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.547255993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.640767097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.640897989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.640927076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.649878979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.649905920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.663047075 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.663204908 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.784622908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.794661999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.798249960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.804708004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.818840027 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.837194920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.841895103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.842221022 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.957864046 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:07.971440077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.987070084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:07.993192911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.027167082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.032392979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.032603025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.080703974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.083306074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.089592934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.092288017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.116441965 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.116552114 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.240303993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.240340948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.240381956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.240499973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.242039919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.268873930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.274164915 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.277642012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.396533966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.396626949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.396641016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.396650076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.396795034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.396924973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.412090063 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.412204027 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.533070087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.533128977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.533152103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.533346891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.533421993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.533505917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.533526897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.551808119 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.551964998 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.679086924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.679277897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.679380894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.679435015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.679544926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.679670095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.679712057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.709889889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.710033894 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.837126970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.837325096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.837414026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.837483883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.837600946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.837697029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.837708950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.858000040 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.858000040 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:08.983627081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.983645916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.983685970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.983752012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.983845949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:08.983855963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.006316900 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.006316900 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.132657051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.132807016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.132823944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.133032084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.133109093 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.133673906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.133699894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.149333000 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.149543047 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.276329041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.276539087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.276961088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.276982069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.276992083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.277000904 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.277009964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.317833900 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.317997932 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.444742918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.444979906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.445007086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.445086002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.445184946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.445265055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.445297003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.538635969 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.538741112 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.659058094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.659209967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.659385920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.659456015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.659590006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.659720898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.659872055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.809999943 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.810138941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.939743996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.946186066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.963217974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.967072964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.968668938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.969036102 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:09.981441975 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:09.981590033 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.104264021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.104422092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.104433060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.104444027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.115169048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.115573883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.179747105 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.179917097 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.300302982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.300393105 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.300503969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.300764084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.300874949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.300954103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.301024914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.318497896 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.318638086 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.445771933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.445895910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.445960999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.446043015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.483019114 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.487024069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.613703012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.613743067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.629874945 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.734644890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.771851063 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.781831026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.850915909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.856695890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.856837988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857003927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857095003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857131004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857228994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857345104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857491016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.857517958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.897015095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.902168036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.912153959 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:10.971558094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.977500916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.977514982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:10.977598906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.033143997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.033200026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.033210993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.033238888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.052027941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.052177906 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.175743103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.175759077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.175776958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.175786018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.176083088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.193818092 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.193926096 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.319681883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.319699049 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.319746017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.319782019 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.319823980 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.319834948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.319895983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.319950104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.332114935 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.440879107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.452981949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.453001022 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.453082085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.453114033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.453218937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.514461994 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.514544010 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.637125015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.637142897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.637367010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.637490034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.637600899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.637674093 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.637717962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.662796974 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.662915945 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.783552885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.783663988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.783747911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.783858061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.783925056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.784065962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.784100056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.818937063 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.819022894 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.939743042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.939785004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.939924002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.940001965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.940151930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.940366030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.940376997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:11.977283955 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:11.977407932 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:12.159692049 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:12.212313890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.212512970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.212600946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.212941885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.280256987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.301043987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.302234888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.321394920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.321434975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.321541071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.596268892 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:12.599119902 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:12.736975908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.737006903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.737247944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.757919073 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:12.781456947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.781478882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.781636953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.781646967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.785787106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.785798073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.786263943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.786273956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.786389112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.885255098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.885272026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.885292053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.885301113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.885308981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.908866882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.908901930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.908911943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:12.971800089 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:12.971949100 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.093585968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.093599081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.093688011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.093815088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.093856096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.093924999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.093982935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.118741989 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.118864059 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.239557981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.239682913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.239820004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.239932060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.239940882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.240008116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.240016937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.260474920 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.260601044 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.385055065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.385072947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.385082006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.385090113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.385159016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.385324001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.385333061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.413732052 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.413875103 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.537522078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.537540913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.537755966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.537915945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.538034916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.538115978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.538141012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.571118116 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.571275949 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.691653967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.691687107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.691809893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.691926956 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.691993952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.692234993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.692244053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.711819887 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.711978912 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.835978031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.836280107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.836436987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.836910963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.837177992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.837187052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.854635000 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.854779005 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:13.975681067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.975802898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.975920916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.976082087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.976145983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.976241112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:13.976250887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.023983002 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.024116993 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.151218891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.151240110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.151252031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.151838064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.151905060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.151966095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.151976109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.164365053 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.164530993 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.290328026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.290549994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.290664911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.290676117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.296509981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.315160990 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.318015099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.327800989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.435833931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.435956001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.436098099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.436196089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.436296940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.436306000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.466305971 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.466492891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.587671995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.588001013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.588057995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.588067055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.588076115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.588084936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.588093996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.619153023 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.619283915 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.740428925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.740624905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.740694046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.740853071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.741061926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.741071939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.741080999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.773372889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.773507118 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.895710945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.896810055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.896842003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.897583961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.897658110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.897809982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.897850990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:14.931348085 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:14.931505919 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.051949024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.051956892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.051997900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.052071095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.052186966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.052259922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.052345037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.087641954 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.087785959 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.208225012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.208270073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.208312035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.208475113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.208517075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.208652020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.208724976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.245254040 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.245390892 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.366040945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.366085052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.366091013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.366345882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.366482973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.366622925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.366672993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.450282097 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.450453043 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.570935011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.570952892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.571038008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.571139097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.571269035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.571368933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.571382046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.767909050 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.768074989 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.888535023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.888813972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.888894081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.889015913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.889164925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.889231920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.889259100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:15.928082943 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:15.928246975 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.048604012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.048743010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.048831940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.048940897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.049087048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.049105883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.049114943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.119869947 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.119988918 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.242068052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.242291927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.242389917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.242487907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.242640972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.242767096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.242841005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.289803982 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.290015936 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.412740946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.412894011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.413007021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.413065910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.413173914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.413213968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.413331985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.427550077 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.427643061 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.549348116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.549397945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.549462080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.549519062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.549556971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.549742937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.549846888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.567677021 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.567786932 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.688388109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.688669920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.688730955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.688882113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.689022064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.689157963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.725087881 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.725177050 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.845498085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.845693111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.845814943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.846899986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.847434998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.865504980 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:16.870158911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.872844934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.986152887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.986311913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.986323118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.986463070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.990664005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:16.993314981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.020206928 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.020306110 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.140682936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.140727997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.140872002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.140978098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.141105890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.141231060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.141258001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.178453922 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.178565025 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.303720951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.303858042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.304194927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.317862034 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.324011087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.444165945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.444256067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.444382906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.444470882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.447551966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.450545073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.474839926 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.474961042 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.595457077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.595485926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.595599890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.595608950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.595643997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.595721960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.614105940 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.614238977 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.734921932 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.734961033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.734971046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.735281944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.735414982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.735460043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.804734945 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.804861069 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.928917885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.928940058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.929056883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.929131031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.929233074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.929399967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:17.959287882 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:17.959466934 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.080199957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.080246925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.080307961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.080337048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.080363989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.080399036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.080425024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.124670029 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.124670029 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.248696089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.248724937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.248858929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.248958111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.249041080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.249119043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.249191046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.287795067 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.287955046 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.415436029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.416419029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.478290081 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.478394032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.601047993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.601069927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.601252079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.601330042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.601449013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.601587057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.601596117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.639946938 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.640108109 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.760773897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.760821104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.760832071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.761089087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.761157036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.761188030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.873728991 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.873892069 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:18.994158030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.994250059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.994419098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.994544983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.994640112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:18.994693995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.036062956 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.036180973 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.158384085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.158528090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.158663034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.158756018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.158826113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.159008026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.159029007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.187087059 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.187251091 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.308393002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.308609962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.308756113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.309078932 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.309135914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.309163094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.309190989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.335221052 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.335359097 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.455904007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.455945969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.456007004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.456091881 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.456222057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.456291914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.456309080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.506448984 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.506616116 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.627018929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.627157927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.627245903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.627479076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.627510071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.627614021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.627641916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.661914110 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.662163973 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.782599926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.782700062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.782751083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.782943964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.782995939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.783196926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.783231020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.819365978 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.819457054 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.942634106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.942780018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.942790031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.943099976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.943110943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.943239927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.943594933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:19.959965944 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:19.961083889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.083343029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.084363937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.084393978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.084630013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.084641933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.084737062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.114751101 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.114861012 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.239247084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.239336014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.239471912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.239516020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.239618063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.240073919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.240207911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.256293058 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.256400108 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.382160902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.382277966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.382334948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.382369995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.382420063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.382493973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.382525921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.396085978 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.396198034 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.516664028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.516869068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.517033100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.517191887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.517338991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.517410994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.517438889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.553071976 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.553214073 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.674388885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.674560070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.674645901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.674664021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.674731970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.674825907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.674837112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.708448887 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.708584070 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.829129934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.829158068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.829236984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.829329014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.829360962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.829430103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.829462051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:20.897878885 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:20.898029089 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.018563032 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.018593073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.018723965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.018781900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.018824100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.018904924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.018989086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.086400986 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.086517096 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.207437992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.207457066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.207556009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.207650900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.207773924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.207829952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.207865000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.231193066 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.231416941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.351634026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.351914883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.351950884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.352026939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.352108002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.352247000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.352349997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.638340950 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.639031887 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.759001970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760063887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760155916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760164976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760202885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760214090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760219097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760266066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760405064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760421991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760438919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.760483980 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:21.818543911 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.818639040 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:21.961687088 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.020322084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.020339012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.020348072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.020356894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.020366907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.085047007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.085199118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.124772072 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.141879082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.141935110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.248977900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.248999119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.249090910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.250488043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.283502102 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.283667088 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.409982920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.410085917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.410098076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.410160065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.410278082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.410391092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.410399914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.444566965 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.444832087 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.565217018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.565440893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.565500975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.565574884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.565643072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.565788984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.565799952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.621870041 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.621988058 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.742418051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.742454052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.742589951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.742837906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.743045092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.743139029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.743170023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.791527033 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.791635036 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.912693977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.912713051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.912720919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.912859917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.912966013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.912981987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.913069010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:22.944596052 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:22.944700003 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.065375090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.065408945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.065448046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.065525055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.065646887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.065948963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.084805965 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.084911108 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.205537081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.205573082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.205643892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.205682039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.205773115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.205853939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.205918074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.223510027 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.223618031 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.344078064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.344099045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.344130039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.344255924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.344259977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.344392061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.344487906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.365859032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.365968943 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.487155914 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.491812944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.521593094 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.521704912 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.642222881 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.642267942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.642393112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.642486095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.642544031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.642643929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.642693043 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.663214922 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.663361073 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.783987999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.784012079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.784023046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.784091949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.784183025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.784410000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.784415007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.818558931 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.818558931 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:23.939523935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.939591885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.939656019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.939721107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.939786911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.939912081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:23.939958096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.007260084 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.007415056 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.130697966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.130713940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.130722046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.130826950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.130892038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.131007910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.131016970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.162075043 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.162237883 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.287599087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.287786961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.287798882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.288207054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.288250923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.288846970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.288882017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.518503904 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.518774033 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.640758038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.640837908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.640892029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.640994072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.641041040 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.641120911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.641161919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.729209900 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.729335070 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.854085922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.854104996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.854154110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.854219913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.854289055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.854440928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.854525089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:24.881303072 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:24.881401062 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.003978014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.004010916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.004056931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.004122019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.004246950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.004369974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.004400015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.041542053 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.041688919 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.162322044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.162338972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.162478924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.162827969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.162940979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.163053989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.163141966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.210680008 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.210933924 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.331737041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.331851959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.331891060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.331954002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.331996918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.332189083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.332231998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.367331982 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.367466927 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.494661093 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.494741917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.494823933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.495172024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.495290041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.526290894 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.539114952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.651843071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.652101040 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.652224064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.652327061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.652422905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.652592897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.703847885 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.704008102 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.824662924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.824700117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.824762106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.824887991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.824908972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.824985981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.824997902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.850821018 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.851000071 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.971482992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.971751928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.971831083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.971878052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.971977949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.972037077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.972048044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:25.996444941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:25.996551991 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.118345022 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.118443966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.118614912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.118654013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.118777990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.118838072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.169379950 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.169518948 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.295001030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.295047998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.295192003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.295264006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.295424938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.295458078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.295615911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.318339109 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.318483114 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.445465088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.445848942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.445938110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.445993900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.462090015 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.468935013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.476027012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.490722895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.599126101 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.654381990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.654812098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.733020067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.733112097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.740972042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.741063118 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.774494886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.774585009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.863209009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.863256931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.863286018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.863358974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.863387108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:26.880961895 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:26.881109953 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.001585960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.001614094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.001719952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.001889944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.001974106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.002034903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.022058010 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.022172928 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.142503023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.142637014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.142692089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.142703056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.142764091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.142895937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.142904997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.164069891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.164185047 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.284996986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.285034895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.285044909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.285140038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.285279989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.285438061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.285456896 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.333832026 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.333959103 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.454808950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.454826117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.454927921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.455106020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.455214977 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.455290079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.455372095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.477279902 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.477380991 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.598452091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.598479986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.598627090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.598877907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.599020958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.599287033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.599344015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.614834070 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.614988089 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.737291098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.737309933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.737323999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.737371922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.737488031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.737579107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.737586021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.763417006 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.763539076 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.890743971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.890804052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.890925884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.890976906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.891058922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.891180038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.891207933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:27.911952972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:27.912035942 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.039539099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.039572001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.039649010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.039927959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.040023088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.040118933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.040146112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.052119017 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.052216053 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.172518969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.172719955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.172909021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.173034906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.173073053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.173197031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.210387945 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.210510969 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.332407951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.332653046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.332686901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.332731009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.332869053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.332956076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.333058119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.349618912 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.349772930 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.471725941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.471849918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.471904993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.471915960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.472027063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.472146988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.490822077 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.490967035 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.611679077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.612354040 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.613415003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.629345894 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.629632950 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.750255108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.750577927 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.750664949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.750829935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.751138926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.751189947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.751218081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.805551052 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.805663109 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.926270962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.926326990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.926390886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.926593065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.926786900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.926815033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.926846981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:28.959785938 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:28.961117983 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.080800056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.082495928 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.082542896 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.082592964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.082624912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.082802057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.082834959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.100712061 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.100828886 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.223242998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.223571062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.223606110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.223875046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.223908901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.224069118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.240598917 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.240719080 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.361155033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.361190081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.361305952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.361394882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.361444950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.361500025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.361525059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.381376028 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.381519079 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.503108978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.503318071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.503482103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.503829002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.503878117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.503936052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.503945112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.522567034 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.522677898 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.644076109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.644093037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.644105911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.644207001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.644217968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.644227982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.676958084 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.677077055 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.799863100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.799983978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.800040007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.800523996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.800534964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.801042080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.850246906 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.850409985 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:29.971309900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.971332073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.971430063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.971512079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.971581936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.971647978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:29.971699953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.005250931 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.005347013 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.131877899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.131953001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.132091045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.132404089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.132474899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.132519960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.132529974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.185535908 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.185693026 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.306790113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.306919098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.307035923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.307188034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.307212114 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.307373047 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.307418108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.349267006 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.349406004 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.470314980 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.470438957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.470534086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.470609903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.470717907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.470773935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.470793009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.523766994 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.523886919 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.647669077 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.647751093 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.647784948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.648108959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.648205042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.648493052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.665924072 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.666023970 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.835542917 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:30.914030075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.914347887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.914417982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.914557934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.962224960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.967912912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.976146936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:30.994851112 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.009680033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.009737968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.009797096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.115613937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.115848064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.115894079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.115991116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.130332947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.130446911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.147192001 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.147321939 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.267987013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.268002033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.268013000 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.268079042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.268148899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.268167019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.268229961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.303013086 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.303154945 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.423935890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.424257994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.473906994 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.474013090 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.594403982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.594521999 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.594655037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.594664097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.594737053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.594815016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.594826937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.616899967 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.617058039 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.737536907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.737680912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.737730026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.737956047 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.737996101 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.771163940 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.771267891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.891916037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.892172098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.892230034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.892327070 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.892406940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.892862082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.892901897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:31.912313938 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:31.912410975 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.033607006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.033678055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.033833981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.033843994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.033931971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.034085035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.034094095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.067341089 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.067462921 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.188074112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.188131094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.188215971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.188349009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.188399076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.188452005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.188461065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.277679920 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.277931929 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.405114889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.405234098 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.405318975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.405385017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.405466080 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.427577019 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.451095104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.558123112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.558440924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.558630943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.558748960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.558962107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.559081078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.559216976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.559294939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.599569082 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.599683046 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.704421997 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.720458984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.720479965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.720608950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.720693111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.720705986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.739738941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.751535892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.751682997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.825171947 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.825213909 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.863684893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.863833904 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.863846064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.863892078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.864061117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.864073038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:32.909715891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.909809113 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:32.948860884 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.034720898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.034738064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.034753084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.034914970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.034950972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.053117037 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.068913937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.068948984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.191234112 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.194571972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.234730005 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.299124002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.299246073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.299340963 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.299423933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.299664974 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.299676895 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.324503899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.324537992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.335567951 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.369817019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.392533064 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.394253016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.395227909 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.403295994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.403368950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.473500013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.491794109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.495412111 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.513277054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.525679111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.541714907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.541917086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.541954041 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.541997910 CET4971956001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.616099119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.616238117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.616395950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.616523981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.616720915 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.616770983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.647219896 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.647219896 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.665286064 CET560014971964.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.791950941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.795974016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.807687044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.807727098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.812427998 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.873518944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.877069950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.935991049 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.936003923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.936145067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.936153889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.962543011 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:33.983063936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:33.993849993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.083549023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.083599091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.083631992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.083776951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.083832979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.083877087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.102463007 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.102608919 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.223078966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.223279953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.223484039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.223577023 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.223683119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.223823071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.223833084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.245134115 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.245290041 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.369040966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.369126081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.369173050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.369427919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.369600058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.369807959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.369860888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.398865938 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.399102926 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.526225090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.526351929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.526441097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.526649952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.526755095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.526885986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.526900053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.557636976 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.557780981 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.680187941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.680306911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.680424929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.680526018 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.680680990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.680814981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.680952072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.725114107 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.725224018 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.845582008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.845726013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.845763922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.845861912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.845904112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.845992088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.846013069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:34.880506992 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:34.880621910 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.001238108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.001646996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.001811981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.002098083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.002176046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.002372026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.002381086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.021846056 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.021958113 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.142514944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.142589092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.142637014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.142671108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.146835089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.156452894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.156471968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.193455935 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.193592072 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.314817905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.314829111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.314949989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.315095901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.315104961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.315224886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.315232992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.334086895 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.334275961 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.454843998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.454958916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.455077887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.455104113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.455151081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.455185890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.455255985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.474131107 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.474318981 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.597114086 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.597284079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.597369909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.597461939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.614685059 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.627466917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.646867037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.677052021 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.735544920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.735589981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.735701084 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.735752106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.735879898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.735888958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.772419930 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.772536039 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.893668890 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.893785954 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.893805027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.893914938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.893949986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.894045115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.894088984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:35.927397966 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:35.927570105 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.051662922 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.051951885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.055349112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.068658113 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.111141920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.113662004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.116463900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.116528988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.190511942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.190670967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.190768957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.190778971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.190846920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.190879107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.224378109 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.224488974 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.348012924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.348028898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.348233938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.348355055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.348407984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.348540068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.348658085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.366033077 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.366189957 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.492126942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.528115988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.535837889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.536150932 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.656255007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.656616926 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.656733990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.656795979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.656831026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.656902075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.656944990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.730581999 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.730740070 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.850992918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.851146936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.851222038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.851413012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.851444960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.851516962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.851576090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:36.886706114 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:36.886894941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.007810116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.008280039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.008416891 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.008446932 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.008554935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.008584976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.008613110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.042624950 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.042738914 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.163352013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.163520098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.163646936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.163774967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.163875103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.163980007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.163989067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.193897963 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.193996906 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.314407110 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.314467907 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.314506054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.314577103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.314611912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.314734936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.314745903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.365542889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.365641117 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.486267090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.493611097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.508856058 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.508970976 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.629679918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.629884958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.629935026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.630007029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.630090952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.630172968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.630319118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.645560980 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.645678043 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.770584106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.770939112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.771233082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.771302938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.771384001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.771516085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.771528006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.802236080 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.802236080 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.923105001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.923141003 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.923177958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.925331116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.935461998 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.937810898 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.937824011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:37.941654921 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:37.941757917 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.063827991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.063883066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.064069986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.064140081 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.064219952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.064274073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.100238085 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.100383043 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.227550983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.271063089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.285763025 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.391849041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.391875029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.391949892 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.392016888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.414623022 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.418849945 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.427751064 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.471183062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.480526924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.502054930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.515171051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.515289068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.566756964 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.599101067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.600959063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.622644901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.635658026 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.635795116 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.655486107 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.687342882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.687436104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.708739996 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.711837053 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.721427917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.743649006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.830251932 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.830455065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.830674887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.830832005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.831012011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.864945889 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.864947081 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:38.985862970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.985991955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.986078024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.986162901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.986279011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:38.986408949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.020670891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.020828009 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.142445087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.142570019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.142616987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.142761946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.142925978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.143028975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.143073082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.193772078 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.193934917 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.317027092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.317238092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.317365885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.317470074 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.317558050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.317679882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.317718983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.336838007 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.336947918 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.457461119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.457515955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.457639933 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.457649946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.457760096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.457827091 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.457874060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.602029085 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.602293015 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.727797031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.727925062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.728054047 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.728207111 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.728326082 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.728415012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.728431940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.868824959 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.869195938 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:39.989264965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.989633083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.989734888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.989818096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.990005970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.990031958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:39.990097046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.039499998 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.039653063 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.160851955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.161036015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.161078930 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.161221027 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.161267996 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.168477058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.168560982 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.183630943 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.183734894 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.304295063 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.304348946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.304462910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.304603100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.304611921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.304702044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.304713011 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.349792004 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.349912882 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.470634937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.470905066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.471038103 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.471193075 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.471203089 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.471287012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.515635967 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.515788078 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.636221886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.636308908 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.636415005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.636679888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.636755943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.636806965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.636818886 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.661243916 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.661350965 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.782109976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.782130957 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.782221079 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.782366991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.782490969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.782808065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.805471897 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.805577040 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.926249981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.926265001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.926373959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.926445961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.926568985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.926635981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.926645994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:40.962980032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:40.963103056 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.083456039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.083647966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.083795071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.083935976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.083992004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.084054947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.084074020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.130909920 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.131079912 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.251580954 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.251813889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.251904964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.252049923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.252110004 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.252180099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.252305984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.273679972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.273844004 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.394185066 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.394385099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.394948959 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.395052910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.395093918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.395179033 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.395195007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.411005974 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.411154032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.531779051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.531804085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.531923056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.532269955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.532357931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.552644968 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.565617085 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.575937986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.675076962 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.675185919 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.675272942 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.675335884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.675453901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.675463915 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.692653894 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.692770958 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.813215017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.813290119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.813339949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.813406944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.813498020 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.813541889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.813616991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.832484961 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.832633972 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.953429937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.953444958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.953614950 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.953775883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.953869104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.953947067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.953963995 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:41.975786924 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:41.975908995 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.096554041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.096600056 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.096647024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.096831083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.096946001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.097012997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.097023964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.131473064 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.131606102 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.253086090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.253448009 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.253586054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.253710985 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.253842115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.253937960 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.254002094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.272161961 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.272279024 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.393064976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.393141031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.393351078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.393395901 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.393520117 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.393574953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.393604994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.522898912 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.523046970 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.668000937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.673319101 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.680469990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.680907965 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.686285019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.688220024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.834887981 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.834995985 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:42.955653906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.955686092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.955740929 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.955972910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.956100941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.956145048 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:42.956172943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.002234936 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.002558947 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.122590065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.123066902 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.133677006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.138164997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.139277935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.139472008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.139482975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.149286032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.149439096 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.269927979 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.270869017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.302376032 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.302520990 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.424300909 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.424479961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.424531937 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.424705029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.424833059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.424916029 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.424962044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.449414968 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.449574947 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.570013046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.570056915 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.570147991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.570308924 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.570322990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.570475101 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.570485115 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.598120928 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.598261118 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.718535900 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.718676090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.718811989 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.718951941 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.718991041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.719099045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.719115019 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.747071028 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.747226954 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.869400024 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.869497061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.869658947 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.869791031 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.869801044 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.869956017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.869966030 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:43.923927069 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:43.924078941 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.044533968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.044712067 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.044842958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.044929981 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.045017958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.045133114 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.045145988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.084271908 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.084423065 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.206298113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.206310034 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.206319094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.254290104 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.254398108 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.374922037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.374948025 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.375022888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.375149012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.375195980 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.375338078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.375346899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.412767887 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.412888050 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.538687944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.538984060 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.539072037 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.539160013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.539254904 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.539305925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.539347887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.552141905 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.552268982 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.677011967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.677023888 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.677032948 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.677126884 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.678137064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.678145885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.678153992 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.696175098 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.696302891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.816803932 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.816920042 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.817035913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.817174911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.817462921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.817666054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.817709923 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.835285902 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.835742950 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:44.957156897 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.957324028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.957586050 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.959374905 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.959384918 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.959638119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:44.959647894 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.006309986 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.006468058 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.147608995 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.201271057 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.201284885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.201298952 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.201308012 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.201317072 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.201325893 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.201334953 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.302599907 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.322220087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.322237968 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.322247028 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.322256088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.322259903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.322269917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.424762964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.424958944 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.424968958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.424977064 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.425403118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.637339115 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.637496948 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.757925987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.758086920 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.758235931 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.758362055 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.758483887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.758583069 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.758610964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.827584028 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.827739954 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.951488972 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.951508045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.951636076 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.951726913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.951773882 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.951858997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.951879978 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:45.959932089 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:45.960074902 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.080465078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.080831051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.080940008 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.081077099 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.081123114 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.081192970 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.081203938 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.123811007 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.123964071 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.244465113 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.244630098 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.244725943 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.244736910 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.244781017 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.244903088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.245012045 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.256594896 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.256700039 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.377374887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.377568007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.377641916 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.377763987 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.377844095 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.378021002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.378030062 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.417771101 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.417927027 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.544891119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.544945955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.545027971 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.545197010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.545229912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.545479059 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.545505047 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.573410988 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.573560953 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.700841904 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.701133013 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.701255083 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.701431990 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.701658964 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.701767921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.701777935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.716259956 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.716368914 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.842152119 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.842168093 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.842181921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.842323065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.842427015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.842516899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.870168924 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.870275974 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:46.990685940 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.990832090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.990911961 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.991031885 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.991069078 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.991163969 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:46.991173983 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.016844034 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.016951084 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.138008118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.138065100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.138107061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.138210058 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.138300896 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.138382912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.138402939 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.164850950 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.164968014 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.285371065 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.285401106 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.285454035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.285598040 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.285706997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.285815001 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.285825014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.305077076 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.305175066 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.425796986 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.425820112 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.425911903 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.426105976 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.426155090 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.426215887 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.426239014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.443165064 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.443268061 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.563755035 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.563772917 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.563837051 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.563910007 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.563930988 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.564024925 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.564045906 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.608982086 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.609270096 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.729938984 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.730412006 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.730426073 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.730549097 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.730628014 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.730647087 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.740403891 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.740546942 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.863001108 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.863267899 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.863404036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.863651991 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.863986015 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:47.897384882 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:47.897531986 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.018146038 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.018182039 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.018222094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.018233061 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.018369913 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.018378973 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.054759979 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.054872990 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.175699949 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.175738096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.175945997 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.176403046 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.176443100 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.176645041 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.176762104 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.213097095 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.213217020 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.333782911 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.334053993 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.334116936 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.334238052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.334299088 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.334414005 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.334456921 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.410936117 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.411134958 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.536623955 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.536744118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.536757946 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.537089109 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.537237883 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.537429094 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.537517071 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.628015041 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.628106117 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.749174118 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.749599934 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.749608994 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.749838114 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.750103951 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.750185966 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.750288010 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.807559967 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.807714939 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.928102016 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.928245068 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.928292036 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.928339958 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.928632975 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.928790092 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.928802967 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:48.943914890 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:48.944077969 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:49.064327002 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.064611912 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.064735889 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.064892054 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.064958096 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.065242052 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.065295935 CET560014972164.95.10.19192.168.2.12
      Nov 25, 2024 18:04:49.067147970 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:49.067282915 CET4972156001192.168.2.1264.95.10.19
      Nov 25, 2024 18:04:49.189635992 CET560014972164.95.10.19192.168.2.12

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:12:03:05
      Start date:25/11/2024
      Path:C:\Users\user\Desktop\QuickTextPaste (2).exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\QuickTextPaste (2).exe"
      Imagebase:0x400000
      File size:1'363'968 bytes
      MD5 hash:4BC6DC45D87F46354CF96B0D60D849E5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:12:03:23
      Start date:25/11/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
      Imagebase:0x100000
      File size:2'141'552 bytes
      MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:0.6%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:6.8%
        Total number of Nodes:1282
        Total number of Limit Nodes:1
        execution_graph 10930 406e43 10933 406c51 10930->10933 10935 406de8 10933->10935 10936 406e3b 10933->10936 10942 406ea7 10935->10942 10939 406c51 10936->10939 10937 406ea7 3 API calls 10938 406ea0 10937->10938 10940 406de8 10939->10940 10941 406e3b 3 API calls 10939->10941 10940->10937 10941->10940 10947 406ebe 10942->10947 10949 406f0c 10947->10949 10951 406ecb 10947->10951 10948 407a3e VirtualProtect 10950 407a93 10948->10950 10949->10951 10952 40727b 10949->10952 10951->10948 10955 4072c9 10952->10955 10956 407304 10955->10956 10957 407a3e VirtualProtect 10956->10957 10958 407a93 10957->10958 12161 43754d GetModuleHandleW 12168 437536 GetModuleFileNameW 12161->12168 12163 437573 12164 4375c2 RegOpenKeyW RegQueryValueExW 12163->12164 12165 43762a 12164->12165 12166 437668 12164->12166 12165->12166 12167 437643 lstrlenW RegSetValueExW 12165->12167 12167->12166 12168->12163 12173 434350 12174 43438b LoadLibraryW 12173->12174 12175 43439f 12173->12175 12174->12175 12176 4343b8 12174->12176 12175->12176 12177 4343a8 GetProcAddress 12175->12177 12177->12176 10971 421c5f 10976 422876 10971->10976 10973 421c88 10982 4218e6 10973->10982 10977 422895 10976->10977 10978 4228b8 lstrcpynW lstrcpynW 10977->10978 10979 4228e1 10978->10979 10980 4228fc 10979->10980 10981 4228ed IsCharLowerW 10979->10981 10980->10973 10981->10980 10983 4218f0 __EH_prolog 10982->10983 10984 4218fa wsprintfW 10983->10984 11003 425052 10984->11003 11004 42505e 11003->11004 11005 425063 wsprintfW 11004->11005 11008 425092 11004->11008 11009 421945 lstrcatW 11005->11009 11007 42509e wsprintfW 11007->11009 11008->11007 11008->11009 11010 40310b 11009->11010 11011 403189 11010->11011 12182 432160 CreateWindowExW 12183 4321dc SendMessageW SendMessageW SendMessageW 12182->12183 12184 43219c GetStockObject 12182->12184 12186 432207 6 API calls 12183->12186 12187 432268 12183->12187 12185 437b74 12184->12185 12188 4321b2 GetObjectW CreateFontIndirectW 12185->12188 12186->12187 12188->12183 11016 428264 GetWindowPlacement 11017 428283 8 API calls 11016->11017 11018 42833c 11016->11018 11019 4282f4 11017->11019 11019->11018 11020 428329 MoveWindow 11019->11020 11020->11018 11021 42a66a 11022 42a67d 11021->11022 11023 42a69a 11022->11023 11025 42a6d5 11022->11025 11024 42a6b7 lstrlenW 11023->11024 11026 42a6be 11023->11026 11024->11026 11025->11026 11027 42a6fa lstrlenW 11025->11027 11027->11026 11028 42ce68 11029 42ce7d 11028->11029 11034 4380a0 11029->11034 11033 42cec5 11035 4380b8 11034->11035 11042 4380b1 11034->11042 11037 4380c1 InterlockedExchange 11035->11037 11041 4380ec 11035->11041 11036 438112 EnterCriticalSection 11039 42ce99 11036->11039 11040 4380d2 InitializeCriticalSection 11037->11040 11037->11041 11038 4380ff Sleep 11038->11041 11043 43813c 11039->11043 11040->11042 11041->11038 11041->11042 11042->11036 11042->11039 11044 438150 11043->11044 11045 438145 LeaveCriticalSection 11043->11045 11044->11033 11045->11044 12197 435173 lstrcpyW 12203 4350f1 GetSystemMetrics GetSystemMetrics LoadImageW 12197->12203 12200 4351de 12201 4351c5 CreateThread 12201->12200 12202 4351b9 TerminateThread 12202->12201 12204 43512c 12203->12204 12207 435132 12203->12207 12211 435209 GetIconInfo 12204->12211 12224 434eb5 12207->12224 12209 434eb5 3 API calls 12210 435170 12209->12210 12210->12200 12210->12201 12210->12202 12212 435229 GetDC CreateCompatibleDC CreateCompatibleDC 12211->12212 12213 4353c1 12211->12213 12212->12213 12214 43524f 12212->12214 12213->12207 12214->12213 12215 435260 GetObjectW 12214->12215 12216 435398 DeleteObject DeleteObject DeleteDC DeleteDC ReleaseDC 12215->12216 12217 43527d CreateBitmap 12215->12217 12216->12213 12218 435393 DeleteObject 12217->12218 12219 4352ab SelectObject SelectObject 12217->12219 12218->12216 12220 43536a SelectObject SelectObject CreateIconIndirect 12219->12220 12222 4352d3 12219->12222 12220->12218 12221 4352dd GetPixel 12221->12222 12222->12220 12222->12221 12223 435331 SetPixel 12222->12223 12223->12222 12225 434ed6 3 API calls 12224->12225 12226 434ed2 12225->12226 12226->12209 11052 428e73 InitCommonControlsEx 11053 428f48 11052->11053 11054 428e9d CreateWindowExW 11052->11054 11055 428ef5 11054->11055 11056 428f12 SendMessageW 11055->11056 11056->11053 11057 428f39 SendMessageW 11056->11057 11057->11053 10908 416473 10909 41647d NtQueryDefaultLocale 10908->10909 10911 416579 10909->10911 10912 41673b 10909->10912 10913 417424 NtQueryDefaultLocale 10912->10913 10914 416b17 10912->10914 10918 417b3b 10913->10918 10919 416f82 10914->10919 10920 416f9c NtQueryDefaultLocale 10919->10920 10922 417b3b 10920->10922 12227 425b7a 12229 425b93 12227->12229 12228 425ba7 12229->12228 12230 425e22 19 API calls 12229->12230 12230->12228 11058 43607a 11059 436087 11058->11059 11063 436095 11058->11063 11059->11063 11064 435bfc 11059->11064 11060 4360b1 CallNextHookEx 11061 436099 11060->11061 11063->11060 11063->11061 11065 435d35 11064->11065 11066 435c1d 11064->11066 11067 435dd7 11065->11067 11071 435d82 11065->11071 11072 435d4a 11065->11072 11068 435c26 11066->11068 11069 435d0c SendMessageW 11066->11069 11070 435ddd PostMessageW 11067->11070 11087 435c59 11067->11087 11073 435c76 11068->11073 11074 435c2d 11068->11074 11069->11087 11070->11087 11071->11067 11079 435d8c 11071->11079 11098 435bc2 SendMessageW 11072->11098 11073->11087 11095 435dfe GetMessagePos 11073->11095 11074->11087 11093 435dfe GetMessagePos 11074->11093 11078 435d55 PostMessageW PostMessageW PostMessageW 11078->11087 11079->11087 11099 435bc2 SendMessageW 11079->11099 11080 435c3d ScreenToClient 11094 435bab SendMessageW 11080->11094 11081 435c8a ScreenToClient 11084 435ca2 11081->11084 11084->11087 11096 435bab SendMessageW 11084->11096 11085 435d9d PostMessageW PostMessageW PostMessageW 11085->11087 11086 435c55 11086->11087 11089 435cfe PostMessageW 11086->11089 11087->11063 11089->11087 11090 435cc0 11090->11087 11097 435bc2 SendMessageW 11090->11097 11092 435ce7 SendMessageW 11092->11089 11093->11080 11094->11086 11095->11081 11096->11090 11097->11092 11098->11078 11099->11085 11100 40827e 11101 408363 11100->11101 11102 42039a 11101->11102 11122 42b437 11101->11122 11134 435eb1 11102->11134 11105 4203b2 11107 4204c4 11105->11107 11109 4204ad 11105->11109 11116 4203c5 11105->11116 11106 42037e 11106->11102 11110 42038a CheckMenuItem 11106->11110 11108 42b437 5 API calls 11107->11108 11111 4204d9 11108->11111 11110->11102 11112 420506 11111->11112 11113 4204f5 11111->11113 11115 42b437 5 API calls 11112->11115 11114 42b437 5 API calls 11113->11114 11118 4204fa 11114->11118 11115->11118 11117 420483 wsprintfW 11116->11117 11117->11109 11119 42b437 5 API calls 11118->11119 11120 42052d 11119->11120 11139 42a4e4 11120->11139 11123 42b441 __EH_prolog 11122->11123 11148 430ecd 11123->11148 11125 42b45f 11154 42e3a5 11125->11154 11127 42b477 11157 42e53c 11127->11157 11131 42b496 11132 42c1e3 5 API calls 11131->11132 11133 42b4a2 11132->11133 11133->11106 11189 435e57 11134->11189 11138 435f11 UnhookWindowsHookEx 11138->11105 11147 42a4ee __EH_prolog 11139->11147 11140 42a63d 11207 4166e5 11140->11207 11144 42a569 lstrlenW 11144->11147 11145 425052 2 API calls 11145->11147 11146 42a5d6 lstrlenW 11146->11147 11147->11140 11147->11144 11147->11145 11147->11146 11201 42a30d 11147->11201 11149 430ede 11148->11149 11150 4380a0 4 API calls 11149->11150 11151 430ef8 11150->11151 11152 43813c LeaveCriticalSection 11151->11152 11153 430f21 11152->11153 11153->11125 11155 430ecd 5 API calls 11154->11155 11156 42e3c2 11155->11156 11156->11127 11158 42e555 11157->11158 11159 42b48a 11158->11159 11168 4310a7 11158->11168 11161 42c1e3 11159->11161 11179 42e46f 11161->11179 11163 42c1fc 11164 4380a0 4 API calls 11163->11164 11165 42c217 11164->11165 11166 43813c LeaveCriticalSection 11165->11166 11167 42c234 11166->11167 11167->11131 11169 4310b6 11168->11169 11172 43204c 11169->11172 11171 4310dd 11171->11159 11173 432056 __EH_prolog 11172->11173 11174 43206d 11173->11174 11176 432105 11173->11176 11174->11171 11177 430ecd 5 API calls 11176->11177 11178 43212f 11177->11178 11178->11174 11180 42e480 11179->11180 11181 42e48c 11180->11181 11183 430b98 11180->11183 11181->11163 11184 430ba2 __EH_prolog 11183->11184 11185 4380a0 4 API calls 11184->11185 11186 430bf2 11185->11186 11187 43813c LeaveCriticalSection 11186->11187 11188 430e08 11187->11188 11188->11180 11190 435e6a 11189->11190 11191 435e78 CreateSolidBrush 11190->11191 11192 435e6e GetSysColor 11190->11192 11196 43551a 11191->11196 11192->11191 11195 435bc2 SendMessageW 11195->11138 11197 435523 LoadLibraryW 11196->11197 11198 435537 11196->11198 11197->11198 11199 435551 GetCurrentThreadId SetWindowsHookExW TrackPopupMenuEx 11197->11199 11198->11199 11200 435540 GetProcAddress 11198->11200 11199->11195 11200->11199 11202 42a319 lstrcatW 11201->11202 11205 42a320 11201->11205 11204 42a387 11202->11204 11204->11147 11205->11202 11206 42a38d lstrcatW 11205->11206 11206->11204 11208 416701 11207->11208 11209 417424 NtQueryDefaultLocale 11208->11209 11210 416b17 11208->11210 11214 417b3b 11209->11214 11212 416f82 NtQueryDefaultLocale 11210->11212 11213 416f7a 11212->11213 12243 429b7c CreateFileW 12244 429ba5 12243->12244 12246 429bfa 12243->12246 12245 429bbc WideCharToMultiByte WriteFile CloseHandle 12244->12245 12245->12246 11215 407801 11216 407825 11215->11216 11216->11215 11217 407a3e VirtualProtect 11216->11217 11218 407a93 11217->11218 11219 41f600 GetClientRect GetDlgItem SetWindowPos GetDlgItem SetWindowPos 11220 406c02 11223 406c0a 11220->11223 11221 406ea7 3 API calls 11222 406ea0 11221->11222 11224 406c36 11223->11224 11225 406e3b 3 API calls 11223->11225 11224->11221 11225->11224 11226 426601 11232 42666f 11226->11232 11229 426634 GetLastError FormatMessageW 11230 42666c 11229->11230 11231 426652 MessageBoxW LocalFree 11229->11231 11231->11230 11233 42660d GetModuleHandleW SetWindowsHookExW 11232->11233 11234 426678 UnhookWindowsHookEx 11232->11234 11233->11229 11233->11230 11234->11233 11235 437407 11240 437536 GetModuleFileNameW 11235->11240 11237 437425 11241 43748c RegOpenKeyW 11237->11241 11240->11237 11242 437486 11241->11242 11243 4374b7 lstrlenW RegSetValueExW RegCloseKey 11241->11243 11243->11242 11244 43580b 11245 435817 11244->11245 11246 43582d CallWindowProcW 11244->11246 11245->11246 11247 435845 11245->11247 11246->11247 11248 43680e 11285 43672e 11248->11285 11250 436857 11251 4368ca 11250->11251 11289 436e79 11250->11289 11253 436982 11251->11253 11254 4368da 11251->11254 11293 4372d6 11253->11293 11258 43672e GetSysColor 11254->11258 11276 43692a 11254->11276 11256 436999 OffsetRect 11261 4369f2 11256->11261 11262 436a85 GetMenuItemInfoW 11256->11262 11257 436939 11260 43693e CopyRect 11257->11260 11271 4368ee 11258->11271 11264 43672e GetSysColor 11260->11264 11263 436a2c 11261->11263 11269 436a49 11261->11269 11265 436abb 11262->11265 11267 436ae9 11262->11267 11263->11262 11268 436a36 ImageList_Draw 11263->11268 11284 436970 11264->11284 11266 436b13 SetBkMode 11265->11266 11270 436ac0 GetSystemMetrics GetSystemMetrics GetSystemMetrics 11265->11270 11273 436b44 11266->11273 11267->11266 11308 436cda 11267->11308 11268->11262 11301 4366f6 11269->11301 11270->11267 11274 436e79 SetPixel 11271->11274 11271->11276 11277 43672e GetSysColor 11273->11277 11274->11276 11276->11256 11276->11257 11279 436b66 11277->11279 11314 436f70 lstrlenW 11279->11314 11282 436b7e 11282->11284 11324 436c21 11282->11324 11288 436733 11285->11288 11286 43673b GetSysColor 11287 436760 11286->11287 11287->11250 11288->11286 11288->11287 11290 436f6b 11289->11290 11291 436ec1 11289->11291 11290->11251 11291->11290 11292 436f45 SetPixel 11291->11292 11292->11291 11292->11292 11294 4372f1 11293->11294 11295 4373e8 11293->11295 11297 43672e GetSysColor 11294->11297 11296 43672e GetSysColor 11295->11296 11300 43731f 11296->11300 11298 437302 11297->11298 11299 43672e GetSysColor 11298->11299 11299->11300 11300->11276 11302 4366fb 11301->11302 11303 436706 GetSysColorBrush 11302->11303 11304 436712 11302->11304 11305 43672b GetSysColorBrush 11303->11305 11304->11305 11306 43671b CreateSolidBrush 11304->11306 11307 436c1e 11305->11307 11306->11305 11307->11262 11309 436ce5 11308->11309 11310 43672e GetSysColor 11309->11310 11311 436d05 11310->11311 11328 436d29 11311->11328 11315 436fb1 SetTextColor 11314->11315 11316 436f8f 11314->11316 11317 436fc3 OutputDebugStringW GetCurrentObject 11315->11317 11318 436ff4 DrawTextW 11315->11318 11319 436fac 11316->11319 11320 436f9e lstrlenW 11316->11320 11317->11318 11321 436fdd GetObjectW CreateFontIndirectW 11317->11321 11322 437051 11318->11322 11323 437029 DrawTextW 11318->11323 11319->11315 11320->11316 11320->11319 11321->11318 11322->11282 11323->11322 11325 436c53 11324->11325 11326 436cd5 11325->11326 11327 436c8d SetPixel SetPixel SetPixel SetPixel 11325->11327 11326->11284 11327->11325 11327->11327 11329 436d65 11328->11329 11330 436de6 11329->11330 11331 436da5 SetBkColor ExtTextOutW SetBkColor 11329->11331 11333 436e02 SetPixel SetPixel 11330->11333 11335 436e32 11330->11335 11332 436d1d 11331->11332 11332->11266 11333->11330 11333->11333 11334 436e4b SetPixel SetPixel 11334->11334 11334->11335 11335->11332 11335->11334 12272 433f0d OpenClipboard 12273 433f91 12272->12273 12274 433f21 12272->12274 12275 433f41 GetClipboardData 12274->12275 12276 433f2a RegisterClipboardFormatW 12274->12276 12277 433f51 GlobalLock 12275->12277 12278 433f8b CloseClipboard 12275->12278 12276->12275 12277->12278 12279 433f5c 12277->12279 12278->12273 12282 433d4c 12279->12282 12281 433f66 12283 433d56 __EH_prolog 12282->12283 12284 433d6c SHGetDesktopFolder 12283->12284 12286 433d83 12283->12286 12284->12286 12289 433d8a 12284->12289 12285 433dd3 ILCombine 12285->12289 12286->12281 12287 433eb5 ILFree 12287->12289 12289->12285 12289->12286 12289->12287 12290 407444 VirtualProtect 12289->12290 12291 4325aa SHGetMalloc 12289->12291 12290->12289 12292 4325da 12291->12292 12293 4325e5 12292->12293 12294 432624 12292->12294 12298 432600 12293->12298 12299 432605 12293->12299 12300 432563 MultiByteToWideChar lstrlenW 12293->12300 12301 432589 lstrcpynW lstrlenW 12294->12301 12296 432653 lstrlenW 12296->12299 12298->12296 12298->12299 12299->12289 12300->12298 12301->12298 11336 406e0f 11337 406e90 11336->11337 11338 406ea7 3 API calls 11337->11338 11339 406ea0 11338->11339 12302 406f0f 12303 406f31 12302->12303 12304 40727b 12303->12304 12305 407349 12303->12305 12306 4072c9 VirtualProtect 12304->12306 12308 407a3e VirtualProtect 12305->12308 12307 4072bf 12306->12307 12309 407a93 12308->12309 11340 41fa12 11341 41fac5 11340->11341 11342 41fa2d 11340->11342 11342->11341 11344 424930 11342->11344 11345 42493a __EH_prolog 11344->11345 11346 42498a SendMessageW 11345->11346 11350 4249bc 11345->11350 11347 4249c0 lstrlenW 11346->11347 11346->11350 11347->11350 11348 424a52 lstrcpynW 11349 424a6d 11348->11349 11349->11341 11350->11348 11355 423c17 11364 424245 lstrcpyW 11355->11364 11358 423c55 lstrcpyW 11362 423c76 11358->11362 11359 423c2c 11360 423c39 MessageBoxW 11359->11360 11361 423c50 11360->11361 11362->11361 11372 424156 11362->11372 11366 42426f 11364->11366 11365 423c28 11365->11358 11365->11359 11366->11365 11367 424286 lstrcatW 11366->11367 11382 402cc3 11367->11382 11373 424160 __EH_prolog 11372->11373 11374 424245 4 API calls 11373->11374 11375 424168 GetLocalTime 11374->11375 11376 42417b 11375->11376 11384 407444 11376->11384 11383 402d4c 11382->11383 11385 407694 11384->11385 11386 407a3e VirtualProtect 11385->11386 11387 407a93 11386->11387 11388 42b015 11389 42b027 11388->11389 11401 42b092 11388->11401 11390 42b034 11389->11390 11391 42b04f 11389->11391 11411 42bf1a GetStockObject GetObjectW 11390->11411 11393 42b054 11391->11393 11394 42b06f 11391->11394 11421 42d41b 11393->11421 11395 42b074 11394->11395 11396 42b08d 11394->11396 11399 42b04d 11395->11399 11400 42b07e SetFocus 11395->11400 11396->11401 11402 42b0a1 11396->11402 11404 42b0d1 11396->11404 11397 42b03e 11397->11399 11413 42be3e 11397->11413 11399->11401 11445 42ad4b 11399->11445 11400->11399 11430 42bd49 11402->11430 11407 42b0d6 11404->11407 11409 42b0ed 11404->11409 11441 42bde2 11407->11441 11409->11399 11410 42b104 GetParent SendMessageW 11409->11410 11410->11399 11412 42bf58 11411->11412 11412->11397 11414 42be5b 11413->11414 11449 42c5a9 11414->11449 11416 42be79 11417 42be83 SendMessageW SendMessageW SendMessageW SendMessageW 11416->11417 11418 42bf0a 11416->11418 11419 42beed SetWindowPos 11417->11419 11418->11399 11419->11418 11422 42d48f SetRect 11421->11422 11423 42d43f SetRect 11421->11423 11424 42d4ae SetWindowPos 11422->11424 11425 42d46a 11422->11425 11423->11425 11426 42d45e SetWindowPos 11423->11426 11424->11425 11427 42d487 11425->11427 11429 42d481 SetWindowPos 11425->11429 11426->11425 11428 42d4de InvalidateRect 11427->11428 11428->11399 11429->11428 11431 42bd53 __EH_prolog 11430->11431 11432 42bd61 11431->11432 11433 42bd85 BeginPaint 11431->11433 11452 42d4f4 GetClientRect 11432->11452 11435 42d4f4 12 API calls 11433->11435 11438 42bdb0 11435->11438 11436 42bd83 11436->11399 11438->11436 11440 42d5e3 4 API calls 11438->11440 11440->11436 11442 42bdf9 11441->11442 11444 42bdef 11441->11444 11442->11444 11463 42d656 11442->11463 11444->11399 11448 42ad5c 11445->11448 11446 42ada1 GetParent SendMessageW 11446->11401 11447 42ad72 11447->11401 11448->11446 11448->11447 11450 42c5b7 11449->11450 11451 42c5bc CreateWindowExW 11449->11451 11450->11451 11451->11416 11453 42d523 DrawEdge FillRect 11452->11453 11454 42d554 7 API calls 11452->11454 11455 42bd6e 11453->11455 11456 42d5c0 DrawTextW SelectObject 11454->11456 11457 42d5bc 11454->11457 11455->11436 11458 42d5e3 GetClientRect 11455->11458 11456->11455 11457->11456 11459 42d615 GetWindowLongW 11458->11459 11461 42d643 FillRect 11459->11461 11462 42d62f DrawEdge 11459->11462 11461->11436 11462->11461 11464 42d69f 11463->11464 11465 42d67c 11463->11465 11466 42d67e 11464->11466 11470 430481 11464->11470 11465->11466 11469 430468 FillRect 11465->11469 11466->11444 11469->11466 11488 437c80 11470->11488 11472 43048b OffsetRect 11473 430556 11472->11473 11474 4304d9 OffsetRect GetSysColor CreatePen 11472->11474 11476 430564 GetSysColor CreatePen 11473->11476 11477 43055a OffsetRect 11473->11477 11489 431aad 10 API calls 11474->11489 11491 431aad 10 API calls 11476->11491 11477->11476 11479 43051b GetSysColor CreatePen 11490 431aad 10 API calls 11479->11490 11480 43058e 11482 430592 DeleteObject 11480->11482 11483 430599 11480->11483 11482->11483 11483->11466 11484 43053d 11485 430547 DeleteObject 11484->11485 11486 43054a 11484->11486 11485->11486 11486->11483 11487 43054f DeleteObject 11486->11487 11487->11483 11488->11472 11489->11479 11490->11484 11491->11480 11492 42b61a GetSubMenu 11493 406a19 11494 406a1c 11493->11494 11495 406a51 11494->11495 11499 407349 11494->11499 11505 406bc7 11495->11505 11500 407a3e VirtualProtect 11499->11500 11501 407a93 11500->11501 11508 406be9 11505->11508 11509 406bda 11505->11509 11506 406ea7 3 API calls 11507 406ea0 11506->11507 11508->11509 11510 406e3b 3 API calls 11508->11510 11509->11506 11510->11509 11511 436419 GetStockObject GetObjectW SystemParametersInfoW 11512 43646e 11511->11512 11513 43647c 6 API calls 11511->11513 11512->11513 11514 425c1e 11515 425c31 lstrlenW 11514->11515 11516 425c4f 11514->11516 11515->11516 11517 425c3f 11515->11517 11517->11515 11517->11516 12314 43271f GetLocaleInfoW 12315 4327a5 12314->12315 12316 436521 12319 435738 12316->12319 12320 43575f 12319->12320 12321 43574c 12319->12321 12323 435a19 12321->12323 12324 435a43 SendMessageW 12323->12324 12325 435a2b 12323->12325 12326 435af2 12324->12326 12327 435a6c GetClientRect 12324->12327 12325->12324 12333 435b82 12325->12333 12329 435afd SendMessageW 12326->12329 12326->12333 12335 435b92 SendMessageW 12327->12335 12331 435b10 GetClientRect SendMessageW SendMessageW PostMessageW 12329->12331 12329->12333 12330 435aa9 12336 435be3 SendMessageW 12330->12336 12331->12333 12333->12320 12334 435ac3 PostMessageW PostMessageW 12334->12333 12335->12330 12336->12334 12341 42ab2b 12348 42b866 12341->12348 12343 42ab44 12344 4380a0 4 API calls 12343->12344 12345 42ab5f 12344->12345 12346 43813c LeaveCriticalSection 12345->12346 12347 42ab7c 12346->12347 12350 42b877 12348->12350 12349 42b883 12349->12343 12350->12349 12352 42c699 12350->12352 12353 42c6a3 __EH_prolog 12352->12353 12354 4380a0 4 API calls 12353->12354 12356 42c6f3 12354->12356 12355 43813c LeaveCriticalSection 12357 42c970 12355->12357 12356->12355 12357->12350 11524 40b02f 11527 41f2c3 11524->11527 11525 41f37d 11538 41f392 11525->11538 11527->11525 11531 41f32d 11527->11531 11534 41f2c3 11531->11534 11532 41f37d 11533 41f392 ExitProcess 11532->11533 11536 41f38a ExitProcess 11533->11536 11534->11532 11535 41f32d ExitProcess 11534->11535 11535->11534 11539 41f3d7 ExitProcess 11538->11539 11541 43622c 11542 436252 6 API calls 11541->11542 11543 436238 CallWindowProcW 11541->11543 11544 4362c1 11542->11544 11543->11544 12358 425931 12359 437ca0 12358->12359 12360 42593e SendMessageW 12359->12360 12361 425973 12360->12361 12362 4259b8 lstrcpyW lstrcpyW 12361->12362 12363 42598c 12361->12363 12362->12363 11555 421838 11564 437c80 11555->11564 11557 421842 GetLocalTime 11558 42185d 11557->11558 11559 4218a7 11558->11559 11560 421899 11558->11560 11562 4218a0 11559->11562 11563 424156 7 API calls 11559->11563 11561 424156 7 API calls 11560->11561 11561->11562 11563->11562 11564->11557 11577 42ac3f 11578 42ac70 SendMessageW 11577->11578 11580 40663d 11581 406654 11580->11581 11582 406a51 11581->11582 11586 407349 11581->11586 11583 406bc7 3 API calls 11582->11583 11589 406bbd 11583->11589 11584 406ea7 3 API calls 11585 406ea0 11584->11585 11587 407a3e VirtualProtect 11586->11587 11588 407a93 11587->11588 11590 406bda 11589->11590 11591 406e3b 3 API calls 11589->11591 11590->11584 11591->11590 12393 43653c 12394 43656f 12393->12394 12395 43654c 12393->12395 12396 4365b7 12394->12396 12400 43656d 12394->12400 12413 437058 12394->12413 12395->12396 12399 436564 12395->12399 12423 435763 12396->12423 12402 4365cd 12399->12402 12403 4365e8 12402->12403 12404 4366ef 12402->12404 12405 4365f1 GetSystemMetrics 12403->12405 12406 43660e GetDC 12403->12406 12404->12400 12405->12404 12407 436621 CreateFontIndirectW SelectObject 12406->12407 12408 436650 SelectObject 12406->12408 12409 436660 DrawTextW SelectObject 12407->12409 12408->12409 12410 436699 DeleteObject 12409->12410 12411 4366a0 GetSystemMetrics ReleaseDC 12409->12411 12410->12411 12411->12404 12414 437078 12413->12414 12418 437070 12413->12418 12415 43709b GetMenuItemCount 12414->12415 12414->12418 12415->12418 12420 4370af 12415->12420 12416 4370c4 GetMenuItemInfoW 12417 4371b4 GetMenuItemCount 12416->12417 12416->12420 12417->12418 12417->12420 12418->12396 12419 43716f lstrlenW 12419->12420 12420->12416 12420->12417 12420->12419 12421 437191 lstrcpyW 12420->12421 12422 43719f SetMenuItemInfoW 12420->12422 12421->12422 12422->12417 12424 435774 12423->12424 12429 4357ba SendMessageW 12423->12429 12425 4357d4 12424->12425 12428 43577b 12424->12428 12439 435dfe GetMessagePos 12425->12439 12428->12429 12433 435783 12428->12433 12432 4357a4 12429->12432 12430 4357e0 12440 435e18 GetCursorPos ScreenToClient 12430->12440 12432->12400 12433->12432 12435 4360c1 12433->12435 12436 4360ca 12435->12436 12445 435f35 12436->12445 12439->12430 12463 435bab SendMessageW 12440->12463 12442 435e40 12443 435e53 12442->12443 12444 435f35 16 API calls 12442->12444 12443->12432 12444->12443 12446 435e57 4 API calls 12445->12446 12447 435f47 IsWindowVisible 12446->12447 12448 436076 12447->12448 12449 435f59 GetActiveWindow 12447->12449 12448->12432 12449->12448 12450 435f68 GetSubMenu 12449->12450 12450->12448 12451 435f81 12450->12451 12460 435bc2 SendMessageW 12451->12460 12453 435f93 12461 435b92 SendMessageW 12453->12461 12455 435fad MapWindowPoints MapWindowPoints GetCurrentThreadId SetWindowsHookExW TrackPopupMenuEx 12456 436037 SendMessageW 12455->12456 12457 43604b 12455->12457 12456->12457 12462 435bc2 SendMessageW 12457->12462 12459 43605a UnhookWindowsHookEx 12459->12448 12460->12453 12461->12455 12462->12459 12463->12442 12476 42c9cb 12477 42c9e0 12476->12477 12478 4380a0 4 API calls 12477->12478 12479 42c9fc 12478->12479 12480 43813c LeaveCriticalSection 12479->12480 12481 42ca28 12480->12481 12482 4355cc CreateWindowExW 12483 435613 GetStockObject 12482->12483 12484 435685 SendMessageW SendMessageW SendMessageW GetClientRect 12482->12484 12485 437b74 12483->12485 12486 437dbe 12484->12486 12487 435629 GetObjectW SystemParametersInfoW 12485->12487 12488 4356d9 SetWindowPos GetWindowLongW SetWindowLongW GetWindowLongW SetWindowLongW 12486->12488 12489 435676 CreateFontIndirectW 12487->12489 12490 435666 12487->12490 12489->12484 12490->12489 11616 4264d2 11626 437ca0 11616->11626 11619 4265eb 11620 4265a9 lstrlenW 11623 42651a 11620->11623 11621 42653a GetEnvironmentVariableW 11621->11623 11624 42657f lstrcatW 11621->11624 11622 4265d5 11622->11619 11625 4265db lstrcpyW 11622->11625 11623->11620 11623->11621 11623->11622 11624->11623 11625->11619 11627 4264df lstrlenW 11626->11627 11627->11619 11627->11623 11628 409ed7 11630 420ef1 11628->11630 11629 420fb8 wsprintfW 11629->11630 11630->11629 11631 420ff1 11630->11631 11632 425052 2 API calls 11631->11632 11634 42104c GetDlgItem 11631->11634 11633 42101f GetDlgItem 11632->11633 11633->11631 11635 42106b 11634->11635 11636 42111f lstrcatW 11635->11636 11637 421138 lstrcatW 11636->11637 11639 4163ab 11637->11639 11640 42117e wsprintfW 11639->11640 11643 4211a4 11640->11643 11642 421215 SetWindowTextW 11645 42122d 11642->11645 11681 427c1a 11643->11681 11644 4211e5 11644->11642 11646 421294 GetSystemMetrics GetSystemMetrics ImageList_Create 11645->11646 11651 421338 11645->11651 11689 4354e9 11646->11689 11649 4354e9 2 API calls 11650 4212e2 ImageList_ReplaceIcon LoadImageW ImageList_ReplaceIcon 11649->11650 11652 421324 11650->11652 11699 42169f GetDlgItem SendMessageW SendMessageW 11651->11699 11693 4215aa 11652->11693 11655 421386 wsprintfW 11656 4213ba 11655->11656 11701 421728 11656->11701 11658 4213c7 11659 4213ce wsprintfW 11658->11659 11660 4213f5 11659->11660 11661 421728 SendMessageW 11660->11661 11662 421402 11661->11662 11663 421728 SendMessageW 11662->11663 11664 421424 11663->11664 11665 421728 SendMessageW 11664->11665 11666 421443 11665->11666 11667 421728 SendMessageW 11666->11667 11668 421465 11667->11668 11669 421728 SendMessageW 11668->11669 11670 421484 11669->11670 11705 425e22 11670->11705 11672 4214d4 11673 4214db GetDlgItem SetWindowTextW 11672->11673 11674 4165af 11673->11674 11675 4214fb GetDlgItem SetWindowTextW 11674->11675 11676 4165af 11675->11676 11677 421515 GetDlgItem SetWindowTextW 11676->11677 11678 4165af 11677->11678 11679 42152f 6 API calls 11678->11679 11680 421599 11679->11680 11682 427c24 __EH_prolog 11681->11682 11683 427c60 RegSetValueExW 11682->11683 11686 427c93 11682->11686 11684 427c97 RegDeleteValueW 11683->11684 11685 427c7f 11683->11685 11684->11686 11688 427caf RegCloseKey 11684->11688 11685->11686 11687 427c8a RegCloseKey 11685->11687 11686->11644 11687->11686 11688->11686 11690 4354f2 GetModuleHandleW 11689->11690 11691 435506 LoadIconW 11689->11691 11690->11691 11692 4212c7 ImageList_ReplaceIcon 11690->11692 11691->11692 11692->11649 11695 4215b4 __EH_prolog 11693->11695 11694 421679 11694->11651 11695->11694 11696 4215e5 GetDlgItem CreateWindowExW 11695->11696 11696->11694 11697 421623 11696->11697 11697->11694 11698 421627 SendMessageW SendMessageA 11697->11698 11698->11694 11700 421721 11699->11700 11700->11655 11702 421732 __EH_prolog 11701->11702 11703 421789 SendMessageW 11702->11703 11704 4217aa 11703->11704 11704->11658 11706 425e33 11705->11706 11707 425e40 KillTimer SetTimer 11706->11707 11708 425e37 11706->11708 11710 425e3e 11707->11710 11711 425cdf 11708->11711 11710->11672 11725 437c80 11711->11725 11713 425ce9 SendMessageW 11714 425d10 11713->11714 11724 425e13 11713->11724 11726 425c5d SendMessageW SendMessageW SendMessageW 11714->11726 11716 425d26 11717 425d44 SetWindowTextW 11716->11717 11718 425d64 KillTimer SetTimer SetDlgItemTextW 11717->11718 11719 425d5e SetWindowTextW 11717->11719 11720 425db0 11718->11720 11721 425da8 SetWindowTextW 11718->11721 11719->11718 11722 425052 2 API calls 11720->11722 11721->11720 11723 425dda SendMessageW SendMessageW 11722->11723 11723->11724 11724->11710 11725->11713 11727 425ca5 11726->11727 11728 425cd8 11726->11728 11727->11728 11729 425cae SendMessageW SendMessageW 11727->11729 11728->11716 11729->11728 11730 425cd1 SendMessageW 11729->11730 11730->11728 11731 4254da SendMessageW SendMessageW 11732 425517 ClientToScreen SendMessageW 11731->11732 11733 425514 11731->11733 11733->11732 11734 42aeda 11736 42aeed 11734->11736 11735 42af6d 11736->11735 11737 42af28 11736->11737 11738 42af1f 11736->11738 11741 42af3a DestroyWindow 11737->11741 11742 42af26 11737->11742 11739 42be3e 6 API calls 11738->11739 11739->11742 11740 42bf1a 2 API calls 11743 42af60 11740->11743 11741->11742 11742->11740 11742->11743 11743->11735 11745 42bd15 GetClientRect 11743->11745 11746 42d41b 6 API calls 11745->11746 11747 42bd45 11746->11747 11747->11735 11752 4324dc IsWindow 11753 4324f4 GetKeyboardState 11752->11753 11754 43255f 11752->11754 11755 432537 SetForegroundWindow GetKeyboardState 11753->11755 11756 432526 11753->11756 11755->11754 11758 43254e 11755->11758 11756->11755 11757 43252f keybd_event 11756->11757 11757->11755 11758->11754 11759 432557 keybd_event 11758->11759 11759->11754 12508 42b9e2 12511 42b94b 12508->12511 12510 42b9f4 12512 42b95c 12511->12512 12513 42b968 12512->12513 12515 42cb36 12512->12515 12513->12510 12516 42cb40 __EH_prolog 12515->12516 12517 4380a0 4 API calls 12516->12517 12518 42cb90 12517->12518 12519 43813c LeaveCriticalSection 12518->12519 12520 42ce0d 12519->12520 12520->12512 12521 42abe0 12522 42b94b 5 API calls 12521->12522 12523 42abf9 12522->12523 12524 4380a0 4 API calls 12523->12524 12525 42ac14 12524->12525 12526 43813c LeaveCriticalSection 12525->12526 12527 42ac31 12526->12527 11772 4374ea RegOpenKeyW 11773 437515 RegDeleteValueW RegCloseKey 11772->11773 11774 43752c 11772->11774 11773->11774 12557 426de8 lstrcatW GetModuleHandleW GetOpenFileNameW 12558 426e86 12557->12558 12559 426e9f 12557->12559 12561 427502 12558->12561 12562 42750c __EH_prolog 12561->12562 12563 42752b InterlockedIncrement 12562->12563 12570 42753a 12562->12570 12563->12570 12564 4275cb wsprintfW 12564->12570 12565 427675 lstrlenW 12565->12570 12566 42769a lstrlenW 12566->12570 12567 4276ca lstrlenW 12567->12570 12568 4276f0 lstrlenW 12568->12570 12569 42773f 12571 407444 VirtualProtect 12569->12571 12570->12564 12570->12565 12570->12566 12570->12567 12570->12568 12570->12569 12572 4277af 12571->12572 12573 407444 VirtualProtect 12572->12573 12574 4277c1 MessageBoxW 12573->12574 12575 4277e5 12574->12575 12576 427889 12575->12576 12578 421ecf 12575->12578 12576->12559 12579 421ed9 __EH_prolog 12578->12579 12580 421f04 lstrlenW 12579->12580 12581 421f12 12580->12581 12582 422876 3 API calls 12581->12582 12583 422088 12581->12583 12582->12583 12583->12575 12584 436be8 SetBkColor ExtTextOutW SetBkColor 12585 424fee 12586 425052 2 API calls 12585->12586 12587 425020 12586->12587 12590 424f77 12587->12590 12589 425030 lstrcatW lstrcatW 12591 424f82 12590->12591 12592 424fde lstrcatW 12591->12592 12592->12589 12593 4205f1 GetClientRect 12594 420613 GetWindowRect 12593->12594 12595 42062b GetSystemMetrics 12593->12595 12594->12595 12596 437dbe 12595->12596 12597 42064d SendMessageW GetSystemMetrics 12596->12597 12598 420689 12597->12598 12599 4206bf SendMessageW 12598->12599 12600 437dbe 12599->12600 12601 4206ef SetWindowPos GetWindowRect GetDlgItem GetDlgItem 12600->12601 12602 42073f GetWindowRect 12601->12602 12603 42079d SetWindowPos ShowWindow SetWindowPos CopyRect 12601->12603 12634 404106 12602->12634 12604 420827 12603->12604 12609 420845 SetWindowPos SetWindowPos GetSystemMetrics 12604->12609 12610 437dbe 12609->12610 12611 4208dd GetDlgItem SetWindowPos GetDlgItem 12610->12611 12612 437dbe 12611->12612 12613 42093b SetWindowPos GetSystemMetrics 12612->12613 12614 437dbe 12613->12614 12615 420974 GetSystemMetrics 12614->12615 12616 420993 12615->12616 12617 4209a9 GetDlgItem ShowWindow SetWindowPos GetDlgItem 12616->12617 12618 437dbe 12617->12618 12619 420a14 ShowWindow SetWindowPos 12618->12619 12620 437dbe 12619->12620 12621 420a46 GetDlgItem 12620->12621 12622 437dbe 12621->12622 12623 420a7a SetWindowPos GetDlgItem 12622->12623 12624 437dbe 12623->12624 12625 420acc SetWindowPos GetDlgItem 12624->12625 12626 437dbe 12625->12626 12627 420b12 SetWindowPos GetDlgItem 12626->12627 12628 437dbe 12627->12628 12629 420b58 SetWindowPos GetSystemMetrics 12628->12629 12630 437dbe 12629->12630 12631 420b8d SetWindowPos 12630->12631 12636 4362c5 12631->12636 12633 420bc1 12635 40410f 12634->12635 12637 4362d7 12636->12637 12638 43630b GetClientRect 12636->12638 12644 4360e5 CreateWindowExW 12637->12644 12640 43633a SendMessageW SendMessageW SetWindowPos 12638->12640 12641 436328 12638->12641 12640->12633 12643 43598b 2 API calls 12641->12643 12643->12640 12645 436195 SendMessageW SendMessageW SendMessageW 12644->12645 12646 436125 GetStockObject 12644->12646 12648 4361c6 6 API calls 12645->12648 12649 436224 GetWindowLongW SetWindowLongW 12645->12649 12647 437b74 12646->12647 12650 43613b GetObjectW SystemParametersInfoW 12647->12650 12648->12649 12649->12638 12651 436186 CreateFontIndirectW 12650->12651 12652 436178 12650->12652 12651->12645 12652->12651 11775 407282 11776 407293 11775->11776 11777 4072c9 VirtualProtect 11776->11777 11778 4072bf 11777->11778 11779 432681 11782 432698 11779->11782 11780 4326ee 11781 4326d3 lstrlenW 11781->11782 11782->11780 11782->11781 11783 435886 11784 4358a1 11783->11784 11785 43589a 11783->11785 11786 4358a8 DestroyMenu 11784->11786 11787 4358af SendMessageW SendMessageW 11784->11787 11786->11787 11788 4358d5 11787->11788 11789 4358e9 11787->11789 11790 4358d8 SendMessageW 11788->11790 11791 4358f5 GetMenuItemCount 11789->11791 11790->11789 11790->11790 11792 435977 SendMessageW 11791->11792 11795 435913 11791->11795 11792->11785 11793 43591f GetMenuItemInfoW 11796 43598b 11793->11796 11795->11792 11795->11793 11797 4359da 11796->11797 11798 4359dd SendMessageW 11796->11798 11797->11798 11799 435a10 11798->11799 11800 4359fc SendMessageW 11798->11800 11799->11795 11800->11799 11801 43548b 11802 437b74 11801->11802 11803 4354ad SHGetFileInfoW 11802->11803 11806 435465 11803->11806 11805 4354e2 11810 4353f4 11806->11810 11811 435407 SHGetFileInfoW SHGetFileInfoW 11810->11811 11812 43545d ImageList_GetIcon 11810->11812 11811->11812 11812->11805 12682 423593 12683 4235ba 12682->12683 12684 42359c 12682->12684 12684->12683 12686 4235d0 12684->12686 12687 4235e4 12686->12687 12688 4235e8 12687->12688 12689 4235fe GetSysColor 12687->12689 12688->12683 12689->12688 10923 41f392 10924 41f3d7 ExitProcess 10923->10924 12690 41e397 12693 41e3c5 12690->12693 12691 41e5d4 12711 41ee02 12691->12711 12693->12691 12703 41e5df 12693->12703 12707 41e5e7 12703->12707 12704 41e603 12728 41e8f6 12704->12728 12707->12704 12722 41e694 12707->12722 12712 41ee1b 12711->12712 12713 41ee2a 12711->12713 12715 41f108 3 API calls 12712->12715 12801 41ee59 12713->12801 12720 41f0fe 12715->12720 12717 41f37d 12718 41f392 ExitProcess 12717->12718 12721 41f178 ExitProcess 12718->12721 12719 41f32d 2 API calls 12719->12720 12720->12717 12720->12719 12720->12721 12723 41e6d9 12722->12723 12733 41e6ec 12723->12733 12729 41e909 ExitProcess 12728->12729 12730 41e94a 12728->12730 12747 41e95a 12730->12747 12735 41e704 12733->12735 12734 41e68a 12736 41e6ec 10 API calls 12734->12736 12735->12734 12740 41e67a 12735->12740 12743 41e854 12735->12743 12737 41e6e3 12736->12737 12739 41e8f6 10 API calls 12737->12739 12741 41e8ec 12739->12741 12740->12737 12742 41e694 10 API calls 12740->12742 12742->12734 12744 41e8ce 12743->12744 12745 41e8f6 10 API calls 12744->12745 12746 41e8ec 12745->12746 12754 41e9bb 12747->12754 12755 41e9aa 12747->12755 12748 41ed1d 12750 41ee02 5 API calls 12748->12750 12751 41edf8 12750->12751 12778 41f108 12751->12778 12754->12755 12762 41ebc5 12754->12762 12755->12748 12765 41ed25 12755->12765 12785 41ebd8 12762->12785 12766 41ed42 12765->12766 12767 41ed50 12766->12767 12798 41ed5a 12766->12798 12768 41ee02 5 API calls 12767->12768 12770 41edf8 12768->12770 12771 41f108 3 API calls 12770->12771 12776 41f0fe 12771->12776 12773 41f37d 12774 41f392 ExitProcess 12773->12774 12777 41f178 ExitProcess 12774->12777 12775 41f32d 2 API calls 12775->12776 12776->12773 12776->12775 12776->12777 12782 41f13a 12778->12782 12779 41f178 ExitProcess 12781 41f392 ExitProcess 12781->12779 12782->12779 12783 41f32d 2 API calls 12782->12783 12784 41f37d 12782->12784 12783->12782 12784->12781 12787 41ec09 12785->12787 12786 41ed1d 12789 41ee02 5 API calls 12786->12789 12787->12786 12788 41ed25 7 API calls 12787->12788 12788->12786 12790 41edf8 12789->12790 12791 41f108 3 API calls 12790->12791 12796 41f0fe 12791->12796 12793 41f37d 12794 41f392 ExitProcess 12793->12794 12797 41f178 ExitProcess 12794->12797 12795 41f32d 2 API calls 12795->12796 12796->12793 12796->12795 12796->12797 12799 41ed65 ExitProcess 12798->12799 12803 41ee6d 12801->12803 12802 41f108 3 API calls 12807 41f0fe 12802->12807 12803->12802 12805 41f37d 12806 41f392 ExitProcess 12805->12806 12809 41f178 ExitProcess 12806->12809 12807->12805 12808 41f32d 2 API calls 12807->12808 12807->12809 12808->12807 12814 42afa7 12815 42afb6 lstrcpynW 12814->12815 12816 42afc5 12814->12816 12815->12816 11865 408aab 11866 41f945 11865->11866 11867 41f961 11866->11867 11868 41f96a 11866->11868 11878 41f7d3 11867->11878 11870 41f973 11868->11870 11871 41f992 11868->11871 11884 435087 11870->11884 11892 427fb8 11871->11892 11872 41f968 11875 41f982 ShowWindow 11875->11872 11876 41f999 EndDialog PostQuitMessage 11877 42666f UnhookWindowsHookEx 11876->11877 11877->11872 11882 41f7e4 11878->11882 11879 41f812 ShowWindow 11898 434e73 11879->11898 11882->11879 11883 41f802 MessageBoxW 11882->11883 11883->11879 11885 435093 11884->11885 11886 4350c6 ShowWindow 11884->11886 11909 435063 SystemParametersInfoW 11885->11909 11886->11875 11888 435098 11888->11886 11889 43509c GetWindowRect 11888->11889 11910 434f5d FindWindowExW 11889->11910 11893 427fc2 __EH_prolog 11892->11893 11918 428006 11893->11918 11895 427fdb 11896 4166e5 2 API calls 11895->11896 11897 427ff0 11896->11897 11897->11876 11903 434ed6 11898->11903 11901 41f827 11901->11872 11902 434e96 TerminateThread 11902->11901 11904 434f33 11903->11904 11905 434f1f lstrcpynW 11903->11905 11906 434f38 Shell_NotifyIconW 11904->11906 11905->11906 11907 434e8f 11906->11907 11908 434f4e DestroyIcon 11906->11908 11907->11901 11907->11902 11908->11907 11909->11888 11911 434f9a SHAppBarMessage 11910->11911 11912 434f7d FindWindowExW 11910->11912 11914 435000 FindWindowExW 11911->11914 11915 434fb1 DrawAnimatedRects 11911->11915 11912->11911 11913 434f8b GetWindowRect 11912->11913 11913->11915 11916 43500a GetWindowRect 11914->11916 11917 43503d SystemParametersInfoW 11914->11917 11915->11886 11916->11915 11917->11915 11927 437c80 11918->11927 11920 428010 GetWindowRect 11921 437b74 11920->11921 11922 428042 GetWindowPlacement 11921->11922 11923 428060 CopyRect 11922->11923 11924 42806e 11922->11924 11923->11924 11925 428074 GetWindowRect 11924->11925 11926 428087 11924->11926 11925->11926 11926->11895 11927->11920 11932 42b4b7 11939 42c242 11932->11939 11934 42b4d0 11935 4380a0 4 API calls 11934->11935 11936 42b4eb 11935->11936 11937 43813c LeaveCriticalSection 11936->11937 11938 42b508 11937->11938 11940 42c252 11939->11940 11944 42c28a 11939->11944 11942 42c25e 11940->11942 11940->11944 11941 42c268 11941->11934 11946 42e87a 11942->11946 11944->11941 11951 42e5da 11944->11951 11947 42e8b2 11946->11947 11950 42e88d 11946->11950 11947->11941 11948 42e87a 5 API calls 11948->11950 11950->11947 11950->11948 11957 42b85e 11950->11957 11952 42e5e4 __EH_prolog 11951->11952 11953 4380a0 4 API calls 11952->11953 11956 42e634 11953->11956 11954 43813c LeaveCriticalSection 11955 42e84a 11954->11955 11955->11944 11956->11954 11958 42c1e3 11957->11958 11959 42e46f 5 API calls 11958->11959 11960 42c1fc 11959->11960 11961 4380a0 4 API calls 11960->11961 11962 42c217 11961->11962 11963 43813c LeaveCriticalSection 11962->11963 11964 42c234 11963->11964 11964->11950 12823 4037b5 12824 416739 12823->12824 12825 417424 NtQueryDefaultLocale 12824->12825 12826 416b17 12824->12826 12830 417b3b 12825->12830 12828 416f82 NtQueryDefaultLocale 12826->12828 12829 416f7a 12828->12829 10926 4079be 10927 407801 10926->10927 10928 407a3e VirtualProtect 10927->10928 10929 407a93 10928->10929 11977 42acbc 11978 42acd7 11977->11978 11980 42acd1 11977->11980 11979 42acfa 11995 42b9f6 11979->11995 11980->11978 11980->11979 11985 42ceff 11980->11985 11984 42ad4b 2 API calls 11984->11978 11986 42cf25 11985->11986 11987 42cf0b GetClientRect 11985->11987 11988 42cf34 11986->11988 11989 42cf3d 11986->11989 11987->11986 12029 42bcc3 11988->12029 11991 42cf3b 11989->11991 12034 430429 11989->12034 11993 42cf5c 11991->11993 12038 42bbbe 11991->12038 11993->11979 11996 42ba08 11995->11996 12020 42ad17 11995->12020 11997 42ba15 11996->11997 11998 42ba2c 11996->11998 12059 42d015 11997->12059 12000 42ba2a 11998->12000 12066 42d06e 11998->12066 12002 42bb53 12000->12002 12005 42ba82 12000->12005 12006 42ba9e 12000->12006 12000->12020 12003 42bb82 12002->12003 12004 42bb58 12002->12004 12008 42bb9c 12003->12008 12105 42d279 CallWindowProcW 12003->12105 12007 42bb6e SetFocus 12004->12007 12004->12020 12072 42d0e4 12005->12072 12010 42baa7 12006->12010 12011 42babe 12006->12011 12007->12020 12008->12020 12111 430328 GetSystemMetrics 12008->12111 12076 42d14d 12010->12076 12012 42bac7 12011->12012 12013 42bade 12011->12013 12092 42d208 12012->12092 12018 42bae6 ReleaseCapture 12013->12018 12019 42baf4 12013->12019 12018->12020 12021 42bb1a 12019->12021 12022 42bafc 12019->12022 12020->11978 12020->11984 12021->12002 12024 42bb22 12021->12024 12023 42cf61 6 API calls 12022->12023 12023->12020 12024->12020 12098 430273 12024->12098 12026 42bb36 12027 42bbbe 5 API calls 12026->12027 12028 42bb3d UpdateWindow 12027->12028 12028->12020 12030 42bccc 12029->12030 12031 42bd13 12030->12031 12032 42bcea MulDiv 12030->12032 12031->11991 12049 42cf61 12032->12049 12035 430430 12034->12035 12036 430467 12035->12036 12037 42cf61 6 API calls 12035->12037 12036->11991 12037->12036 12039 42bbd1 12038->12039 12040 42bc73 12039->12040 12041 42bbf8 12039->12041 12042 42bc75 12039->12042 12040->11993 12043 42bc07 InvalidateRect 12041->12043 12046 42bc16 12041->12046 12042->12040 12044 42bcaf InvalidateRect 12042->12044 12045 42bc8f SetWindowPos 12042->12045 12043->12046 12044->12040 12045->12040 12046->12040 12047 42bc57 InvalidateRect 12046->12047 12048 42bc37 SetWindowPos 12046->12048 12047->12046 12048->12046 12050 42cf6f 12049->12050 12051 42cfe2 12050->12051 12055 4303b8 12050->12055 12052 42d00d 12051->12052 12054 42bbbe 5 API calls 12051->12054 12052->12031 12054->12052 12056 4303c1 12055->12056 12057 4303f3 12056->12057 12058 4303df MulDiv 12056->12058 12057->12051 12058->12051 12060 430328 10 API calls 12059->12060 12061 42d021 12060->12061 12062 42d060 12061->12062 12063 42d026 EnterCriticalSection 12061->12063 12062->12000 12064 42d051 LeaveCriticalSection 12063->12064 12065 42d03a LoadCursorW 12063->12065 12064->12062 12065->12064 12068 42d078 __EH_prolog 12066->12068 12067 42d09f BeginPaint 12120 43018b 12067->12120 12068->12067 12070 42cf61 6 API calls 12068->12070 12070->12067 12071 42d0cb 12071->12000 12073 42d100 12072->12073 12074 42d136 12072->12074 12073->12074 12075 42d107 GetMessagePos ScreenToClient 12073->12075 12074->12020 12075->12074 12077 42d1e1 12076->12077 12078 42d175 GetCapture 12076->12078 12079 42d1f0 SetCursor 12077->12079 12091 42d1df 12077->12091 12078->12077 12080 42d180 12078->12080 12079->12091 12081 42d1c6 12080->12081 12082 42d1ac 12080->12082 12080->12091 12084 430273 8 API calls 12081->12084 12083 42cf61 6 API calls 12082->12083 12085 42d1b7 12083->12085 12086 42d1cd 12084->12086 12087 42d1bb UpdateWindow 12085->12087 12085->12091 12088 42cf61 6 API calls 12086->12088 12087->12091 12089 42d1d8 12088->12089 12090 430273 8 API calls 12089->12090 12090->12091 12091->12020 12093 42d221 12092->12093 12094 42d225 SetCapture SetCursor 12093->12094 12095 42d24f 12093->12095 12094->12095 12096 42d248 12094->12096 12095->12020 12097 430273 8 API calls 12096->12097 12097->12095 12099 43027d __EH_prolog 12098->12099 12100 43029f GetWindowDC 12099->12100 12104 43030d 12099->12104 12140 4318e0 12100->12140 12103 4302d0 SelectObject PatBlt SelectObject DeleteObject 12103->12104 12104->12026 12106 42d2b0 GetMessagePos ScreenToClient 12105->12106 12107 42d2ab 12105->12107 12109 42d2d4 12106->12109 12107->12106 12108 42d2fe 12107->12108 12108->12008 12109->12108 12110 42d2e4 PtInRect 12109->12110 12110->12108 12110->12109 12112 430349 12111->12112 12113 43034c GetWindowLongW 12111->12113 12112->12113 12114 430367 GetSystemMetrics 12113->12114 12115 43037f GetSystemMetrics 12113->12115 12116 430395 SystemParametersInfoW 12114->12116 12115->12116 12117 4303b3 12116->12117 12118 4303ac 12116->12118 12117->12020 12119 42bbbe 5 API calls 12118->12119 12119->12117 12121 430195 __EH_prolog 12120->12121 12122 4301bb 12121->12122 12124 4301e5 12121->12124 12128 4301e2 12121->12128 12129 4319f0 12122->12129 12126 431a51 3 API calls 12124->12126 12124->12128 12125 4301c9 12125->12128 12134 431a51 12125->12134 12126->12128 12128->12071 12130 431a02 12129->12130 12131 431a06 FillRect GetWindowLongW 12130->12131 12132 431a4c 12130->12132 12131->12132 12133 431a30 DrawEdge 12131->12133 12132->12125 12133->12132 12135 431a66 12134->12135 12136 431a6a GetWindowLongW 12135->12136 12137 431aa8 12135->12137 12138 431a85 DrawEdge 12136->12138 12139 431a99 FillRect 12136->12139 12137->12125 12138->12139 12139->12137 12141 4318f2 12140->12141 12141->12141 12142 431909 CreateBitmap 12141->12142 12143 4302ca 12142->12143 12144 431921 CreatePatternBrush DeleteObject 12142->12144 12143->12103 12143->12104 12144->12143

        Control-flow Graph

        APIs
        • NtQueryDefaultLocale.NTDLL(00000001,?), ref: 0041656B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: DefaultLocaleQuery
        • String ID: 6@FF$L$L$R$W$a$a$b$d$i$o$r$r$y
        • API String ID: 2949231068-2404036922
        • Opcode ID: 49a117ec42e6be9d70c53d8c85f8541a0e54a36f076249b0e0ab38ded7a95451
        • Instruction ID: d5ae0920ea012b07947300cbe02f03d75d78b263460189df19597f606348f5fc
        • Opcode Fuzzy Hash: 49a117ec42e6be9d70c53d8c85f8541a0e54a36f076249b0e0ab38ded7a95451
        • Instruction Fuzzy Hash: 43E16CB5D052688BEB20CB14CC90BEAB7B6FB94300F1541EAD44DA7281D7399ED1CF5A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 101 41e397-41e475 106 41ed87-41f176 call 41ee02 call 41f108 101->106 107 41e47b-41e5de call 41e5df 101->107 119 41f189-41f19e 106->119 120 41f178-41f184 106->120 107->106 121 41f1b1-41f1d0 119->121 122 41f1a0-41f1ac 119->122 123 41f47a-41f488 ExitProcess 120->123 124 41f1e3-41f1f5 121->124 125 41f1d2-41f1de 121->125 122->123 127 41f1f7-41f203 124->127 128 41f208-41f271 124->128 125->123 127->123 130 41f277-41f2c1 128->130 131 41f46e-41f474 128->131 132 41f2d2-41f2e3 130->132 131->123 133 41f384-41f3d5 call 41f392 132->133 134 41f2e9-41f2f9 132->134 140 41f3e3-41f43a 133->140 141 41f3d7-41f3e1 133->141 134->133 136 41f2ff-41f374 call 41f32d 134->136 151 41f376 136->151 152 41f37d 136->152 146 41f448 140->146 147 41f43c-41f446 140->147 144 41f452-41f459 141->144 148 41f469 144->148 149 41f45b-41f467 144->149 146->144 147->144 148->123 149->123 151->132 152->133
        APIs
        • ExitProcess.KERNEL32(00000000), ref: 0041F488
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID: L$L$W$a$a$b$d$i$o$r$r$y
        • API String ID: 621844428-4069139063
        • Opcode ID: e79f1a19910d078ddfbbefa0f6b513eb2636e8118e2c895131a6048afb768943
        • Instruction ID: 49179e029358c601d47194dacace062c049735f8aecbd42803199bba024e841f
        • Opcode Fuzzy Hash: e79f1a19910d078ddfbbefa0f6b513eb2636e8118e2c895131a6048afb768943
        • Instruction Fuzzy Hash: 188108B1E096689AF720CB24CC447DA7B75EF51304F1480FAD84D57282D67A8FC68F66

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 154 406ebe-406ec9 155 406ecb-406f07 154->155 156 406f0c-406f6a 154->156 157 407a34-407a91 call 407a48 VirtualProtect 155->157 162 406f6c-406f78 156->162 163 406f7d-406f92 156->163 164 407a93-407ad1 call 407aa7 157->164 165 407ad9-407ae5 157->165 166 40726e-407275 162->166 167 406f94-406fa0 163->167 168 406fa5-406fc4 163->168 164->165 170 407af6-407b50 165->170 173 407349-407a2e 166->173 174 40727b-4072c6 call 4072c9 166->174 167->166 171 406fc6-406fd2 168->171 172 406fd7-406fe9 168->172 171->166 178 406feb-406ff7 172->178 179 406ffc-407065 172->179 173->157 178->166 187 407262-407268 179->187 188 40706b-4070b5 179->188 187->166 192 4070c6-4070d7 188->192 196 407178-4071c9 192->196 197 4070dd-4070ed 192->197 208 4071d7-40722e 196->208 209 4071cb-4071d5 196->209 197->196 200 4070f3-407144 call 407100 call 407121 197->200 217 407146-407168 200->217 218 40716a 200->218 211 407230-40723a 208->211 212 40723c 208->212 213 407246-40724d 209->213 211->213 212->213 215 40725d 213->215 216 40724f-40725b 213->216 215->187 216->166 217->218 219 407171 217->219 218->192 219->196
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: a08cf8bb7cd2ddb8e3db18e3285b1c5efe6b94d46a05dd2cc52c5cfee547a24a
        • Instruction ID: f9d7f76e105ba9ec23288e54f2168d33306c1fdfaa71867662fccb09afdb378b
        • Opcode Fuzzy Hash: a08cf8bb7cd2ddb8e3db18e3285b1c5efe6b94d46a05dd2cc52c5cfee547a24a
        • Instruction Fuzzy Hash: 9AF140B1D092289FEB24CA14DC90AEA77B5FB84315F1441FAD80DA6381D6396FC2CF56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 221 407639-407678 call 40764e 224 40768a 221->224 225 40767a-407684 221->225 227 407694-407a91 call 407a48 VirtualProtect 224->227 225->224 226 407455-40762a call 407483 call 4074c6 225->226 226->227 244 407a93-407ad1 call 407aa7 227->244 245 407ad9-407ae5 227->245 244->245 248 407af6-407b50 245->248
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 1499177d04bdb0b7de258b5a9adcbce1dba7413f00b3c56ee1a7d0f1be14552c
        • Instruction ID: ff19a6a794caca9f36b485849c86c3e98ebfbdd90ea5acac48a41dba6744c2bd
        • Opcode Fuzzy Hash: 1499177d04bdb0b7de258b5a9adcbce1dba7413f00b3c56ee1a7d0f1be14552c
        • Instruction Fuzzy Hash: B491B3B1D091289FE7248B14DC95AFB7779FB84310F1481FAD80EA6640E6396FC2CE56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 259 40745e-407a91 call 407483 call 4074c6 call 407a48 VirtualProtect 282 407a93-407ad1 call 407aa7 259->282 283 407ad9-407ae5 259->283 282->283 285 407af6-407b50 283->285
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: H
        • API String ID: 0-2852464175
        • Opcode ID: 971599d62c420ffd857181e2df79501690e941cc3b263029244f33c74aa9cc1d
        • Instruction ID: d0bd618aa4abcdc725c8c0843f41bb372d76ea4ad1b638039c3cef773761e815
        • Opcode Fuzzy Hash: 971599d62c420ffd857181e2df79501690e941cc3b263029244f33c74aa9cc1d
        • Instruction Fuzzy Hash: 5C8193B1D052289FE7248B14DC91AFB7779FB84310F1481FAD80DA6640E6396FC2DE56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 292 41616c-4161a6 293 4161b8-416252 call 4161e4 call 416218 call 416231 292->293 294 4161a8-4161b2 292->294 313 416265-41627a 293->313 314 416254-416260 293->314 294->293 295 415f6e-416084 call 415f87 call 415f96 call 415fe8 call 415ffb call 41606a call 416087 294->295 316 41628d-4162ac 313->316 317 41627c-416288 313->317 318 416556-416573 NtQueryDefaultLocale 314->318 320 4162bf-4162d1 316->320 321 4162ae-4162ba 316->321 317->318 326 416579-4165cc 318->326 327 41673b-416b11 call 41674b call 416763 call 416b06 318->327 324 4162d3-4162df 320->324 325 4162e4-41634d 320->325 321->318 324->318 333 416353-41639d 325->333 334 41654a-416550 325->334 339 4165dd-416602 326->339 371 417424-417b35 NtQueryDefaultLocale 327->371 372 416b17-416f80 call 416bc3 call 416f82 327->372 338 4163ae-4163bf 333->338 334->318 342 416460-416472 call 416473 338->342 343 4163c5-4163d5 338->343 350 416604-41660d 339->350 351 41660f 339->351 342->334 343->342 349 4163db-41642c 343->349 357 416452 349->357 358 41642e-416450 349->358 356 41663e-416673 call 41666c 350->356 355 4165ce-4165d7 351->355 351->356 355->339 357->338 358->357 360 416459 358->360 360->342 387 417b3b-417bc0 call 417b5a 371->387 388 417d2e-417da5 call 417d3d call 417d5c 371->388 404 417bd1-417bdd 387->404 403 417db6-417ddc 388->403 411 417de9 403->411 412 417dde-417e49 call 417e29 call 417e3e 403->412 406 417c05-417c2f 404->406 407 417bdf-417bf6 404->407 410 417c32-417c51 call 417c52 406->410 408 417c03 407->408 409 417bf8-417c01 407->409 408->404 409->410 411->403
        APIs
        • NtQueryDefaultLocale.NTDLL(00000001,?), ref: 0041656B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: DefaultLocaleQuery
        • String ID: CHBN
        • API String ID: 2949231068-2236069287
        • Opcode ID: b2f523e7b804df57e6ed936d313a9a0c5eca27da16a78216aca96fd30fe003f9
        • Instruction ID: 04d73ac622c8c4df271df2face53621d1108fa9b226eeb702b577e7dfd4595f9
        • Opcode Fuzzy Hash: b2f523e7b804df57e6ed936d313a9a0c5eca27da16a78216aca96fd30fe003f9
        • Instruction Fuzzy Hash: 2D91EFB2E056648FEB208B25DC507EAB771FF90304F1540EAD84DA7381E2789AD1CF5A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 485 407801-40786f 487 407880-407891 485->487 488 407932-407983 487->488 489 407897-4078a7 487->489 497 407991-4079e8 488->497 498 407985-40798f 488->498 489->488 490 4078ad-4078fe 489->490 492 407900-407922 490->492 493 407924 490->493 492->493 495 40792b 492->495 493->487 495->488 501 4079f6 497->501 502 4079ea-4079f4 497->502 499 407a00-407a07 498->499 503 407a17 499->503 504 407a09-407a91 call 407a48 VirtualProtect 499->504 501->499 502->499 503->485 509 407a93-407ad1 call 407aa7 504->509 510 407ad9-407ae5 504->510 509->510 512 407af6-407b50 510->512
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 17f315cc95e151f82c3b473b692960eb13991f7c5bbb63149c606de0d2d103d1
        • Instruction ID: 30b0aacf52a8e76521650779860081edab429cad673e273aa3984f156d36a9ad
        • Opcode Fuzzy Hash: 17f315cc95e151f82c3b473b692960eb13991f7c5bbb63149c606de0d2d103d1
        • Instruction Fuzzy Hash: D08184B0D091689FEB24CB14CC90AEEB7B5EB85315F1481FAD80E66281D6397F81CF56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 519 4072c9-407306 521 407308-407344 519->521 522 407349-407a2e 519->522 525 407a34-407a91 call 407a48 VirtualProtect 521->525 522->525 531 407a93-407ad1 call 407aa7 525->531 532 407ad9-407ae5 525->532 531->532 535 407af6-407b50 532->535
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 98d5a846181471a45dc11672bd8f83c0911fca266973cbffe948b0cca086c95d
        • Instruction ID: 610ab468b58192c3189706f6687b98f4dbe9cd49af046ab5ee6ff6639577a70c
        • Opcode Fuzzy Hash: 98d5a846181471a45dc11672bd8f83c0911fca266973cbffe948b0cca086c95d
        • Instruction Fuzzy Hash: AA71C8F2D05225AFF7148A14DC95AEB7778EB80310F1441FAD80DA6280D63D6FC68E97

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 544 4074dd-407a91 call 407a48 VirtualProtect 558 407a93-407ad1 call 407aa7 544->558 559 407ad9-407ae5 544->559 558->559 561 407af6-407b50 559->561
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: a14e6f918cefa51a6cd2096712322b0ca075e8dc4ebb32e45b8619b6473020dc
        • Instruction ID: 1c3fdb83f76fd4713bf4ac7fb4d6521306fd84a6beb700205a5a101a1e7f4e85
        • Opcode Fuzzy Hash: a14e6f918cefa51a6cd2096712322b0ca075e8dc4ebb32e45b8619b6473020dc
        • Instruction Fuzzy Hash: 3961A4B1D091299FE7248B14DC90AFB7778EB84310F1481FAD80DA6680E6396FC2DF56
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8b74ed3697608e9d9680f3a16b73e633387e8aa4e3c2394a282703c425610ef2
        • Instruction ID: 13e48e2b5fcf3385ba1db89c52148cac321fc759d0082e9ff8c951c1f028f19d
        • Opcode Fuzzy Hash: 8b74ed3697608e9d9680f3a16b73e633387e8aa4e3c2394a282703c425610ef2
        • Instruction Fuzzy Hash: 9132BDB1E046688FEB248B14DC94BEAB7B5FF85304F1441EAD84DA6280E7385ED1CF56
        APIs
        • NtQueryDefaultLocale.NTDLL(00000000,?), ref: 00417B2D
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: DefaultLocaleQuery
        • String ID:
        • API String ID: 2949231068-0
        • Opcode ID: d23aecb0fb5311833bc28086b1c90d52e6342863050b6acf700b07f89787beeb
        • Instruction ID: df600775225a6817876abde58dfde50fa76c99a76918264543c8ecb8572ef3d8
        • Opcode Fuzzy Hash: d23aecb0fb5311833bc28086b1c90d52e6342863050b6acf700b07f89787beeb
        • Instruction Fuzzy Hash: C6F19DB1D081289BEB24CA14DD54BEBBBB5EB85311F1481EAD80E62780D7395FC2CE56
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5ee8d9896f4ecf9f7bea1daa69362319a6e2796517543bf7c43944efe203e9df
        • Instruction ID: 9402d941ed495bfb9d6ed6a04fa52e9281188681cbf316ddffb0d21103877390
        • Opcode Fuzzy Hash: 5ee8d9896f4ecf9f7bea1daa69362319a6e2796517543bf7c43944efe203e9df
        • Instruction Fuzzy Hash: EFB192B5E042688FEB24CF25CC94BEABB75AB85314F1441EAD84D67341DA396EC2CF44
        APIs
        • NtQueryDefaultLocale.NTDLL(00000001,?), ref: 0041656B
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: DefaultLocaleQuery
        • String ID:
        • API String ID: 2949231068-0
        • Opcode ID: 85b42d9292f86df5e44036e3a8ff8d6731a36614fcd0537ad636c032b0d5548e
        • Instruction ID: 3a36954a66d454c42916218c4210eab62e27d3a9c54c485993be85de79f8367a
        • Opcode Fuzzy Hash: 85b42d9292f86df5e44036e3a8ff8d6731a36614fcd0537ad636c032b0d5548e
        • Instruction Fuzzy Hash: 1D8104B1E056648BEB208B25CC507EAB771FF90305F1544EAD84DA6381E3789ED1CF16
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-0
        • Opcode ID: e1c4b1d18263297bba4ed9b19f6d9cce977bc7d2f0cde00f20d14f931fd392e7
        • Instruction ID: 072424375afe5719ce0ed9bd983d6f87274ebe52f5c45c9e506659b2f7d4e5c1
        • Opcode Fuzzy Hash: e1c4b1d18263297bba4ed9b19f6d9cce977bc7d2f0cde00f20d14f931fd392e7
        • Instruction Fuzzy Hash: 8471DEB2C052298BEB248B20DD54BFAB779FF84310F0481FAD80DA6281D6794EC2DF55
        APIs
        • NtQueryDefaultLocale.NTDLL(00000001,?), ref: 0041656B
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: DefaultLocaleQuery
        • String ID:
        • API String ID: 2949231068-0
        • Opcode ID: 75da59268204de599cf2586ca18f7f196409d44e5bc3e2f90d5b665346992c1f
        • Instruction ID: 853808276b5e699154ab914f1fb5dc5320e0742362ee59ffdd4d7813341c293c
        • Opcode Fuzzy Hash: 75da59268204de599cf2586ca18f7f196409d44e5bc3e2f90d5b665346992c1f
        • Instruction Fuzzy Hash: 204108B2D06564DAEB208B14DC54BEA77B2AB50311F1641FBD80E52284E7389ED1CE0A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 423 40759c-4075ac 424 4074b1-407587 call 4074c6 423->424 425 4075b2-4075bf 423->425 431 4075e3-407a91 call 407a48 VirtualProtect 424->431 426 4075c1-4075cb 425->426 427 4075cd 425->427 429 4075d7-4075dd 426->429 427->429 429->431 446 407a93-407ad1 call 407aa7 431->446 447 407ad9-407ae5 431->447 446->447 449 407af6-407b50 447->449
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: H
        • API String ID: 0-2852464175
        • Opcode ID: f9fd11e66a84a254f599fc0ffb9e93a0d8e6a408dfa821dbeb128120272c5d36
        • Instruction ID: 4e8a0a1bd5a253ca80542a41813d2f0dc9e9d6d315fe07cb04aec797d4c8eb46
        • Opcode Fuzzy Hash: f9fd11e66a84a254f599fc0ffb9e93a0d8e6a408dfa821dbeb128120272c5d36
        • Instruction Fuzzy Hash: 0581D5B1D091299EE7248B14DC90AFB7774FF84310F1081FAE80DA6680E6396FC2DE56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 456 4074aa-407a91 call 4074c6 call 407a48 VirtualProtect 475 407a93-407ad1 call 407aa7 456->475 476 407ad9-407ae5 456->476 475->476 478 407af6-407b50 476->478
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: H
        • API String ID: 0-2852464175
        • Opcode ID: 86eb16e4e543703e8d4f0e386f813d8a62f634e5ddba1fbe2cef4de7436b48b3
        • Instruction ID: 7266076c22d33dbcd3d460919e61438b02f46b0ba71f1cd36bc3dae2c6948d68
        • Opcode Fuzzy Hash: 86eb16e4e543703e8d4f0e386f813d8a62f634e5ddba1fbe2cef4de7436b48b3
        • Instruction Fuzzy Hash: 3471A3B1D091299FE7248A14DC91AFB7778FF84310F1481FAE80D66680E6396FC29E56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 568 41f108-41f176 570 41f189-41f19e 568->570 571 41f178-41f184 568->571 572 41f1b1-41f1d0 570->572 573 41f1a0-41f1ac 570->573 574 41f47a-41f488 ExitProcess 571->574 575 41f1e3-41f1f5 572->575 576 41f1d2-41f1de 572->576 573->574 578 41f1f7-41f203 575->578 579 41f208-41f271 575->579 576->574 578->574 581 41f277-41f2c1 579->581 582 41f46e-41f474 579->582 583 41f2d2-41f2e3 581->583 582->574 584 41f384-41f3d5 call 41f392 583->584 585 41f2e9-41f2f9 583->585 591 41f3e3-41f43a 584->591 592 41f3d7-41f3e1 584->592 585->584 587 41f2ff-41f374 call 41f32d 585->587 602 41f376 587->602 603 41f37d 587->603 597 41f448 591->597 598 41f43c-41f446 591->598 595 41f452-41f459 592->595 599 41f469 595->599 600 41f45b-41f467 595->600 597->595 598->595 599->574 600->574 602->583 603->584
        APIs
        • ExitProcess.KERNEL32(00000000), ref: 0041F488
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-399585960
        • Opcode ID: 8002f9402aba40aafd2fba85f5b281f473503177a592bfb786efc3e854b775e8
        • Instruction ID: 0b4824487f3c728ee9c662490b723a58eb1aa87252caefc7b5d42a3b4197818a
        • Opcode Fuzzy Hash: 8002f9402aba40aafd2fba85f5b281f473503177a592bfb786efc3e854b775e8
        • Instruction Fuzzy Hash: 537116B4E052289BDB24CF04CC80BEAB7B2BB94304F1481EAD90D67351D735AED68F95

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 605 407613-407a91 call 407a48 VirtualProtect 615 407a93-407ad1 call 407aa7 605->615 616 407ad9-407ae5 605->616 615->616 618 407af6-407b50 616->618
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 6015b82533b7f610c2c73a979d6fea363be3760dabb677e4999851231bf80c8d
        • Instruction ID: b417e04b3d9ddb8d06de6a12b714577bfda655022e7d1f97473579596280aab9
        • Opcode Fuzzy Hash: 6015b82533b7f610c2c73a979d6fea363be3760dabb677e4999851231bf80c8d
        • Instruction Fuzzy Hash: 0941B5F1D091289FE714CA14DC90AEB7778EB81310F1441FAD80DA6281E63D6FC29E97

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 625 407444-407a91 call 407a48 VirtualProtect 635 407a93-407ad1 call 407aa7 625->635 636 407ad9-407ae5 625->636 635->636 638 407af6-407b50 636->638
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: d5c29f456008fc39e03b5a3a81da9088eb27dc3b49f6f580f9445385e0e1a6dc
        • Instruction ID: af48dcd4f2a87e001c4b46b9f46951c050cf013d36c329360d614cdb825f8f8e
        • Opcode Fuzzy Hash: d5c29f456008fc39e03b5a3a81da9088eb27dc3b49f6f580f9445385e0e1a6dc
        • Instruction Fuzzy Hash: 9941A6B1D091249FE7148A14DC90AEB7778EB81314F1441FAE90D66281E63D7FC29E57

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 645 40769b-407a91 call 407a48 VirtualProtect 653 407a93-407ad1 call 407aa7 645->653 654 407ad9-407ae5 645->654 653->654 656 407af6-407b50 654->656
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: dec1911309d4a842ab4f1626ab04342edd648cdcc954b2feb7ceeac58d20b615
        • Instruction ID: e8ccf5d480e83ec867e754c98d6c853492001177e50d87dc0211a3c396fe67a2
        • Opcode Fuzzy Hash: dec1911309d4a842ab4f1626ab04342edd648cdcc954b2feb7ceeac58d20b615
        • Instruction Fuzzy Hash: A541C6B1D091689FEB14CA14DC90AEB7778EB80314F1441FAE80DA6241E6397FC2DF96
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 4447908ef74ba9905ddc4a311aa98b489c35001bd9e4064aa4f77981129bc740
        • Instruction ID: 73efcb83b2863d4cf423dd5588cc10b36a13336c3ad767a7a79311ff9b8be201
        • Opcode Fuzzy Hash: 4447908ef74ba9905ddc4a311aa98b489c35001bd9e4064aa4f77981129bc740
        • Instruction Fuzzy Hash: 0541B6B1D051289FEB14CA14DC90AEB7778EB80314F1441FAE90D66240E6396FC2DE92
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: ac1ac4bb0b4ca1cb5d5645629d8f26322a3a00166c50e7650a9324f8d491c348
        • Instruction ID: 277bed2a504a2796f184e30173585ece7987f9d763c9e763ae497bc256b0d4e6
        • Opcode Fuzzy Hash: ac1ac4bb0b4ca1cb5d5645629d8f26322a3a00166c50e7650a9324f8d491c348
        • Instruction Fuzzy Hash: E44126B1D0A1586FE7148A14DC91AEB7778EB41310F1441FAE80DA1281E639BF828F63
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 1f91561356005e667435b17a819342285c020b18c1ecc7bcc787f064c1a18858
        • Instruction ID: 8be0473e92fddc4f14d80ce078066611cd9bafe221272112a10b665520aacd60
        • Opcode Fuzzy Hash: 1f91561356005e667435b17a819342285c020b18c1ecc7bcc787f064c1a18858
        • Instruction Fuzzy Hash: C541D3B0E092699FEB24CB14DC90AEE77B8EF41304F1441EAD80DA6241D6397F82DF56
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 6678ca18948b46d413ad09823ee6d94edf0c567ea9bb93316525c19f977e043d
        • Instruction ID: 60a2621da1b56ab119aa25e709ee37b68f17acee351728cc11af7046f9681cc3
        • Opcode Fuzzy Hash: 6678ca18948b46d413ad09823ee6d94edf0c567ea9bb93316525c19f977e043d
        • Instruction Fuzzy Hash: BD41B2B1E091699FEB24CA14DC90AEE77B4EB41305F1081FAD80EA6241E6397F81CF56
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: f03273828f681186c8950a68f284f06bd2f3a25c5cd7a0f2d890186ba70f2ada
        • Instruction ID: 960d91b94dab4f106e6928c9ddb03575bf937047b650a9051660eff6727b19b7
        • Opcode Fuzzy Hash: f03273828f681186c8950a68f284f06bd2f3a25c5cd7a0f2d890186ba70f2ada
        • Instruction Fuzzy Hash: CF41A3B1E091699FEB24CA14DC90AEE77B4EB81315F1081FAD80DA6281D6397F81CF56
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 61b2760506ec70c5ec84ad93d298fe7fb3076edec4bce2cc3c2e18d5e514af9b
        • Instruction ID: 92d0103eb18a1e76b5481516b90cfa86c3549c03294cb060e38f0e120bc04a60
        • Opcode Fuzzy Hash: 61b2760506ec70c5ec84ad93d298fe7fb3076edec4bce2cc3c2e18d5e514af9b
        • Instruction Fuzzy Hash: DF31D4B1D0A158AFEB14CA14DC91AEB7778EB45310F1441FAE80DA6241E6397F828F57
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 97201ee44a25bcd450d0e1f4cde20caf39a827bae7579ad191896343caec7c82
        • Instruction ID: 7d1c454c5b950b1e57697d63005640282dfeaf72a4e15ddf7828b6cb7fc4dc5e
        • Opcode Fuzzy Hash: 97201ee44a25bcd450d0e1f4cde20caf39a827bae7579ad191896343caec7c82
        • Instruction Fuzzy Hash: 3C31D6B1E0A2199FEB24CA14DC90AEA7778FF40300F1041FAE90DA6241E6397F81DF56
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 449bc52b915bf145490852db6d0f2f93bb2d7ba8236e070378f01086d075cd6e
        • Instruction ID: 2846fa902ca4226644e8a2f555184b2706cb79ca6f5f8dce94dc74bf5cb8b9e1
        • Opcode Fuzzy Hash: 449bc52b915bf145490852db6d0f2f93bb2d7ba8236e070378f01086d075cd6e
        • Instruction Fuzzy Hash: 1631D8B1D0A1199FEB24CA14DC90AEA7778FF40300F1041FAE90DA6241D6397F81DF56
        APIs
        • VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: H
        • API String ID: 544645111-2852464175
        • Opcode ID: 4fcdc64351e8df6c23ced275e42695f717f6d10942deda2d7e8f7d0b4153137e
        • Instruction ID: 193d8c63bde9533668196809bbe6eb9e6b26840c109239b67e8259f3b6349b66
        • Opcode Fuzzy Hash: 4fcdc64351e8df6c23ced275e42695f717f6d10942deda2d7e8f7d0b4153137e
        • Instruction Fuzzy Hash: DC31C7B1D0A1199FEB24CA14DC90AEA7778FB40300F1041FAE90D66241D6397F81DF56
        APIs
        • ExitProcess.KERNEL32(00000000), ref: 0041F488
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-0
        • Opcode ID: a7c34388d5c1b6b4368e11ce4884d358167a177d668945abd098b4c01b585d05
        • Instruction ID: 3a3b27fcdc6e0e9487cf4a583e364f49f90c56feb2a2619b3bad8aa9e4db4507
        • Opcode Fuzzy Hash: a7c34388d5c1b6b4368e11ce4884d358167a177d668945abd098b4c01b585d05
        • Instruction Fuzzy Hash: 9A41E4F1D082649BE721CB25CC40AEBBB75AF95310F1441FBD84D56242D2399EC68F51
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6dccea7a367e3dc70280df16af602df9db468873541c93d05aa68d785749eb70
        • Instruction ID: ffe6de3eec2d126d21a28da204ff4b36b96a5810d9efcfb99902ccff63e2b5fa
        • Opcode Fuzzy Hash: 6dccea7a367e3dc70280df16af602df9db468873541c93d05aa68d785749eb70
        • Instruction Fuzzy Hash: 4A31A07090556C8BDB24CA14CC94BFEB771AF82306F1881FBD95956241D6385ECA8E85
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-0
        • Opcode ID: 1a6693ac9e61a8bf3d39731885ba805fe6780daa38466a2a15a68fe5a79f8265
        • Instruction ID: c81233945c9861f4815f9eb02bc9d9685d192c67d303bc9ea4503e520eacb760
        • Opcode Fuzzy Hash: 1a6693ac9e61a8bf3d39731885ba805fe6780daa38466a2a15a68fe5a79f8265
        • Instruction Fuzzy Hash: 0E21C3B1D082249FE710CA21CC84BEAB774EB85310F1480FAD84D6B242D6399EC78F52
        APIs
        • ExitProcess.KERNEL32(00000000), ref: 0041F488
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-0
        • Opcode ID: 948669ceeb7d593b52a6a9867f3915be6aea56f4e9a1b7b9df9b584f26a3f62b
        • Instruction ID: 55d4853ac3aa8a7145631c2a201c474dcb17500aa77c7843a2b4a3a38e4c882e
        • Opcode Fuzzy Hash: 948669ceeb7d593b52a6a9867f3915be6aea56f4e9a1b7b9df9b584f26a3f62b
        • Instruction Fuzzy Hash: BF21A171E055288AF7308A15CC44BFFB7B5BB81316F1481FBD85D16280D6785EC68E86
        APIs
        • ExitProcess.KERNEL32(00000000), ref: 0041F488
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-0
        • Opcode ID: caf6c0e6217912197b0ebe9eb745821d919d6ec91bcfdb22834cee2722bbc0f4
        • Instruction ID: b4fca4cc9ec6f815d32bb83eadcd98ccf7ba7e03b08137156071876ef69c00c9
        • Opcode Fuzzy Hash: caf6c0e6217912197b0ebe9eb745821d919d6ec91bcfdb22834cee2722bbc0f4
        • Instruction Fuzzy Hash: EBF02BF6D586859DF3900226EC8ABFE3A18EBD1324F2444A3D84E5404283BD4DC75917
        APIs
        • ExitProcess.KERNEL32(00000000), ref: 0041F488
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ExitProcess
        • String ID:
        • API String ID: 621844428-0
        • Opcode ID: 31838ce29b33f74e7019effa3b6e287278325d4490a9d986535c6a7e2179b1c1
        • Instruction ID: 4be4bd858b879d0d19ee76e687e38f06f510cffb33485c6eeb26029f097084e7
        • Opcode Fuzzy Hash: 31838ce29b33f74e7019effa3b6e287278325d4490a9d986535c6a7e2179b1c1
        • Instruction Fuzzy Hash: 44D012F5C0804595F2144A01FD067BA21789B05705F24417BE44B14180956A1DC71D57
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: E$P$c$e$i$o$r$s$s$t$x
        • API String ID: 0-3128998556
        • Opcode ID: fac42b0b9a34db9555197cc561fed94994c518efbb238c4f9bfd77243e9fb354
        • Instruction ID: d0ace87170fddc32e34cccd2ed46240b8afc2ca99b5f74f66e11354aa27d436a
        • Opcode Fuzzy Hash: fac42b0b9a34db9555197cc561fed94994c518efbb238c4f9bfd77243e9fb354
        • Instruction Fuzzy Hash: 1BB135A2C085649FF7248A24EC98BEA7B75FB90300F1442F9D44EAB280D67D5FD18F61
        APIs
        • OpenClipboard.USER32(00000000), ref: 00433F17
        • RegisterClipboardFormatW.USER32(Shell IDList Array), ref: 00433F36
        • GetClipboardData.USER32 ref: 00433F47
        • GlobalLock.KERNEL32(00000000), ref: 00433F52
        • CloseClipboard.USER32 ref: 00433F8B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Clipboard$CloseDataFormatGlobalLockOpenRegister
        • String ID: 4AD$Shell IDList Array
        • API String ID: 1151311956-2489082455
        • Opcode ID: 48519a98ff51355961bb7effbf8569a47d7a7025d9368877acad64ed744704c4
        • Instruction ID: 3f644c05e47439fdc23d2c824a1c84af3f17edb4169f705e82ac8151b23e47f1
        • Opcode Fuzzy Hash: 48519a98ff51355961bb7effbf8569a47d7a7025d9368877acad64ed744704c4
        • Instruction Fuzzy Hash: D2019231704204ABDB109F25EC49B6A3BA8EF0875AF04543DFC45EB2A0DB79DA40CB5C
        APIs
          • Part of subcall function 0042666F: UnhookWindowsHookEx.USER32(?), ref: 00426679
        • GetModuleHandleW.KERNEL32(00000000), ref: 00426616
        • SetWindowsHookExW.USER32(0000000D,0041ED8B,00000000,00000000), ref: 00426625
        • GetLastError.KERNEL32 ref: 00426634
        • FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,?,00000000,00000000), ref: 00426648
        • MessageBoxW.USER32(00000000,?,Error hooking keyboard,00000010), ref: 0042665D
        • LocalFree.KERNEL32(?), ref: 00426666
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: HookMessageWindows$ErrorFormatFreeHandleLastLocalModuleUnhook
        • String ID: Error hooking keyboard
        • API String ID: 3539256350-2780107085
        • Opcode ID: fba2087d46c83467c84a28cd1e6aaa1c58a2a6ec1ea7a2086610efa25594ff7a
        • Instruction ID: f5ea2c017abb1ba6b0e2630cac6da38f566bcf030e92f02af746c3b95a68221d
        • Opcode Fuzzy Hash: fba2087d46c83467c84a28cd1e6aaa1c58a2a6ec1ea7a2086610efa25594ff7a
        • Instruction Fuzzy Hash: AEF09672501130FBDB201BA1AC4DEEF3E6DEF09751F101026F506A0091DBB45940EBF8
        APIs
        • GetLocaleInfoW.KERNEL32(00000400,7123456,00000000,000001F3), ref: 00432790
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: InfoLocale
        • String ID: 2$3$4$5$6$7123456
        • API String ID: 2299586839-3626163788
        • Opcode ID: 4da3740a6d9d69a3e11bd58766d14d6da9d5a0c6efc4164ef08d50fbd1901268
        • Instruction ID: df135c90cf4fd96ecc2958faa78990d9e9a54762d9a1c2938bb780a1a1e2f662
        • Opcode Fuzzy Hash: 4da3740a6d9d69a3e11bd58766d14d6da9d5a0c6efc4164ef08d50fbd1901268
        • Instruction Fuzzy Hash: 03014BB1800209EBEF11CF88C9497EEBBB8BB04348F504069A700BB2C0D7B95B4ACF54
        APIs
        • GetLocaleInfoW.KERNEL32(00000400,0*+,-./,00000000,000001F3), ref: 0043281C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: InfoLocale
        • String ID: +$,$-$.$/$0*+,-./
        • API String ID: 2299586839-396296672
        • Opcode ID: 5ca085d7eb37483b56b1ad4c0e2bd3df6a5eb46fe1b38734cf8d6047dd07eeff
        • Instruction ID: 182194e9b7aa74f1834d65153d6b30cc8a34f0bf16cbddff9d07cac1a8773447
        • Opcode Fuzzy Hash: 5ca085d7eb37483b56b1ad4c0e2bd3df6a5eb46fe1b38734cf8d6047dd07eeff
        • Instruction Fuzzy Hash: 06014BB5900209ABEF10DF98D9497EEBBB4BB04308F104069E700B72C0D7B95A4ACF58
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: $ $ $ $R$R$Z$Z
        • API String ID: 0-1123633900
        • Opcode ID: 88d95301f31a3f2d1ac066832d38047e6eca74c7e85de6611da3cf95abc830b9
        • Instruction ID: 0aa3e5cf93b86c8bf9c708f3687d348dc8937b572e33e8e33403907fd9fc1d08
        • Opcode Fuzzy Hash: 88d95301f31a3f2d1ac066832d38047e6eca74c7e85de6611da3cf95abc830b9
        • Instruction Fuzzy Hash: 3D6159E2C082555FF720C638DC84BEB7B68EBD1318F0841BAD84D666C1C73D5BC58A62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: $ $ $ $R$R$Z$Z
        • API String ID: 0-1123633900
        • Opcode ID: 1823fc6854f9887763c4a800522b0609b5583cf8a0d032699d89ce2a1922d650
        • Instruction ID: 38492d2f8ba99f7311084cf982407855f2863f9a99877e6bc574de0e46fa5f5e
        • Opcode Fuzzy Hash: 1823fc6854f9887763c4a800522b0609b5583cf8a0d032699d89ce2a1922d650
        • Instruction Fuzzy Hash: 12515CE2C082955AF7248638DC84BEB7F6CDBD1318F0841FAD84D666C1C77D4BC58A62
        APIs
        • IsWindow.USER32(?), ref: 004324EA
        • GetKeyboardState.USER32(?), ref: 0043251A
        • keybd_event.USER32(00000012,00000000,00000001,00000000), ref: 00432535
        • SetForegroundWindow.USER32(?), ref: 0043253A
        • GetKeyboardState.USER32(?), ref: 00432547
        • keybd_event.USER32(00000012,00000000,00000003,00000000), ref: 0043255D
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: KeyboardStateWindowkeybd_event$Foreground
        • String ID:
        • API String ID: 3738427976-0
        • Opcode ID: 2c72c861c302e1139b07c97f33455dde5ae2a2ab37e195d2adcee556ea12027a
        • Instruction ID: 94379a26eef160f79566083ef4e3578c49d00e1bcfa1839136e3bbe5105c761c
        • Opcode Fuzzy Hash: 2c72c861c302e1139b07c97f33455dde5ae2a2ab37e195d2adcee556ea12027a
        • Instruction Fuzzy Hash: 1E01B131A002AD7EEF219B74DD44BAB3B6CAB48754F0010B6EA44F21D1D7B09F418E68
        APIs
        • LoadLibraryW.KERNEL32(USER32.DLL), ref: 00434390
        • GetProcAddress.KERNEL32(?,VkKeyScanW), ref: 004343AD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: AddressLibraryLoadProc
        • String ID: USER32.DLL$VkKeyScanW$yScanW
        • API String ID: 2574300362-2509131655
        • Opcode ID: f33a238c0a0008be8fa80d9092039b86b37356b8e18231454f539763cbe0bda6
        • Instruction ID: 00ef8408c9c2cd366938f6668c4c85d73a7131af4500c8c6c3acde0d2035717b
        • Opcode Fuzzy Hash: f33a238c0a0008be8fa80d9092039b86b37356b8e18231454f539763cbe0bda6
        • Instruction Fuzzy Hash: F3018030908388EEEB5197B4D80938E7FF19B15308F0480ECD44467292D3FA5658DF69
        APIs
        • __EH_prolog.LIBCMT ref: 0042183D
        • GetLocalTime.KERNEL32(00000002,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0042184E
          • Part of subcall function 00424156: __EH_prolog.LIBCMT ref: 0042415B
          • Part of subcall function 00424156: GetLocalTime.KERNEL32(?), ref: 0042416C
          • Part of subcall function 00424156: CopyFileW.KERNEL32(?,00000000,?,00000000,?,?,0048039C,00000000,00445508), ref: 00424207
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: H_prologLocalTime$CopyFile
        • String ID: last_backup
        • API String ID: 2992466287-3052884854
        • Opcode ID: 4e366ab625fe2227e8f56ac358aab6d24cbada234cdc05f17cb09aebade897a5
        • Instruction ID: a8900d9fa8d7d7e32f2f801e5830e3db12106511594fc8e929056427879ad994
        • Opcode Fuzzy Hash: 4e366ab625fe2227e8f56ac358aab6d24cbada234cdc05f17cb09aebade897a5
        • Instruction Fuzzy Hash: 8A01C671E005289ACB24B774AD969BD7364EF94744B50043FE811F22D2E67C8908D69C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 746d9dbff825a11e5d2fd0b20203336b79e02ee28d8751de777115ee141e0c10
        • Instruction ID: 21a550dcec8553acabf3a8883d983f30dac81b34ad3e10e028777a423c811b86
        • Opcode Fuzzy Hash: 746d9dbff825a11e5d2fd0b20203336b79e02ee28d8751de777115ee141e0c10
        • Instruction Fuzzy Hash: C3B116B2D002145FF728CB24DD99AEABBB8EB91308F0481FFE4096A1C5D7795B85CE41
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 79f31982a9b9237349f68f421025788475a8ba66ec951ccd8b76a1cab808e826
        • Instruction ID: 8ee75d24b1d4be626e4064a8d2bcb432974b3c9d83f1186e2f339f1e650b54a4
        • Opcode Fuzzy Hash: 79f31982a9b9237349f68f421025788475a8ba66ec951ccd8b76a1cab808e826
        • Instruction Fuzzy Hash: B8A106B2D002145FF728CB24DD8AAEABBB8EB91304F0481BFD50D6A5C4D7795B85CE52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: fe479619bb1af686994b37f14847de827903b543741180e65b0f53adab180d79
        • Instruction ID: 266dd622a38f191541ac6066ca6c2db1129c5295186e642fbe12cf81771b7d13
        • Opcode Fuzzy Hash: fe479619bb1af686994b37f14847de827903b543741180e65b0f53adab180d79
        • Instruction Fuzzy Hash: 3FA1F5B2D002145FF728CB24DD8AAEA7BB8EB91304F0481BBE50D6A5C4D7795BC5CE52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 2de7fa072dbd810fa38812fafe5093c1f9780981969f7f294da05fe97c1083f9
        • Instruction ID: 0ad58c51173c0877d48187013a22ddad1033469e6e54103a693afe3b08919a03
        • Opcode Fuzzy Hash: 2de7fa072dbd810fa38812fafe5093c1f9780981969f7f294da05fe97c1083f9
        • Instruction Fuzzy Hash: BF81F4F2C102145FF728CA24DD9AAEB7BB8EB91304F0441BBE509AA5C0D7795BC58E52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 8$n$n$x
        • API String ID: 0-2129689772
        • Opcode ID: 1dd2fe3cc11f459a79cc97656bda8c95d9d12b10453e62b72c9d4e57314c521d
        • Instruction ID: 09ca6d8955a060d9c45855972af567bd705c2f233ca62d94242d71613854e32f
        • Opcode Fuzzy Hash: 1dd2fe3cc11f459a79cc97656bda8c95d9d12b10453e62b72c9d4e57314c521d
        • Instruction Fuzzy Hash: A381E5F2C102145BF728CA24DD9ABEA7BB8EB91304F0481BBE509AA5C0D77D5BC58E51
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 6=MO$XV
        • API String ID: 0-3990888518
        • Opcode ID: 00656aa9eb16ea7f478f3914064f9b03e46ff580fd18f928522f4821289ccf66
        • Instruction ID: bebdaa049dd4e748ba55f348bcbeb728d2499e9a55cbfe047a0be19723ecf387
        • Opcode Fuzzy Hash: 00656aa9eb16ea7f478f3914064f9b03e46ff580fd18f928522f4821289ccf66
        • Instruction Fuzzy Hash: 306179F2D042105BF7148A38CD559EB3778EBC1310F0442BEE54E666C0D63DAAC6CA52
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: 6=MO$XV
        • API String ID: 0-3990888518
        • Opcode ID: d24318f06188caa4ce9fac3ef99bbfa2be97f5c7e7f7d3794f0dda8d95860e51
        • Instruction ID: 6ff6c7a7ac506dcb9d113e67ca12e2ac47666b53d571eb419fc479b484d23850
        • Opcode Fuzzy Hash: d24318f06188caa4ce9fac3ef99bbfa2be97f5c7e7f7d3794f0dda8d95860e51
        • Instruction Fuzzy Hash: 38419BF3C091506BF3085638DC56AF73B5CDB81310F15427FEA0AA65C0E93DAA868667
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: PM3J
        • API String ID: 0-4033414035
        • Opcode ID: fd636bade443b83f105f17fc277a3d01b83cafc2252889daf4f183046d2918a5
        • Instruction ID: 9893684d2429a16808f605e32cae4b6f36a5a41854b132645977fa9bfec2ef8b
        • Opcode Fuzzy Hash: fd636bade443b83f105f17fc277a3d01b83cafc2252889daf4f183046d2918a5
        • Instruction Fuzzy Hash: 3DC1D4B2D002299FE728CB14DD89AEAB779EB84304F0581FBE80D66684D7785F81CE41
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: LoadLibraryW
        • API String ID: 0-3407153372
        • Opcode ID: d47aba9f6ae27676dedd815327530f93f0054a661a8b1f11d792eb88f34de794
        • Instruction ID: 2813a047259dbdf11d853a833ab762e7a14acc24ad4bc55ec3b50161b1065a1b
        • Opcode Fuzzy Hash: d47aba9f6ae27676dedd815327530f93f0054a661a8b1f11d792eb88f34de794
        • Instruction Fuzzy Hash: 6AC18D70D052688BDB28CB15CC90BEABBB5FF49310F1445FAD90D66681C678AFD18F82
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID: P5E<
        • API String ID: 0-1787310082
        • Opcode ID: 7fba36094e0375ad79a4794b1bfe06e0c16b13e44bf578b585e93861a25358ab
        • Instruction ID: 13dc0d9d2e2f38bca1e104833fe3c1d0f3b6d9c3a8a8e0fe9648826bd524e615
        • Opcode Fuzzy Hash: 7fba36094e0375ad79a4794b1bfe06e0c16b13e44bf578b585e93861a25358ab
        • Instruction Fuzzy Hash: 845118F3D102246EF718CA28DD9AADB7B78EB91314F0441BBE40D66584D6785BC1CE91
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 292c7f5c607a7d724ec6a49b79769f51f8faf69fd1726b2417aac0d4a615cb4e
        • Instruction ID: acd6f7cabc42ae82d4b10b927852d72dbb90ae2969e18dfdc22d3d375f032539
        • Opcode Fuzzy Hash: 292c7f5c607a7d724ec6a49b79769f51f8faf69fd1726b2417aac0d4a615cb4e
        • Instruction Fuzzy Hash: 3691C4B2D051159BE728CB28CD5AAEEBBB9EB84314F1481BBD40DA76C0D7785B81CE41
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5538dab93b3494c38674988704fb225a1fdc146eaf53874596b4965923a7c41d
        • Instruction ID: e86bd9378ef356e4a829cccb27c036346b6cb2b3e4564b7abd1d883ef8f1daa9
        • Opcode Fuzzy Hash: 5538dab93b3494c38674988704fb225a1fdc146eaf53874596b4965923a7c41d
        • Instruction Fuzzy Hash: B37197B2D002155FF768CA25DD8AAEBBB7AEBC0314F0481FBD40D66684D7785E82CE51
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 56fd6427f354e985fa865f0438a7798f5e903f3b77eb7be04027c5d97195961e
        • Instruction ID: 606c6a7b1daff71553582ec09db883219df78950ee1091c39285468b16d32d08
        • Opcode Fuzzy Hash: 56fd6427f354e985fa865f0438a7798f5e903f3b77eb7be04027c5d97195961e
        • Instruction Fuzzy Hash: 8171B7B2D002155FFB28CA25DD89AEBBB7AEBC0304F0481FBD80D66594D7785E82CE51
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 59ae12e4b68cc26181c430402bebfca5f193652ce73b294d2104c898188c9235
        • Instruction ID: 62b41759915655d26ae6c2a2eca3559bfd642b6edaea59b1f7c81828d0c9e77d
        • Opcode Fuzzy Hash: 59ae12e4b68cc26181c430402bebfca5f193652ce73b294d2104c898188c9235
        • Instruction Fuzzy Hash: 0B61A6B2D002155FFB28CA15DD8AAEABB7AEBC0304F0481FBD40D66684D7785F82CE51
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 704d7b6767167744004c1cd16bc3e8258a02f3df9e307b2a14251db3713cc125
        • Instruction ID: 2e83eb8c2a4e195a6c6dacac4e508dc71c7b1351ce26eca48c63f470e8cffdeb
        • Opcode Fuzzy Hash: 704d7b6767167744004c1cd16bc3e8258a02f3df9e307b2a14251db3713cc125
        • Instruction Fuzzy Hash: 0B5126F3D102146EF718CA28DD8AAEB7BB8DB91314F0481BBE40D665C4D6785BC5CE92
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 16771d0ee049121cb1caec84dccd747ebf9f4ee4244a13f98c581f20310f2485
        • Instruction ID: 20803221447d76c4d65d7e8f346f3a5c2d0a3988df2a93970d511917dfc43808
        • Opcode Fuzzy Hash: 16771d0ee049121cb1caec84dccd747ebf9f4ee4244a13f98c581f20310f2485
        • Instruction Fuzzy Hash: AF5106F3D102146EF718CA28DC9AADB7BB8DB91314F0441BBE40D66584D6785BC5CE92
        Memory Dump Source
        • Source File: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: dc1bd58b7dab40d83678cabd1a07b3e1058d0b3c85fb744e33264e7b79d08869
        • Instruction ID: f245b25bdae4cc4b167eaa8bc1561994d1b35e5f55760df450f46206c5ba0294
        • Opcode Fuzzy Hash: dc1bd58b7dab40d83678cabd1a07b3e1058d0b3c85fb744e33264e7b79d08869
        • Instruction Fuzzy Hash: 0351D0B6D005249EEB208B54DC88AEABBB5FF85310F1140FAD84E57240E7745EC1CF65
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0859e2d192a1b0105e070f713a3aa28c2d0676c4297887766b6aac3d85a2badd
        • Instruction ID: bc14f4cf837f8ad89f302fc3b0025e0f701d41267faee28eae4623e21d8b1f07
        • Opcode Fuzzy Hash: 0859e2d192a1b0105e070f713a3aa28c2d0676c4297887766b6aac3d85a2badd
        • Instruction Fuzzy Hash: 0051B1B5D002268AEB349F26CC846FEB775EF85304F1080FAD84D97690E6389EC5DB16
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2e822d7c01fe5ab94eca8ce434b7d33fef6d38620c49e1e2879f15d5dbf202a5
        • Instruction ID: 69f4e91c6137b03560912e453298dba681c1a9931afff28023214ac1bb35ad50
        • Opcode Fuzzy Hash: 2e822d7c01fe5ab94eca8ce434b7d33fef6d38620c49e1e2879f15d5dbf202a5
        • Instruction Fuzzy Hash: 2A5108F3D102246EF718CA28DD9AADB7B78EB91314F0441BBE40D65584D6785BC1CE92
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d792af20e65c1581f81eacdc9475c8822eb3be5f75dddd6d093862d45e17daec
        • Instruction ID: 83d4c67c8e09584e90521794c6afb4427750bf3a24c46f7f54dc0fcdf56bca39
        • Opcode Fuzzy Hash: d792af20e65c1581f81eacdc9475c8822eb3be5f75dddd6d093862d45e17daec
        • Instruction Fuzzy Hash: 0951CEB1D141248BEB748B65DC946EEB675EF44310F2082FBD80DA7680E7395EC5CE15
        APIs
        • CheckMenuItem.USER32(?,0000807B,00000008), ref: 00420394
        • wsprintfW.USER32 ref: 00420491
          • Part of subcall function 0042B437: __EH_prolog.LIBCMT ref: 0042B43C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CheckH_prologItemMenuwsprintf
        • String ID: %s%s%d$&$-$4AD$=$=$?$E$G$H$M$P$Q$T$W$\$a$a$a$a$c$d$d$e$e$e$e$e$e$e$f$f$i$i$k$l$l$n$o$open$q$q$s$s$t$t$t$t$u$u$x$x
        • API String ID: 3555884098-3532295214
        • Opcode ID: 537394cd438cdf32110be765a217814a5c4bec02f00cc9273f1e5b19de0ffbe7
        • Instruction ID: ccf789408ba8d9d01bb46e161f2468a1dedd15672211cb991c20f0d1cf94b3ce
        • Opcode Fuzzy Hash: 537394cd438cdf32110be765a217814a5c4bec02f00cc9273f1e5b19de0ffbe7
        • Instruction Fuzzy Hash: DC91C8309086D8E9EB12D7A4DC49BDEBFB55F16308F04409EE548662C3CBBE1958CB76
        APIs
        • GetClientRect.USER32(?,?), ref: 00420603
        • GetWindowRect.USER32(?,00480388), ref: 0042061B
        • GetSystemMetrics.USER32(00000032), ref: 00420636
        • SendMessageW.USER32(?,00000005,00000000,00000000), ref: 0042065A
        • GetSystemMetrics.USER32(00000031), ref: 00420662
        • SendMessageW.USER32(?,00000404,00000004,?), ref: 004206D7
        • SetWindowPos.USER32(?,00000000,00000004,00000004,00000000,?,00000000), ref: 004206FB
        • GetWindowRect.USER32(?,?), ref: 0042070B
        • GetDlgItem.USER32(?,00000BD7), ref: 0042071D
        • GetDlgItem.USER32(?,00000FBE), ref: 0042072E
        • GetWindowRect.USER32(?,?), ref: 0042075D
        • ScreenToClient.USER32(?,?), ref: 0042077A
        • ScreenToClient.USER32(?,?), ref: 00420785
        • CopyRect.USER32(?,?), ref: 00420792
        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000000), ref: 004207BC
        • ShowWindow.USER32(?,00000000), ref: 004207C6
        • SetWindowPos.USER32(?,00000000,?,?,?,00000005,00000040), ref: 004207E8
        • CopyRect.USER32(?,?), ref: 004207F6
        • SetWindowPos.USER32(00000000,0000000E,?,0000000E,?,00000000), ref: 0042086D
        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000200), ref: 004208A8
        • GetSystemMetrics.USER32(00000032), ref: 004208C3
        • GetDlgItem.USER32(?,00000414), ref: 004208EE
        • SetWindowPos.USER32(00000000,00000000,0000000E,?,0000000E,?,00000000), ref: 00420912
        • GetDlgItem.USER32(?,000003EC), ref: 0042091C
        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000000), ref: 00420956
        • GetSystemMetrics.USER32(00000032), ref: 0042095A
        • GetSystemMetrics.USER32(00000032), ref: 00420979
        • GetDlgItem.USER32(?,00000419), ref: 004209B4
        • ShowWindow.USER32(00000000,00000000), ref: 004209BC
        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000040), ref: 004209DD
        • GetDlgItem.USER32(?,00000410), ref: 004209E7
        • ShowWindow.USER32(00000000,00000000), ref: 00420A1A
        • SetWindowPos.USER32(00000000,00000000,0000000E,?,0000000E,?,00000040), ref: 00420A39
        • GetDlgItem.USER32(?,0000041A), ref: 00420A5B
        • SetWindowPos.USER32(00000000,00000000,-000000EA,?,00000000,?,00000000), ref: 00420A88
        • GetDlgItem.USER32(?,00000412), ref: 00420AA6
        • SetWindowPos.USER32(?,00000000,00000000,?,0000000E,?,00000000), ref: 00420AEA
        • GetDlgItem.USER32(?,0000041E), ref: 00420AF4
        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000000), ref: 00420B30
        • GetDlgItem.USER32(?,00000411), ref: 00420B3A
        • SetWindowPos.USER32(?,00000000,00000000,?,0000000E,?,00000000), ref: 00420B70
        • GetSystemMetrics.USER32(00000032), ref: 00420B76
        • SetWindowPos.USER32(00000000,00000000,?,?,00000000), ref: 00420BA5
          • Part of subcall function 004362C5: GetWindowLongW.USER32(00000000,000000FC), ref: 004362F0
          • Part of subcall function 004362C5: SetWindowLongW.USER32(?,000000FC,0043622C), ref: 00436305
          • Part of subcall function 004362C5: GetClientRect.USER32(?,00000000), ref: 0043631D
          • Part of subcall function 004362C5: SendMessageW.USER32(?,00000418,00000000,00000000), ref: 0043634A
          • Part of subcall function 004362C5: SendMessageW.USER32(?,0000041D,-00000001,?), ref: 0043635A
          • Part of subcall function 004362C5: SetWindowPos.USER32(?,00000000,00420BC1,?,00420BC1,?,00000040,?,?,?,00420BC1,00000000,00000000), ref: 00436379
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$Item$Rect$MetricsSystem$ClientMessageSend$Show$CopyLongScreen
        • String ID:
        • API String ID: 1244584264-0
        • Opcode ID: 6f05e2dde071d3fcd63e3bbacb5e932178fae21c99f71a767f67f7f002c632da
        • Instruction ID: 923e96935bc56571748812aacab09e6193dce8e74519d4da1ece88cee5b03f58
        • Opcode Fuzzy Hash: 6f05e2dde071d3fcd63e3bbacb5e932178fae21c99f71a767f67f7f002c632da
        • Instruction Fuzzy Hash: B912F472D01208EFDF01DFA5EE89AEEBBB9FF48300F259025F904BA165D7715A108B64
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrcat$wsprintf$lstrcmp$H_prolog
        • String ID: 4AD$<E<N<D|$Alt$Alt-Gr$Ctrl$Ctrl-Alt$L-Mouse$L-Win$M-Mouse$R-Ctrl$R-Mouse$R-Win$list_label$list_order$list_text$text_%03d$|PE
        • API String ID: 2331027252-727685743
        • Opcode ID: 6e974ebdc80453f8bf89e391fe1004543c90190103f33660c1cb9eed32af2527
        • Instruction ID: 305e11b582ee5674688aba6902b22d4fce04e225f30b5c17fe9feb6b59f3fa5b
        • Opcode Fuzzy Hash: 6e974ebdc80453f8bf89e391fe1004543c90190103f33660c1cb9eed32af2527
        • Instruction Fuzzy Hash: BAA1E971900658BACB10EB90DD95FEE776CAF24304F5480ABF905A3191DB7C9B48CB69
        APIs
        • __EH_prolog.LIBCMT ref: 00427507
        • InterlockedIncrement.KERNEL32(-000000F4), ref: 00427532
        • wsprintfW.USER32 ref: 004275DA
        • lstrlenW.KERNEL32(00000000,000000FF,?,?,?,00000010), ref: 00427676
        • lstrlenW.KERNEL32(?,?,?,?,?,00000010), ref: 004276A1
        • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,00000010), ref: 004276CB
          • Part of subcall function 00421ECF: __EH_prolog.LIBCMT ref: 00421ED4
          • Part of subcall function 00421ECF: lstrlenW.KERNEL32(00000000,00001000,?,76E1E0B0,?,00000000,?,?,0042787E,00000000,?,?,00000000,?,?,00000000), ref: 00421F07
        • lstrlenW.KERNEL32(?,?,00000000,00000000,?,?,?,00000010), ref: 004276F7
        • MessageBoxW.USER32(0000000A,?,?,00000003), ref: 004277D0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrlen$H_prolog$IncrementInterlockedMessagewsprintf
        • String ID: %s: %d$0hE$0hE$4AD$list$list_label$list_order$list_text$text_%03d
        • API String ID: 101203759-2156759317
        • Opcode ID: 89ed76bf90950f2ae37a537d31068173e5987552b81e97b9d3f3b8fdd7fdc37e
        • Instruction ID: dff87e9b3940e85c95b9824c9d0008bd55deb00be2d41abe113388fb65a849ab
        • Opcode Fuzzy Hash: 89ed76bf90950f2ae37a537d31068173e5987552b81e97b9d3f3b8fdd7fdc37e
        • Instruction Fuzzy Hash: 24C16171D0424DAADF04EBE5C999EEEBBBCAF19308F10016EE115B31C1DB785A44CB69
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: wsprintf
        • String ID: Del$Down$ESC3$F%d$Left$NUM_%d$NUM_*$NUM_+$NUM_,$NUM_-$NUM_.$NUM_/$Right$Space$TAB
        • API String ID: 2111968516-1788754765
        • Opcode ID: f66a46fd12f69995153c1cae6e64894327a738403d8d8ec6a87eacb9d8e3ef1b
        • Instruction ID: fb27a073f83e29f15c1bda8b5e65fb32c354b5abc1bede79b60cea97612c775e
        • Opcode Fuzzy Hash: f66a46fd12f69995153c1cae6e64894327a738403d8d8ec6a87eacb9d8e3ef1b
        • Instruction Fuzzy Hash: E8218311B48F34B64E300524BE92B3E62525626F66BF08513F902D86EAD1FD8CD691CF
        APIs
        • GetIconInfo.USER32(?,?), ref: 0043521B
        • GetDC.USER32(00000000), ref: 0043522A
        • CreateCompatibleDC.GDI32(00000000), ref: 0043523C
        • CreateCompatibleDC.GDI32(00000000), ref: 00435242
        • GetObjectW.GDI32(?,00000018,?), ref: 00435269
        • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 0043529A
        • SelectObject.GDI32(?,?), ref: 004352B7
        • SelectObject.GDI32(?,?), ref: 004352C2
        • GetPixel.GDI32(00000000,00000000,?), ref: 004352E6
        • SetPixel.GDI32(?,00000000,?,?), ref: 0043534A
        • SelectObject.GDI32(?,?), ref: 00435370
        • SelectObject.GDI32(?,?), ref: 00435378
        • CreateIconIndirect.USER32(00000001), ref: 0043538B
        • DeleteObject.GDI32(?), ref: 00435396
        • DeleteObject.GDI32(?), ref: 0043539B
        • DeleteObject.GDI32(?), ref: 004353A0
        • DeleteDC.GDI32(?), ref: 004353AB
        • DeleteDC.GDI32(?), ref: 004353B0
        • ReleaseDC.USER32(00000000,?), ref: 004353B7
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Object$Delete$CreateSelect$CompatibleIconPixel$BitmapIndirectInfoRelease
        • String ID:
        • API String ID: 4176011905-0
        • Opcode ID: eaea4ba6c47036ab21d483449654682ba20451ed1df99df75e39fb9125468f94
        • Instruction ID: 049c9c6863bca4da748134b191693f4b8ac029bc71d22b5e3f0e0cc1fe1b6ce3
        • Opcode Fuzzy Hash: eaea4ba6c47036ab21d483449654682ba20451ed1df99df75e39fb9125468f94
        • Instruction Fuzzy Hash: 70510271D00218EFDF109FA1DC849AEBFB5FF48351F10902AE911B2260DB759A50EFA4
        APIs
        • CreateWindowExW.USER32(00000000,ToolbarWindow32,00000000,5600994C,00000000,00000000,000000B4,?,?,00000000,00000000), ref: 00435601
        • GetStockObject.GDI32(00000011), ref: 00435615
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00435633
        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0043565C
        • CreateFontIndirectW.GDI32(?), ref: 0043567A
        • SendMessageW.USER32(?,00000030,?,00000000), ref: 00435692
        • SendMessageW.USER32(?,0000041E,00000014,00000000), ref: 0043569F
        • SendMessageW.USER32(?,00000420,00000000,00100001), ref: 004356AF
        • GetClientRect.USER32(?,?), ref: 004356C3
        • SetWindowPos.USER32(?,00000000,00000000,?,?,00000000,00000040), ref: 004356E9
        • GetWindowLongW.USER32(?,000000FC), ref: 00435700
        • SetWindowLongW.USER32(?,000000FC,00435849), ref: 00435717
        • GetWindowLongW.USER32(?,000000FC), ref: 0043571E
        • SetWindowLongW.USER32(?,000000FC,0043580B), ref: 0043572F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$Long$MessageSend$CreateObject$ClientFontIndirectInfoParametersRectStockSystem
        • String ID: ToolbarWindow32
        • API String ID: 2936060913-4104838417
        • Opcode ID: 3f51542d2a0b2004c8526f9ef05dbcaebad891402990623c3b930f2bb6b1b828
        • Instruction ID: f76f25e1fa694d056b7f7f73ac2d24a184e6b0527aa05ac2f277c84c8476ae4a
        • Opcode Fuzzy Hash: 3f51542d2a0b2004c8526f9ef05dbcaebad891402990623c3b930f2bb6b1b828
        • Instruction Fuzzy Hash: 5D418172900224BFDB509FA5EC89EEB7F78EF48760F115125FA08E61A1D7709904CF94
        APIs
        • CreateWindowExW.USER32(76AB2370,ToolbarWindow32,00000000,00000000,00000000,00000000,000000B4,00000014,00000000,00000000,00000000,00000000), ref: 00436113
        • GetStockObject.GDI32(00000011), ref: 00436127
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00436145
        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0043616E
        • CreateFontIndirectW.GDI32(?), ref: 0043618A
        • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 004361A2
        • SendMessageW.USER32(00000000,0000041E,00000014,00000000), ref: 004361AF
        • SendMessageW.USER32(00000000,00000420,00000000,00100000), ref: 004361BF
        • GetDlgItem.USER32(00000000,?), ref: 004361CC
        • ShowWindow.USER32(00000000,00000000), ref: 004361E1
        • GetWindowRect.USER32(00000000,00000000), ref: 004361EC
        • ScreenToClient.USER32(00000000,00000000), ref: 004361FF
        • ScreenToClient.USER32(00000000,76AB2370), ref: 00436208
        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000018,00000000), ref: 0043621E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$MessageSend$ClientCreateObjectScreen$FontIndirectInfoItemParametersRectShowStockSystem
        • String ID: ToolbarWindow32
        • API String ID: 171734827-4104838417
        • Opcode ID: 872a04bb76daadf6eeb8962ea1ced062aef14eece72818880b888df5f63a513b
        • Instruction ID: 92c2e2c1fc3dde78d9c0d2bc275dc0a06e604331f58c1d2c7f24981343337753
        • Opcode Fuzzy Hash: 872a04bb76daadf6eeb8962ea1ced062aef14eece72818880b888df5f63a513b
        • Instruction Fuzzy Hash: D541097690021DBFEF119FA4DC84EEE7B7DEB08344F008426FA14A61A0D771AE149F64
        APIs
        • CreateWindowExW.USER32(?,ToolbarWindow32,00000000,?,00000000,00000000,000000B4,00000014,?,00000000,00000000), ref: 0043218B
        • GetStockObject.GDI32(00000011), ref: 0043219E
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 004321BC
        • CreateFontIndirectW.GDI32(?), ref: 004321D1
        • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 004321E7
        • SendMessageW.USER32(00000000,0000041E,00000014,00000000), ref: 004321F2
        • SendMessageW.USER32(00000000,00000420,00000000,00100000), ref: 00432200
        • GetDlgItem.USER32(?,?), ref: 0043220D
        • ShowWindow.USER32(?,00000000), ref: 00432225
        • GetWindowRect.USER32(?,?), ref: 00432232
        • ScreenToClient.USER32(?,?), ref: 00432245
        • ScreenToClient.USER32(?,?), ref: 0043224E
        • SetWindowPos.USER32(00000000,00000000,?,?,?,00000018,00000000), ref: 00432262
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$MessageSend$ClientCreateObjectScreen$FontIndirectItemRectShowStock
        • String ID: ToolbarWindow32
        • API String ID: 1801995013-4104838417
        • Opcode ID: 75dccdb2353e919780bed2b11c83ca037eab2203106cc7818d96142dd42cfe0a
        • Instruction ID: cc59631b687ed46b3897f8ef20cc18819bfc4e5e2055f90e08ac7289b8131753
        • Opcode Fuzzy Hash: 75dccdb2353e919780bed2b11c83ca037eab2203106cc7818d96142dd42cfe0a
        • Instruction Fuzzy Hash: E83129B690025DBFEB019FA4EC85EEF7BBDFB48749F004025FA00A61A1D3719D149BA5
        APIs
        • __EH_prolog.LIBCMT ref: 00421ED4
        • lstrlenW.KERNEL32(00000000,00001000,?,76E1E0B0,?,00000000,?,?,0042787E,00000000,?,?,00000000,?,?,00000000), ref: 00421F07
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: H_prologlstrlen
        • String ID: Alt$Alt-Gr$Ctrl$Ctrl-Alt$L-Mouse$L-Win$M-Mouse$R-Ctrl$R-Mouse$R-Win
        • API String ID: 2133942097-684211483
        • Opcode ID: f3bd2888a5d8743ae5920ba6bac0428a4c442ee898a2ef51e22436192443f3a1
        • Instruction ID: e34d6a5a56890267d0a77cb0a0af09d494010216408d4ade35e7860ad381712d
        • Opcode Fuzzy Hash: f3bd2888a5d8743ae5920ba6bac0428a4c442ee898a2ef51e22436192443f3a1
        • Instruction Fuzzy Hash: 6F512522B44A30B5CB31A750F941FBF6364AF2176AF60802FF511E61D2EBEC5A45C29D
        APIs
        • lstrcatW.KERNEL32(?,R-Mouse), ref: 0042A381
        • lstrcatW.KERNEL32(?,L-Win), ref: 0042A395
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrcat
        • String ID: Alt$Alt-Gr$Ctrl$Ctrl-Alt$L-Mouse$L-Win$M-Mouse$R-Ctrl$R-Mouse$R-Win
        • API String ID: 4038537762-684211483
        • Opcode ID: 0196e6e6f9712b71f51dbd6c5d103967daff606a101654226cc2a381356c9e14
        • Instruction ID: a020f727c1a1fbe9591c624d4daefe5a6311d8d08f741b389f1f89b872b333bc
        • Opcode Fuzzy Hash: 0196e6e6f9712b71f51dbd6c5d103967daff606a101654226cc2a381356c9e14
        • Instruction Fuzzy Hash: 2101D432FC4A30F74E30A4487C51BBA6A401326B22BF14163FD5ABA5A6419D0CB5598F
        APIs
        • __EH_prolog.LIBCMT ref: 00430486
        • OffsetRect.USER32(?,?,?), ref: 004304D0
        • OffsetRect.USER32(00000001,00000001,00000001), ref: 004304EB
        • GetSysColor.USER32(00000014), ref: 004304F9
        • GetSysColor.USER32(00000010), ref: 00430521
        • CreatePen.GDI32(00000000,00000000,00000000), ref: 00430526
        • DeleteObject.GDI32(00000000), ref: 00430548
        • DeleteObject.GDI32(?), ref: 00430552
        • CreatePen.GDI32(00000000,00000000,00000000), ref: 00430506
          • Part of subcall function 00431AAD: SelectObject.GDI32(0043058E,76AAA5C0), ref: 00431ABA
          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,0043058E,1015FF56,00000000), ref: 00431AD6
          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C1,5E5FF44D), ref: 00431AE5
          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,00000001,1015FF56,00000000), ref: 00431AF1
          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C2,5E5FF44D), ref: 00431AFC
          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,0043058E,5E5FF44C,00000000), ref: 00431B08
          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C1,1015FF55), ref: 00431B13
          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,5E5FF44D,5E5FF44C,00000000), ref: 00431B21
          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C2,1015FF55), ref: 00431B2E
          • Part of subcall function 00431AAD: SelectObject.GDI32(0043058E,76AAA5C0), ref: 00431B35
        • OffsetRect.USER32(00000006,00000001,00000001), ref: 00430562
        • GetSysColor.USER32(00000012), ref: 0043056A
        • CreatePen.GDI32(00000000,00000000,00000000), ref: 00430575
        • DeleteObject.GDI32(00000000), ref: 00430593
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Object$LineMove$ColorCreateDeleteOffsetRect$Select$H_prolog
        • String ID:
        • API String ID: 132611724-0
        • Opcode ID: 138b57e503952e2e3ef7f0f16d7fd84a21ad59701c9fec39699694140e1e4f3a
        • Instruction ID: 46e6b0f7213544dc18f5c4da83762ef9c03a1ef126acf789cfd90c33d762b217
        • Opcode Fuzzy Hash: 138b57e503952e2e3ef7f0f16d7fd84a21ad59701c9fec39699694140e1e4f3a
        • Instruction Fuzzy Hash: 80411AB1D00218AFDB11DFA5CC85BEEBBB9EF48314F00951AF915B7250C7B59A048FA5
        APIs
        • lstrlenW.KERNEL32(?,00000000,?,?,?,?,?,00436B7E,?,?), ref: 00436F89
        • lstrlenW.KERNEL32(?,?,?,?,?,00436B7E,?,?), ref: 00436FA6
        • SetTextColor.GDI32(0000FFFF,~kC), ref: 00436FB7
        • OutputDebugStringW.KERNEL32(NULL,?,?,?,?,00436B7E,?,?), ref: 00436FC8
        • GetCurrentObject.GDI32(0000FFFF,00000006), ref: 00436FD3
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00436FE4
        • CreateFontIndirectW.GDI32(?), ref: 00436FEB
        • DrawTextW.USER32(0000FFFF,?,0000FFFF,00000000,?), ref: 0043701F
        • DrawTextW.USER32(0000FFFF,?,000000FF,00000000,?), ref: 0043704F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Text$DrawObjectlstrlen$ColorCreateCurrentDebugFontIndirectOutputString
        • String ID: NULL$~kC
        • API String ID: 2332924160-1157440343
        • Opcode ID: 4ae050228ae3f762b57b8d527a585c44ffd6c7374dfb5799d373051af9ff40f5
        • Instruction ID: 32513ef4225b7dbf12b6419026106d66b39d41e6418e96635585d9dc61f34225
        • Opcode Fuzzy Hash: 4ae050228ae3f762b57b8d527a585c44ffd6c7374dfb5799d373051af9ff40f5
        • Instruction Fuzzy Hash: 64318D7150020AFFCB149FA8DC85AAA7BB9EF08314F119129F916E22A0C735D9519B18
        APIs
        • ScreenToClient.USER32(?,?), ref: 00435C44
          • Part of subcall function 00435BAB: SendMessageW.USER32(?,00000445,00000000,?), ref: 00435BB9
        • ScreenToClient.USER32(?,?), ref: 00435C91
          • Part of subcall function 00435DFE: GetMessagePos.USER32 ref: 00435DFE
        • PostMessageW.USER32(?,0000084D,00000000,00000000), ref: 00435D01
        • SendMessageW.USER32(?,0000011F,?,?), ref: 00435D1A
        • PostMessageW.USER32(?,0000001F,00000000,00000000), ref: 00435D65
        • PostMessageW.USER32(?,0000084D,00000000,00000000), ref: 00435D71
        • PostMessageW.USER32(?,00000100,00000028,00000000), ref: 00435D7E
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Message$Post$ClientScreenSend
        • String ID:
        • API String ID: 438416525-0
        • Opcode ID: 60a7e8d324673432992717aaadcd6ff05456399c72d3870ab3bd338f88e9b8a5
        • Instruction ID: 2a1818dc928b07f8f12ddde4aa5868b3ec20cef3fe632689e787451c26aeece7
        • Opcode Fuzzy Hash: 60a7e8d324673432992717aaadcd6ff05456399c72d3870ab3bd338f88e9b8a5
        • Instruction Fuzzy Hash: 8051B231500B04AFCB319F16CC88E9BBBF9EF8CB04F10952EF58696661C774A941DB18
        APIs
        • GetClientRect.USER32(00000000,00000000), ref: 0042D511
        • DrawEdge.USER32(?,00000000,00000006,0000200B), ref: 0042D53A
        • FillRect.USER32(?,00000000,00000010), ref: 0042D549
        • DrawEdge.USER32(?,00000000,00000006,00002007), ref: 0042D56D
        • FillRect.USER32(?,00000000,00000010), ref: 0042D57A
        • GetSysColor.USER32(00000008), ref: 0042D582
        • SetTextColor.GDI32(?,00000000), ref: 0042D58A
        • SetBkMode.GDI32(?,00000001), ref: 0042D593
        • GetStockObject.GDI32(00000011), ref: 0042D59B
        • SelectObject.GDI32(?,00000000), ref: 0042D5A9
        • DrawTextW.USER32(?,?,000000FF,00000004,00008024), ref: 0042D5D0
        • SelectObject.GDI32(?,00000004), ref: 0042D5DA
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: DrawObjectRect$ColorEdgeFillSelectText$ClientModeStock
        • String ID:
        • API String ID: 303100802-0
        • Opcode ID: be91fde70604ba309ba84b06fb5e41ceb87a93f3c22d6c4ac74820cc584e0c58
        • Instruction ID: d2e2adb73274232bb2aef0161fc503774a35fff9785f72c0be1fa87e41e1273c
        • Opcode Fuzzy Hash: be91fde70604ba309ba84b06fb5e41ceb87a93f3c22d6c4ac74820cc584e0c58
        • Instruction Fuzzy Hash: F2316B32900218BFEB018FA4DC88EFFBBB8FB08714F004529FA16E6190C771A945CB65
        APIs
          • Part of subcall function 0043672E: GetSysColor.USER32(?), ref: 0043673B
        • CopyRect.USER32(?,?), ref: 00436943
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ColorCopyRect
        • String ID:
        • API String ID: 3794717969-1776720792
        • Opcode ID: 5c9772dec5d805dd6dfde49b813ff185bcd6ae061b483e24b21aff21b6c50cda
        • Instruction ID: bab850502f826ae16235fee4ad5b7b1deb26fd9a43b8bc222d4fcaf7f1f5b6e4
        • Opcode Fuzzy Hash: 5c9772dec5d805dd6dfde49b813ff185bcd6ae061b483e24b21aff21b6c50cda
        • Instruction Fuzzy Hash: DCD16C71E00209EFCF14DFA8C885BEEBBB6AF48304F15806AE905BB291D775A945CF54
        APIs
        • FindWindowExW.USER32(00000000,00000000,Shell_TrayWnd,00000000), ref: 00434F77
        • FindWindowExW.USER32(00000000,00000000,TrayNotifyWnd,00000000), ref: 00434F85
        • GetWindowRect.USER32(00000000,?), ref: 00434F8F
        • SHAppBarMessage.SHELL32(00000005,?), ref: 00434FA7
        • FindWindowExW.USER32(00000000,00000000,Shell_TrayWnd,00000000), ref: 00435004
        • GetWindowRect.USER32(00000000,?), ref: 0043500F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$Find$Rect$Message
        • String ID: $$Shell_TrayWnd$TrayNotifyWnd
        • API String ID: 805496052-1160186678
        • Opcode ID: aca470a4a86d356b83a37e2c4104057e75468c51ea3e762e57e9c2cb622da7ca
        • Instruction ID: 2c9f2e3420141922909e519893d12b107e4d3a1898551895d3851cf8cf98412b
        • Opcode Fuzzy Hash: aca470a4a86d356b83a37e2c4104057e75468c51ea3e762e57e9c2cb622da7ca
        • Instruction Fuzzy Hash: 8231A170900605AFC728CF69C888DABBBF8EF89714F14855EF85AD7390D635AC40CB68
        APIs
          • Part of subcall function 00435E57: GetSysColor.USER32(00000004), ref: 00435E70
          • Part of subcall function 00435E57: CreateSolidBrush.GDI32(00202020), ref: 00435E79
        • IsWindowVisible.USER32(?), ref: 00435F4B
        • GetActiveWindow.USER32 ref: 00435F59
        • GetSubMenu.USER32(?,?), ref: 00435F6E
          • Part of subcall function 00435BC2: SendMessageW.USER32(?,00000403,?,?), ref: 00435BDA
          • Part of subcall function 00435B92: SendMessageW.USER32(?,0000041D,?,?), ref: 00435BA2
        • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 00435FC8
        • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 00435FD4
        • GetCurrentThreadId.KERNEL32 ref: 00435FF6
        • SetWindowsHookExW.USER32(000000FF,0043607A,00000000,00000000), ref: 00436007
        • TrackPopupMenuEx.USER32(?,00000140,?,?,?,00000014), ref: 0043602D
        • SendMessageW.USER32(?,00000111,00000000,AFFE0000), ref: 00436045
        • UnhookWindowsHookEx.USER32(?), ref: 00436060
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$MessageSend$HookMenuPointsWindows$ActiveBrushColorCreateCurrentPopupSolidThreadTrackUnhookVisible
        • String ID:
        • API String ID: 3555522823-0
        • Opcode ID: d5e96c71b40245e8c850c57e5173b7712c3bfd98b42217a16c0dcc6eb81ae308
        • Instruction ID: af8b7d620b30591a07dcb7c5db87775e86cc94bb11aca02fd2cfae0a4338fb78
        • Opcode Fuzzy Hash: d5e96c71b40245e8c850c57e5173b7712c3bfd98b42217a16c0dcc6eb81ae308
        • Instruction Fuzzy Hash: 6541BCB2900214BFDF519FA5DC858AFBFB9FF48310B10956AF915E6265C370A900CF94
        APIs
        • GetSystemMetrics.USER32(0000000F), ref: 004365F3
        • GetDC.USER32(00000000), ref: 0043660F
        • CreateFontIndirectW.GDI32(?), ref: 00436637
        • SelectObject.GDI32(?,00000000), ref: 00436643
        • DrawTextW.USER32(?,?,000000FF,?,00000424), ref: 0043667D
        • SelectObject.GDI32(?,?), ref: 0043668F
        • DeleteObject.GDI32(?), ref: 0043669A
        • GetSystemMetrics.USER32(00000047), ref: 004366D8
        • ReleaseDC.USER32(00000000,?), ref: 004366E9
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Object$MetricsSelectSystem$CreateDeleteDrawFontIndirectReleaseText
        • String ID:
        • API String ID: 2845678740-0
        • Opcode ID: 0dd1cdc975fa90c191e1b3f6d902dcce56dbf230f0a94245f5353f29224a4e99
        • Instruction ID: eefc56dc4ba074cc05ed8a12dcb2865e0cc639ee1b886fa549392c0575cec96a
        • Opcode Fuzzy Hash: 0dd1cdc975fa90c191e1b3f6d902dcce56dbf230f0a94245f5353f29224a4e99
        • Instruction Fuzzy Hash: FE419F31900629EFCF11CFA8C889AEEBBB5FF48740F15816AE915B7251C774A901DF98
        APIs
        • GetWindowPlacement.USER32(?,?), ref: 00428275
        • GetSystemMetrics.USER32(0000004F), ref: 004282AE
        • GetSystemMetrics.USER32(0000004D), ref: 004282B4
        • GetSystemMetrics.USER32(0000004E), ref: 004282BB
        • GetSystemMetrics.USER32(0000004C), ref: 004282C1
        • GetSystemMetrics.USER32(0000004D), ref: 004282C8
        • GetSystemMetrics.USER32(0000004C), ref: 004282CD
        • SetRect.USER32(?,00000000), ref: 004282D4
        • GetWindowRect.USER32(?,?), ref: 004282E1
        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00428336
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MetricsSystem$Window$Rect$MovePlacement
        • String ID:
        • API String ID: 3067230557-0
        • Opcode ID: 870f133595a486a6bf26aa3be2a5cb3c4c7eade40f216451adebc92329adc0dc
        • Instruction ID: 8bd225a0a0a47aa8a0b0c8ad36270c41b07badd969337c926225b95b87dd0b4f
        • Opcode Fuzzy Hash: 870f133595a486a6bf26aa3be2a5cb3c4c7eade40f216451adebc92329adc0dc
        • Instruction Fuzzy Hash: 4731EC71F00229AFDF04DBA8DD85AEEBBF9EF48710F10412AE605A7250DB75AD41CB94
        APIs
        • __EH_prolog.LIBCMT ref: 00425CE4
        • SendMessageW.USER32(00001042,00000000,00000000,00000000), ref: 00425D02
          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807B), ref: 00425C86
          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807D), ref: 00425C90
          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,00008019), ref: 00425C9B
          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807B,00000000), ref: 00425CB7
          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807D,00000000), ref: 00425CC2
          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,00008019,00000000), ref: 00425CD6
        • SetWindowTextW.USER32(?,004547B4), ref: 00425D53
        • SetWindowTextW.USER32(?,?), ref: 00425D62
        • KillTimer.USER32(000007E8), ref: 00425D70
        • SetTimer.USER32(000007E8,000000C8,00000000), ref: 00425D84
        • SetDlgItemTextW.USER32(00000000,000003EC,00002010), ref: 00425D99
        • SetWindowTextW.USER32(?,00002010), ref: 00425DAA
        • SendMessageW.USER32(?,0000014D,00000000,?), ref: 00425DF3
        • SendMessageW.USER32(?,0000014E,?,00000000), ref: 00425E05
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$Text$Window$Timer$H_prologItemKill
        • String ID:
        • API String ID: 82283145-0
        • Opcode ID: 135239a675c50c610d3c88f7011432b9c2c3cc4dc5ede83cda2dd2598131bad9
        • Instruction ID: 5f8deb670cbed0adec7b50a07d3aa2b4b88e6be29a6496bd3395f5a303cc45d5
        • Opcode Fuzzy Hash: 135239a675c50c610d3c88f7011432b9c2c3cc4dc5ede83cda2dd2598131bad9
        • Instruction Fuzzy Hash: 2C31AD71640208FBDB11AB60ECC9EEEB7B9FB08744F00442DF515A21E1DB74AD54CB18
        APIs
        • SelectObject.GDI32(0043058E,76AAA5C0), ref: 00431ABA
        • MoveToEx.GDI32(0043058E,0043058E,1015FF56,00000000), ref: 00431AD6
        • LineTo.GDI32(0043058E,8B0043C1,5E5FF44D), ref: 00431AE5
        • MoveToEx.GDI32(0043058E,00000001,1015FF56,00000000), ref: 00431AF1
        • LineTo.GDI32(0043058E,8B0043C2,5E5FF44D), ref: 00431AFC
        • MoveToEx.GDI32(0043058E,0043058E,5E5FF44C,00000000), ref: 00431B08
        • LineTo.GDI32(0043058E,8B0043C1,1015FF55), ref: 00431B13
        • MoveToEx.GDI32(0043058E,5E5FF44D,5E5FF44C,00000000), ref: 00431B21
        • LineTo.GDI32(0043058E,8B0043C2,1015FF55), ref: 00431B2E
        • SelectObject.GDI32(0043058E,76AAA5C0), ref: 00431B35
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: LineMove$ObjectSelect
        • String ID:
        • API String ID: 796595582-0
        • Opcode ID: 6aed04852779ff3942b37f3775a677f39a3531c3661310badc0ad0f59d01eb94
        • Instruction ID: 43eb38f613f85a163b313d79e2c63de9559be0ea8cdf3e02458cd8719bfd43f5
        • Opcode Fuzzy Hash: 6aed04852779ff3942b37f3775a677f39a3531c3661310badc0ad0f59d01eb94
        • Instruction Fuzzy Hash: 70117A75200604BFE6129B55DCC0E7BF7F9EF89B10F108819F9A9D2510C725E852AB25
        APIs
        • GetMenuItemCount.USER32(?), ref: 004370A1
        • GetMenuItemInfoW.USER32(00000064,?,00000001,?), ref: 004370ED
        • lstrlenW.KERNEL32(?), ref: 00437179
        • lstrcpyW.KERNEL32(00000000,?), ref: 00437199
        • SetMenuItemInfoW.USER32(00000064,?,00000001,?), ref: 004371AE
        • GetMenuItemCount.USER32(00000064), ref: 004371BA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ItemMenu$CountInfo$lstrcpylstrlen
        • String ID: 1$d
        • API String ID: 1621444650-1642009170
        • Opcode ID: ae4c2c2dfed70d91c995b68a4d3dcd87616bf17e0b87870d315791c588e9eb51
        • Instruction ID: ab7f1e7837498ced5c99314300850d25f9edd8aff39392c0aee1037423d7d266
        • Opcode Fuzzy Hash: ae4c2c2dfed70d91c995b68a4d3dcd87616bf17e0b87870d315791c588e9eb51
        • Instruction Fuzzy Hash: 5E419DB290420AEFDF30DF94D985AAEBBB4FB08354F10952AE845A7350D7349944CF64
        APIs
        • DestroyMenu.USER32(?), ref: 004358A9
        • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 004358C3
        • SendMessageW.USER32(?,00000418,00000000,00000000), ref: 004358CF
        • SendMessageW.USER32(?,00000416,00000000,00000000), ref: 004358E2
        • GetMenuItemCount.USER32(?), ref: 00435903
        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0043594A
        • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 0043597F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$Menu$Item$CountDestroyInfo
        • String ID: d
        • API String ID: 4101362009-2564639436
        • Opcode ID: 34ee46e3f99a2cd70cd31549637652a982901960939b6ab3df41581c115caaa0
        • Instruction ID: 67dbf8287af0168786e3cb0bfa77e2e4c122d9a401f88475f16c37208581ae31
        • Opcode Fuzzy Hash: 34ee46e3f99a2cd70cd31549637652a982901960939b6ab3df41581c115caaa0
        • Instruction Fuzzy Hash: E1317CB1900208BFDB219F65DC81E9FBBB8EF08354F10542AF645E6690D374AD858F64
        APIs
        • __EH_prolog.LIBCMT ref: 004215AF
        • GetDlgItem.USER32(?,?), ref: 004215EB
        • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000001,80000000,80000000,80000000,80000000,?,00000000,00000000), ref: 00421614
        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 0042165D
        • SendMessageA.USER32(?,00000418,00000000,00000190), ref: 00421670
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$CreateH_prologItemWindow
        • String ID: ,$Test$tooltips_class32
        • API String ID: 4127292747-3622912971
        • Opcode ID: f8674888962ce4a140350cb7c02e21500a5a8d2e049f66933eb3e064291a758e
        • Instruction ID: 4a65af810be17d5466e0fa3a19395ecaa88b91b0f0ad7673a24ad41d318fb192
        • Opcode Fuzzy Hash: f8674888962ce4a140350cb7c02e21500a5a8d2e049f66933eb3e064291a758e
        • Instruction Fuzzy Hash: 7F216072A00218FFDB10CF64DC84AEEBBB9FB18750F11813AF905A6290C7754D44CB68
        APIs
        • SendMessageW.USER32(?,0000045A,?,00000000), ref: 00435A62
        • GetClientRect.USER32(?,00000000), ref: 00435A88
        • PostMessageW.USER32(?,0000084D,00000000,00000000), ref: 00435ADE
        • PostMessageW.USER32(?,00000100,00000028,00000000), ref: 00435AEB
        • SendMessageW.USER32(?,0000045A,?,?), ref: 00435B0A
        • GetClientRect.USER32(?,00000000), ref: 00435B2C
        • SendMessageW.USER32(?,0000130A,00000000,00000000), ref: 00435B4D
        • SendMessageW.USER32(?,00000417,00000000,00000000), ref: 00435B6B
        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00435B7C
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Message$Send$Post$ClientRect
        • String ID:
        • API String ID: 2800339571-0
        • Opcode ID: 02e0a1ac313f76683fc824ef5578c044bd7c86950fdc723cdfe1c487a2cdf429
        • Instruction ID: 8b76a7bbb7dd5651a2b8aff8d266f85c98f0d81b6d8569f3e9fc264057a03356
        • Opcode Fuzzy Hash: 02e0a1ac313f76683fc824ef5578c044bd7c86950fdc723cdfe1c487a2cdf429
        • Instruction Fuzzy Hash: B7414C72900A08BFEB119FA8DD85BEEF7F9EB4C311F105425F601E61A0D7B4AD049B65
        APIs
        • GetStockObject.GDI32(00000011), ref: 0043642D
        • GetObjectW.GDI32(00000000,0000005C,?), ref: 0043643A
        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00436464
        • CreateFontIndirectW.GDI32(?), ref: 00436491
        • CreateFontIndirectW.GDI32(?), ref: 004364A9
        • GetSystemMetrics.USER32(00000032), ref: 004364B9
        • GetSystemMetrics.USER32(00000031), ref: 004364C5
        • GetSystemMetrics.USER32(00000031), ref: 004364D2
        • GetSystemMetrics.USER32(00000032), ref: 004364DC
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: System$Metrics$CreateFontIndirectObject$InfoParametersStock
        • String ID:
        • API String ID: 4204584070-0
        • Opcode ID: ab5df36e46a9c33517faad016574ca79f5ca83dd5ec28b48bc76654b598bc8f7
        • Instruction ID: 8b5ddb9cb34b4abd4672a7546851bcf7586be4e33035710cce3a73d3990b9d3d
        • Opcode Fuzzy Hash: ab5df36e46a9c33517faad016574ca79f5ca83dd5ec28b48bc76654b598bc8f7
        • Instruction Fuzzy Hash: 86312B72D443149FEF548FA48C89BDA7BB8FB04304F0400AAEA08AF186E7B46505CF65
        APIs
        • GetModuleHandleW.KERNEL32(00000000), ref: 0043755B
          • Part of subcall function 00437536: GetModuleFileNameW.KERNEL32(?,?,?,00437425,?,?,00000208), ref: 00437542
        • RegOpenKeyW.ADVAPI32(-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,?), ref: 004375F7
        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 00437620
        • lstrlenW.KERNEL32(?), ref: 0043764A
        • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,00000000), ref: 00437662
        Strings
        • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 004375F1
        • " -bg, xrefs: 004375B7
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ModuleValue$FileHandleNameOpenQuerylstrlen
        • String ID: " -bg$SOFTWARE\Microsoft\Windows\CurrentVersion\Run
        • API String ID: 3684264954-3110968143
        • Opcode ID: 2c7aa63c6aa06c627f16ba4a35f02f722e6f55bb6732a97aef29a4acba008ab9
        • Instruction ID: c29cf95cee922bc5516625886b548d78ba82a48099b151cd577d435e0fbe8af1
        • Opcode Fuzzy Hash: 2c7aa63c6aa06c627f16ba4a35f02f722e6f55bb6732a97aef29a4acba008ab9
        • Instruction Fuzzy Hash: AA3164B294011CABDF20DBA5DD89EDFB7BCEF48310F0045A6B509E2151DA749B85CF64
        APIs
        • SendMessageW.USER32(?,00001042,00000000,00000000), ref: 0042595E
        • lstrcpyW.KERNEL32(?,MenuBreak:,00000000,00000000,00000000), ref: 004259DD
        • lstrcpyW.KERNEL32(?,MenuBreak:), ref: 004259E7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrcpy$MessageSend
        • String ID: E54453$E54455$MenuBreak:$2,
        • API String ID: 749160242-2763812799
        • Opcode ID: 01384d17c44535a4775a5fae233c72a668d02f8f0220eba0a0897de32b0c3c72
        • Instruction ID: ae8bf0fb2b8ac56c75039195bb49617105d3e424e9a1fa973d64a3bfbcaa12ab
        • Opcode Fuzzy Hash: 01384d17c44535a4775a5fae233c72a668d02f8f0220eba0a0897de32b0c3c72
        • Instruction Fuzzy Hash: D9210B71B11218B7CF14A7A59C56AEE77AD9BC8320F10406FF901F7381DAB85E418798
        APIs
        • InitCommonControlsEx.COMCTL32(?), ref: 00428E8F
        • CreateWindowExW.USER32(00000000,tooltips_class32,00456168,?,80000000,80000000,80000000,80000000,00000000,00000000,?,00000000), ref: 00428ECA
        • SendMessageW.USER32(00000004,00000432,00000000,0000002C), ref: 00428F31
        • SendMessageW.USER32(00000004,00000421,00000001,?), ref: 00428F46
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$CommonControlsCreateInitWindow
        • String ID: ,$No Text associated$tooltips_class32
        • API String ID: 3342334947-1383969392
        • Opcode ID: c1e45a4e3f247445cfc8ed18c1330415fc3ecb413c95c108c4e7451c0e230ecf
        • Instruction ID: 8e3712aa7acb00232c6ec16f81002e9e2d711b15805aa15c19c7bcd2e4cca355
        • Opcode Fuzzy Hash: c1e45a4e3f247445cfc8ed18c1330415fc3ecb413c95c108c4e7451c0e230ecf
        • Instruction Fuzzy Hash: E42171B1A01309AFDB10CF95DD85AAFBBF9FB48314F50402EF615E3290C7B499048B64
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: RectWindow$CopyH_prologPlacement
        • String ID: %d;%d;%d;%d;%d;x,y,w,h,SW$4AD
        • API String ID: 2334692988-2850367280
        • Opcode ID: 862b562614c300bc7ab5342033d1ae2c2d71864fbfc8642c50e39b91a232349b
        • Instruction ID: fe6b21715060f9ee3ad9911a439f44bc9ffd1e215c6b3483b9d16e6980fe2404
        • Opcode Fuzzy Hash: 862b562614c300bc7ab5342033d1ae2c2d71864fbfc8642c50e39b91a232349b
        • Instruction Fuzzy Hash: F321E572D00119AACF11DFD4DC85EEEBBB9FF48305F00442AE901B6151D779AA19CB64
        APIs
        • __EH_prolog.LIBCMT ref: 00427C1F
        • RegSetValueExW.ADVAPI32(0000006F,_________ADMIN_TEST_SoftwareOK_DOK,00000000,00000004,00000000,00000004,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00020006,?,?,?,?,004211E5,?), ref: 00427C75
        • RegCloseKey.ADVAPI32(0000006F,?,?,?,004211E5,?,?,00000000,?), ref: 00427C8D
        • RegDeleteValueW.ADVAPI32(0000006F,_________ADMIN_TEST_SoftwareOK_DOK,?,?,?,004211E5,?,?,00000000,?), ref: 00427C9B
        • RegCloseKey.ADVAPI32(0000006F,?,?,?,004211E5,?,?,00000000,?), ref: 00427CB2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CloseValue$DeleteH_prolog
        • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion$_________ADMIN_TEST_SoftwareOK_DOK
        • API String ID: 2485495262-3000701925
        • Opcode ID: 9bd88f4235432e50c426d5700a8792d4f1201c1e48b424f363935baa0b819853
        • Instruction ID: b68bf3dc38133edbe771ec151f4e5719081e62b5f70673435e2283974a714e34
        • Opcode Fuzzy Hash: 9bd88f4235432e50c426d5700a8792d4f1201c1e48b424f363935baa0b819853
        • Instruction Fuzzy Hash: 511194B0A00225EBCB219FA6EC45BAFBBB9FB84701F00062BF111B51A1C7784940DB68
        APIs
        • SetBkColor.GDI32(?,00000000), ref: 00436DB1
        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 00436DD3
        • SetBkColor.GDI32(?,00000000), ref: 00436DDF
        • SetPixel.GDI32(?,?,00000000,00000000), ref: 00436E0C
        • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 00436E1D
        • SetPixel.GDI32(?,?,00000000,00000000), ref: 00436E55
        • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 00436E66
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Pixel$Color$Text
        • String ID:
        • API String ID: 98714010-0
        • Opcode ID: 823f748bbc1fa12dc0c71d92b990de8f11a86ca1ce6d5b11bbc1689569002d4a
        • Instruction ID: d099eac011f95741b9d61141177dafcc1c442d3a7173c642c8adaa2b6a63c7a4
        • Opcode Fuzzy Hash: 823f748bbc1fa12dc0c71d92b990de8f11a86ca1ce6d5b11bbc1689569002d4a
        • Instruction Fuzzy Hash: DF510572A0011EAFCF01CFA8CD859EE7BB5FF08348F02812AFD54A6250C3759D259B94
        APIs
        • __EH_prolog.LIBCMT ref: 00424935
        • SendMessageW.USER32(?,00001073,?,?), ref: 004249B2
        • lstrlenW.KERNEL32(00000000), ref: 004249C1
        • lstrcpynW.KERNEL32(?,?,?,?,No-Edit,?,?,00000001), ref: 00424A5B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: H_prologMessageSendlstrcpynlstrlen
        • String ID: 4AD$No-Edit
        • API String ID: 1355327639-2827627885
        • Opcode ID: ca2140508e88d2823e51b227dfb65c55b94b4dd3de4d7bb3ec7bc2a5443e0de2
        • Instruction ID: 525aca3b652f3ad0fd2ff23f3a39ad9f164bad48392fc2ea544207c4399d0d49
        • Opcode Fuzzy Hash: ca2140508e88d2823e51b227dfb65c55b94b4dd3de4d7bb3ec7bc2a5443e0de2
        • Instruction Fuzzy Hash: 3941C4B2A10219DFDB10DFA4D885AEF77B4EF54314F10452FE401A72C0DB785A44CBA8
        APIs
          • Part of subcall function 0042C5A9: CreateWindowExW.USER32(00000000,ToolbarWindow32,00000000,?,?,00000000,?,00000000,?,00000000,00000000,5600094E), ref: 0042C5ED
        • SendMessageW.USER32(00000000,0000041E,00000014,00000000), ref: 0042BE92
        • SendMessageW.USER32(?,00000444,00000001,?), ref: 0042BEBC
        • SendMessageW.USER32(?,00000420,00000000,000B000D), ref: 0042BECD
        • SendMessageW.USER32(?,0000041F,00000000,00120014), ref: 0042BEDC
        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000014,00000012,00000016,?,00000000,5600094E,00000000,00000000,?,00000000,?), ref: 0042BF04
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$Window$Create
        • String ID: R
        • API String ID: 363225742-880014062
        • Opcode ID: 44d74488b458383f830a37710df3e5c9157c40167d0e38d6889842612e2d3058
        • Instruction ID: 4f984f6de87d68ed15a3930f1a19e0a1d8b0ccabfa63d346ffacca1ab36ff6cb
        • Opcode Fuzzy Hash: 44d74488b458383f830a37710df3e5c9157c40167d0e38d6889842612e2d3058
        • Instruction Fuzzy Hash: 4421A431740268BAEB205B5ADC46FDB7FB9EBC9B04F40005AB700FA1E6C6F05904DAE5
        APIs
        • __EH_prolog.LIBCMT ref: 0042415B
          • Part of subcall function 00424245: lstrcpyW.KERNEL32(?), ref: 0042425B
          • Part of subcall function 00424245: lstrcatW.KERNEL32(?,00000000,\Backup), ref: 0042428F
          • Part of subcall function 00424245: CreateDirectoryW.KERNEL32(?,00000000), ref: 004242A6
          • Part of subcall function 00424245: lstrlenW.KERNEL32(?), ref: 004242BD
        • GetLocalTime.KERNEL32(?), ref: 0042416C
          • Part of subcall function 00407444: VirtualProtect.KERNELBASE(?,?,00000040,?,?,0040747C,0040747C,004069C8,?,?,?,?,?,?,?,?), ref: 00407A89
        • CopyFileW.KERNEL32(?,00000000,?,00000000,?,?,0048039C,00000000,00445508), ref: 00424207
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CopyCreateDirectoryFileH_prologLocalProtectTimeVirtuallstrcatlstrcpylstrlen
        • String ID: %02d-%02d-%02d_%02d-%02d-%02d_%s.ini$4AD$last_backup
        • API String ID: 1991952598-3850644810
        • Opcode ID: 0b6ea9ea858fb0d9771e00a0bf0901a3b96955d2430ac15d4086b361ea50361a
        • Instruction ID: 8c1af6343298e20960110cf1ab86fd2bd36cdd14f9dc99471fedbc98cf0c5e88
        • Opcode Fuzzy Hash: 0b6ea9ea858fb0d9771e00a0bf0901a3b96955d2430ac15d4086b361ea50361a
        • Instruction Fuzzy Hash: 74214BB1C00249AADB00EBE5C946BFEBBB8AF08705F10406AF551B31C2D77C9A44D779
        APIs
          • Part of subcall function 00424245: lstrcpyW.KERNEL32(?), ref: 0042425B
          • Part of subcall function 00424245: lstrcatW.KERNEL32(?,00000000,\Backup), ref: 0042428F
          • Part of subcall function 00424245: CreateDirectoryW.KERNEL32(?,00000000), ref: 004242A6
          • Part of subcall function 00424245: lstrlenW.KERNEL32(?), ref: 004242BD
        • MessageBoxW.USER32(?,00000000,00000000,00000000), ref: 00423C42
        • lstrcpyW.KERNEL32(?), ref: 00423C62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrcpy$CreateDirectoryMessagelstrcatlstrlen
        • String ID: Error 321$open$use_backup_d$use_backup_h
        • API String ID: 2723441971-4221616228
        • Opcode ID: 4c4bb09373d20a6c2803dccd173523e41e1d200dbffac5f50e3391eb70922121
        • Instruction ID: 5a414714267ca566798a7933c35b8ce7628397c0567d460f9e152fcddd83709a
        • Opcode Fuzzy Hash: 4c4bb09373d20a6c2803dccd173523e41e1d200dbffac5f50e3391eb70922121
        • Instruction Fuzzy Hash: B811E772620220AEDB246F31FC0AA7E3768EB00306F50487FF901F2191F97D9A55975D
        APIs
        • CallWindowProcW.USER32(?,00000014,?,?), ref: 0043624A
        • GetParent.USER32(?), ref: 0043625E
        • GetParent.USER32(00000000), ref: 00436261
        • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 0043627D
        • OffsetWindowOrgEx.GDI32(?,?,?,?), ref: 00436296
        • SendMessageW.USER32(00000000,00000014,?,00000000), ref: 0043629F
        • OffsetWindowOrgEx.GDI32(?,?,?,?), ref: 004362BA
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$OffsetParent$CallMessagePointsProcSend
        • String ID:
        • API String ID: 593092700-0
        • Opcode ID: 626aed2c86cc15b35851dd1dd7cd3fbf682c3f01cfdcc080fc99eecc66589346
        • Instruction ID: 1b369d1bca0969bd8b2634237acd7de0d378513594854ca44be8d192bcae6432
        • Opcode Fuzzy Hash: 626aed2c86cc15b35851dd1dd7cd3fbf682c3f01cfdcc080fc99eecc66589346
        • Instruction Fuzzy Hash: 6D11A77690025DBFDF119F95DC84CEEBFBEFB48350F018466FA15A2160C6719A10AF64
        APIs
        • lstrcpyW.KERNEL32(?), ref: 0042425B
        • lstrcatW.KERNEL32(?,00000000,\Backup), ref: 0042428F
        • CreateDirectoryW.KERNEL32(?,00000000), ref: 004242A6
        • lstrlenW.KERNEL32(?), ref: 004242BD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CreateDirectorylstrcatlstrcpylstrlen
        • String ID: \Backup$hAB
        • API String ID: 291623610-2780332934
        • Opcode ID: df9651015e083aa5677f6518775e4b3ace0f5f424d346ddda6fe4bd26c0da0b8
        • Instruction ID: 5d9425836112100eaf2b6b8e5aeeddb2b8b346ef44fab14ca78b7b7aa9d58edc
        • Opcode Fuzzy Hash: df9651015e083aa5677f6518775e4b3ace0f5f424d346ddda6fe4bd26c0da0b8
        • Instruction Fuzzy Hash: 180156F59101099BDF10EBA1DD59F9A777CAB44304F0004E5A705F20D2DB749A458F5C
        APIs
        • SetRect.USER32(0042BD45,00000000,00000000,00000000,?), ref: 0042D44B
        • SetWindowPos.USER32(?,00000000,00000002,00000003,00000000,00000000,00000015,?,?,0042BD45,?,00000000), ref: 0042D468
        • SetWindowPos.USER32(?,00000000,00000000,?,00000000,?,00000004,?,?,0042BD45,?,00000000), ref: 0042D483
        • SetRect.USER32(0042BD45,00000000,00000000,00000000,00000000), ref: 0042D49B
        • SetWindowPos.USER32(?,00000000,-000000E9,00000003,00000000,00000000,00000015,?,?,0042BD45,?,00000000), ref: 0042D4BD
        • InvalidateRect.USER32(00000000,0042BD45,00000001,?,?,0042BD45,?,00000000), ref: 0042D4E7
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: RectWindow$Invalidate
        • String ID:
        • API String ID: 1056487977-0
        • Opcode ID: 5afb842bdec1a3cce351e7e9e9114239a5e0f35c927c0db12be784a85ca540a9
        • Instruction ID: 9a7c52b52044f0b9150fede3bba70a30080b0dbe8a6437ef3e0f636978d02bb5
        • Opcode Fuzzy Hash: 5afb842bdec1a3cce351e7e9e9114239a5e0f35c927c0db12be784a85ca540a9
        • Instruction Fuzzy Hash: 1F3143B2600618BFEB119FA4DCC4EBBB7ADEB48754F408529FA46E7650C670FD018B64
        APIs
        • GetWindowLongW.USER32(00000000,000000FC), ref: 004362F0
        • SetWindowLongW.USER32(?,000000FC,0043622C), ref: 00436305
        • GetClientRect.USER32(?,00000000), ref: 0043631D
        • SendMessageW.USER32(?,00000418,00000000,00000000), ref: 0043634A
        • SendMessageW.USER32(?,0000041D,-00000001,?), ref: 0043635A
        • SetWindowPos.USER32(?,00000000,00420BC1,?,00420BC1,?,00000040,?,?,?,00420BC1,00000000,00000000), ref: 00436379
          • Part of subcall function 004360E5: CreateWindowExW.USER32(76AB2370,ToolbarWindow32,00000000,00000000,00000000,00000000,000000B4,00000014,00000000,00000000,00000000,00000000), ref: 00436113
          • Part of subcall function 004360E5: GetStockObject.GDI32(00000011), ref: 00436127
          • Part of subcall function 004360E5: GetObjectW.GDI32(00000000,0000005C,?), ref: 00436145
          • Part of subcall function 004360E5: SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0043616E
          • Part of subcall function 004360E5: CreateFontIndirectW.GDI32(?), ref: 0043618A
          • Part of subcall function 004360E5: SendMessageW.USER32(00000000,00000030,?,00000000), ref: 004361A2
          • Part of subcall function 004360E5: SendMessageW.USER32(00000000,0000041E,00000014,00000000), ref: 004361AF
          • Part of subcall function 004360E5: SendMessageW.USER32(00000000,00000420,00000000,00100000), ref: 004361BF
          • Part of subcall function 004360E5: GetDlgItem.USER32(00000000,?), ref: 004361CC
          • Part of subcall function 004360E5: ShowWindow.USER32(00000000,00000000), ref: 004361E1
          • Part of subcall function 004360E5: GetWindowRect.USER32(00000000,00000000), ref: 004361EC
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Window$MessageSend$CreateLongObjectRect$ClientFontIndirectInfoItemParametersShowStockSystem
        • String ID:
        • API String ID: 3062793459-0
        • Opcode ID: cdd7510cf0f21a5f206af28a3c6f98eba230aeda3fa79f76c1b1993af790ee0a
        • Instruction ID: 6fa5585dfdfa755437bdcf99a996e14e6fb65e5566723ec97538393471b35915
        • Opcode Fuzzy Hash: cdd7510cf0f21a5f206af28a3c6f98eba230aeda3fa79f76c1b1993af790ee0a
        • Instruction Fuzzy Hash: 882162B2900619BFEB11AFA4DC85CBFBBB9FB08754F004529F612A11A0C772AD10CB54
        APIs
        • __EH_prolog.LIBCMT ref: 00430278
        • GetWindowDC.USER32(?,?,?,?,00000001), ref: 004302B5
          • Part of subcall function 004318E0: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 00431915
          • Part of subcall function 004318E0: CreatePatternBrush.GDI32(00000000), ref: 00431922
          • Part of subcall function 004318E0: DeleteObject.GDI32(00000000), ref: 0043192B
        • SelectObject.GDI32(?,?), ref: 004302DA
        • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 004302FA
        • SelectObject.GDI32(?,00000000), ref: 00430304
        • DeleteObject.GDI32(?), ref: 00430307
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Object$CreateDeleteSelect$BitmapBrushH_prologPatternWindow
        • String ID:
        • API String ID: 3230913206-0
        • Opcode ID: f6250e884e8d8b66865a145d47d1cc8868aca51843dab574d2639dc39cc198a2
        • Instruction ID: c11674e792ad895603e7ae83b2f7238172a1f69c4ea2e823c6e8fab6d9ad6268
        • Opcode Fuzzy Hash: f6250e884e8d8b66865a145d47d1cc8868aca51843dab574d2639dc39cc198a2
        • Instruction Fuzzy Hash: 5F21E572D00219AFCB00EFE9CD869EEBBB9FB08350F04516AE515B3291D7399941CBA4
        APIs
        • SendMessageW.USER32(?,00000401,0000807B), ref: 00425C86
        • SendMessageW.USER32(?,00000401,0000807D), ref: 00425C90
        • SendMessageW.USER32(?,00000401,00008019), ref: 00425C9B
        • SendMessageW.USER32(?,00000401,0000807B,00000000), ref: 00425CB7
        • SendMessageW.USER32(?,00000401,0000807D,00000000), ref: 00425CC2
        • SendMessageW.USER32(?,00000401,00008019,00000000), ref: 00425CD6
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend
        • String ID:
        • API String ID: 3850602802-0
        • Opcode ID: 76cfa821a99e5cd8c24453d739d7a6786c4f021e617c5beb8bf8cb98bf5a9bfa
        • Instruction ID: ca941d673646c457d2aca30d321aa660bec5691bca5c67db969b8d8c9d1bec7e
        • Opcode Fuzzy Hash: 76cfa821a99e5cd8c24453d739d7a6786c4f021e617c5beb8bf8cb98bf5a9bfa
        • Instruction Fuzzy Hash: 0701D171B4432876D23096379C88F277EACEBC2F61F15442AB644E60C1CA79A804C774
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CombineDesktopFolderFreeH_prolog
        • String ID: 4AD
        • API String ID: 2472301591-1156607891
        • Opcode ID: e1c6b5c3396b9a74d4f7803e7b67e7efc60ef74d1efc0caebdd765398830d3df
        • Instruction ID: c43f26274bbcab29b743a3eba8f8bc5ae05b5634fbb95af1ae08d608ebfbef1e
        • Opcode Fuzzy Hash: e1c6b5c3396b9a74d4f7803e7b67e7efc60ef74d1efc0caebdd765398830d3df
        • Instruction Fuzzy Hash: 10516071904259EFDF10DFA4C989ADEBBB8EF48314F1040AAF505B7281C778AE04CBA5
        APIs
        • __EH_prolog.LIBCMT ref: 0042A4E9
        • lstrlenW.KERNEL32(?,?,0046FFE0), ref: 0042A570
        • lstrlenW.KERNEL32(?,?,?,00445D30,?,?,?,0046FFE0), ref: 0042A5DD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrlen$H_prolog
        • String ID: 4AD$m_disables_keys
        • API String ID: 3834905643-3718384811
        • Opcode ID: 0dfa868d52948fbc8b2c1228345894ddb1caae4a3c39d20becbd74c91e7cdc32
        • Instruction ID: 203e1165c2efaf393f61b6ac4cb0d9602c11fb244ee757658ad2b0e580db4f88
        • Opcode Fuzzy Hash: 0dfa868d52948fbc8b2c1228345894ddb1caae4a3c39d20becbd74c91e7cdc32
        • Instruction Fuzzy Hash: 64413D3590011AAFCB14DBD5E999DEEB7B8BF08304F5440AEE405B3291EB78AE44CF19
        APIs
        • RegOpenKeyW.ADVAPI32(-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,?), ref: 004374AB
        • lstrlenW.KERNEL32(?,?,?,00437486,?,?,?,?," -bg,?,?,?,00454984), ref: 004374BA
        • RegSetValueExW.ADVAPI32(00000000,00000208,00000000,00000001,?,00000000,?,?,00437486,?,?,?,?," -bg,?,?), ref: 004374CF
        • RegCloseKey.ADVAPI32(00000000,?,?,00437486,?,?,?,?," -bg,?,?,?,00454984), ref: 004374DA
        Strings
        • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 00437499
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CloseOpenValuelstrlen
        • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
        • API String ID: 2964171075-3913687870
        • Opcode ID: 30a21f67d9d09dc05d4b23aefdb543e1f9a85324633e6cdcfef0dd8a64dfa347
        • Instruction ID: 2ceedae9dc0c1995bab63891bbcd1d91b5384f924f370bdbf12778e3a071c21b
        • Opcode Fuzzy Hash: 30a21f67d9d09dc05d4b23aefdb543e1f9a85324633e6cdcfef0dd8a64dfa347
        • Instruction Fuzzy Hash: 94F09A3781036AEBDF210FA0DC4ABEB3B69FF043A1F018620FC28A5160D775C9609B94
        APIs
        • InvalidateRect.USER32(76AA4920,?,00000001,?,76AA4920,?,00000001), ref: 0042BC10
        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004,?,?,?,76AA4920,?,00000001), ref: 0042BC4F
        • InvalidateRect.USER32(76AA4920,?,00000001,?,?,?,76AA4920,?,00000001), ref: 0042BC60
        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004,?,?,76AA4920,?,00000001), ref: 0042BCA7
        • InvalidateRect.USER32(76AA4920,?,00000001,?,?,76AA4920,?,00000001), ref: 0042BCB8
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: InvalidateRect$Window
        • String ID:
        • API String ID: 2579585970-0
        • Opcode ID: d25773a06468afcf545132c1d8922e7dc084e531c35e1c88104e25638d9c6b93
        • Instruction ID: 19135094c6df45e34b20abd5c0d7e70cbf642a7af8c4ebe2beb88d05cbd2d263
        • Opcode Fuzzy Hash: d25773a06468afcf545132c1d8922e7dc084e531c35e1c88104e25638d9c6b93
        • Instruction Fuzzy Hash: F6311BB2A0011AEFCF10DF99D9869FFBB79EB44314F50016AE611A3290CB356941DB95
        APIs
        • lstrlenW.KERNEL32(00000000), ref: 004264F0
        • GetEnvironmentVariableW.KERNEL32(?,?,00000208), ref: 00426567
        • lstrcatW.KERNEL32(?,?), ref: 00426595
        • lstrlenW.KERNEL32(?), ref: 004265B0
        • lstrcpyW.KERNEL32(00000000,?), ref: 004265E5
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrlen$EnvironmentVariablelstrcatlstrcpy
        • String ID:
        • API String ID: 4067718196-0
        • Opcode ID: 86be6e8e676a898886ac47cfaa553324e04788df2af4b040843772a523e0cc2c
        • Instruction ID: a93edea7da4d4899329c06e4eb84b9fb86500c73c2a2d66807996ec3ed989cbd
        • Opcode Fuzzy Hash: 86be6e8e676a898886ac47cfaa553324e04788df2af4b040843772a523e0cc2c
        • Instruction Fuzzy Hash: 8431B072910228ABCF21DF48EC846DEB3F4FF18300F5045A6D945E3220E7749AD58BD8
        APIs
        • GetSystemMetrics.USER32(?), ref: 0043033D
        • GetWindowLongW.USER32(?,000000EC), ref: 0043035C
        • GetSystemMetrics.USER32(?), ref: 00430372
        • GetSystemMetrics.USER32(?), ref: 0043038E
        • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 0043039F
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: System$Metrics$InfoLongParametersWindow
        • String ID:
        • API String ID: 72108969-0
        • Opcode ID: 1cc4a1359398968863d07bd687d5fdc9b902957087c532c0d436a0cca70025cd
        • Instruction ID: e0a1c76b84bf8acbd95bf98adef0aa024b93c271ea1de0d9e930c4df4dd8b195
        • Opcode Fuzzy Hash: 1cc4a1359398968863d07bd687d5fdc9b902957087c532c0d436a0cca70025cd
        • Instruction Fuzzy Hash: FC11AC722507109FE7209F39CD4AB6AB3E4EBA8710F001B2EE482C76D0D778E845CB48
        APIs
        • GetClientRect.USER32(?,?), ref: 0041F60F
        • GetDlgItem.USER32(?,000003F7), ref: 0041F642
        • SetWindowPos.USER32(00000000), ref: 0041F64B
        • GetDlgItem.USER32(?,0000041D), ref: 0041F655
        • SetWindowPos.USER32(00000000,00000000,?,?,?,00000014,00000000), ref: 0041F66F
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: ItemWindow$ClientRect
        • String ID:
        • API String ID: 3857652467-0
        • Opcode ID: 2ec0658b5d4e4b8b45ed11b5361e37e669d432922f7a65f0b14cab60ca4adec7
        • Instruction ID: 39b0bc59052787c31fa0be47496c43408b3b1618e3587cfc5ac7796f203d5fa7
        • Opcode Fuzzy Hash: 2ec0658b5d4e4b8b45ed11b5361e37e669d432922f7a65f0b14cab60ca4adec7
        • Instruction Fuzzy Hash: 1B010476A00219BBDF00EBE8DC55FBE7B7DEB88700F040158F611B61A2C671AA10DBA4
        APIs
        • lstrcatW.KERNEL32(?,00456168), ref: 00426E3B
        • GetModuleHandleW.KERNEL32(00000000), ref: 00426E4E
        • GetOpenFileNameW.COMDLG32(0000004C), ref: 00426E7C
          • Part of subcall function 00427502: __EH_prolog.LIBCMT ref: 00427507
          • Part of subcall function 00427502: InterlockedIncrement.KERNEL32(-000000F4), ref: 00427532
          • Part of subcall function 00427502: wsprintfW.USER32 ref: 004275DA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: FileH_prologHandleIncrementInterlockedModuleNameOpenlstrcatwsprintf
        • String ID: L
        • API String ID: 998826993-2909332022
        • Opcode ID: 56594663d0703831b2f3f0b6afeaadba6e808f07715dbfa4f927eebb35addb0f
        • Instruction ID: 5d8469f7ef1b97ed5ccfa38109bf4958b2e7bba871ead841c3b78ac34a2f7ac0
        • Opcode Fuzzy Hash: 56594663d0703831b2f3f0b6afeaadba6e808f07715dbfa4f927eebb35addb0f
        • Instruction Fuzzy Hash: 76116A71E003589BDF54CF94CC457DEB7B9BF48302F00406AD105B7280DBB95A898F59
        APIs
        • SendMessageW.USER32(00000000,00000444,00000001,?), ref: 004359F6
        • SendMessageW.USER32(00000000,00000440,?,00000020), ref: 00435A0E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend
        • String ID: $:cC
        • API String ID: 3850602802-2689247352
        • Opcode ID: b6be724ffc89ea9c68968f2ea9316348c7c60fb0f0a11f3cf0fab30b33a0f5c2
        • Instruction ID: c420a73713401dbab9f0e02ccf6eaa8cd534b2db7598aba9dc244a5b4b478a92
        • Opcode Fuzzy Hash: b6be724ffc89ea9c68968f2ea9316348c7c60fb0f0a11f3cf0fab30b33a0f5c2
        • Instruction Fuzzy Hash: 03113071A0028CEFDF00CFD9D844BDEBBB4EF44314F048016E914AA295D3B59515DF65
        APIs
        • GetDlgItem.USER32(?,?), ref: 004216B1
        • SendMessageW.USER32(?,00000433,00000000,?), ref: 004216EC
        • SendMessageW.USER32(?,00000432,00000000,0000002C), ref: 00421717
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$Item
        • String ID: ,
        • API String ID: 3888421826-3772416878
        • Opcode ID: 54e00455506e2c76601c277b6ec646d38a313d747a679faeb7b5c55891d413a2
        • Instruction ID: e5665baada64295f7c02611f98c27c35f43ebbc44d05b6f3011a9d3297f79af1
        • Opcode Fuzzy Hash: 54e00455506e2c76601c277b6ec646d38a313d747a679faeb7b5c55891d413a2
        • Instruction Fuzzy Hash: BE11AF76E00218AFDB00DFA9DC55ADDBBB4FF4C710F109026EA14BB290D6B59A45CF68
        APIs
        • RegOpenKeyW.ADVAPI32(-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,?), ref: 00437509
        • RegDeleteValueW.ADVAPI32(?,?), ref: 0043751B
        • RegCloseKey.ADVAPI32(?), ref: 00437526
        Strings
        • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 004374F7
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CloseDeleteOpenValue
        • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
        • API String ID: 849931509-3913687870
        • Opcode ID: 0220bb65a57990b1609bbb8ec334c0a7c02d6554820eec917214b62211459a15
        • Instruction ID: 59c5435105357cda73140981fc49627d41e5a9f77ffab6543ae7563a6603dc63
        • Opcode Fuzzy Hash: 0220bb65a57990b1609bbb8ec334c0a7c02d6554820eec917214b62211459a15
        • Instruction Fuzzy Hash: 5DE03037810229EBCF251FB0DC4969A7BA5EB08371F01C125FD18AA210D739C9409F94
        APIs
        • LoadLibraryW.KERNEL32(USER32.DLL,00435EA8,?,?,?,?), ref: 00435528
        • GetProcAddress.KERNEL32(?,SetMenuInfo), ref: 00435546
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: AddressLibraryLoadProc
        • String ID: SetMenuInfo$USER32.DLL
        • API String ID: 2574300362-3329878150
        • Opcode ID: 98adff75472883bb36f32fb166f88d904f831f7eadf3cd23d295b96331bbcdeb
        • Instruction ID: 5916e2fc36fe8bba6e0fc43ecc7b0183c6b496dbd579211a3983e5e27e86c943
        • Opcode Fuzzy Hash: 98adff75472883bb36f32fb166f88d904f831f7eadf3cd23d295b96331bbcdeb
        • Instruction Fuzzy Hash: FAE0C271620600AFDF619F24EC0971A3AA5F728742F00683AB40A922A4D778A448EF4C
        APIs
        • SetPixel.GDI32(?,?,00000000,?), ref: 00436C99
        • SetPixel.GDI32(?,?,00000000,?), ref: 00436CA7
        • SetPixel.GDI32(?,?,00000000,?), ref: 00436CB5
        • SetPixel.GDI32(?,?,00000000,?), ref: 00436CC3
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Pixel
        • String ID:
        • API String ID: 3195210534-0
        • Opcode ID: f5ac0db82702d0b4e9d5f0b973c34283a37342df7875bbe1c37e92ff6137fece
        • Instruction ID: db52c432db6c09696b0e690863e35eee4e14e024e0a01d6cddf26fbad3f81550
        • Opcode Fuzzy Hash: f5ac0db82702d0b4e9d5f0b973c34283a37342df7875bbe1c37e92ff6137fece
        • Instruction Fuzzy Hash: 0421F33290011EEFCF019FA9DD458DEBFB2FF48350F158166EA14A2260C7359A61EB90
        APIs
        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00429B97
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 00429BCF
        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00429BE3
        • CloseHandle.KERNEL32(?), ref: 00429BEC
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: File$ByteCharCloseCreateHandleMultiWideWrite
        • String ID:
        • API String ID: 1078690013-0
        • Opcode ID: fcd345e099a6bf93a850157cf3f6ac57d52df9ba181830237b478ca082b12d32
        • Instruction ID: 82ed86162d68cebab0e1acd3225a60407c9899cbbfb5fde9063b479654f97b37
        • Opcode Fuzzy Hash: fcd345e099a6bf93a850157cf3f6ac57d52df9ba181830237b478ca082b12d32
        • Instruction Fuzzy Hash: 1E113A71100008BFEB209F55DC89EAABBBDEB89754F10416AF511E71E0DB70AE41DB64
        APIs
        • CallWindowProcW.USER32(?,?,?,00000005,?), ref: 0042D29E
        • GetMessagePos.USER32 ref: 0042D2B0
        • ScreenToClient.USER32(?,?), ref: 0042D2CC
        • PtInRect.USER32(?,?,?), ref: 0042D2EE
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CallClientMessageProcRectScreenWindow
        • String ID:
        • API String ID: 2980354656-0
        • Opcode ID: 7a72edbe208eb9f7f80a718336dc999f757fa1644bf2837c0e2e88546a471468
        • Instruction ID: 2b02a2273540d2a3acd45090b37fce7c15d31cc95de6c475789917453dd6b7b5
        • Opcode Fuzzy Hash: 7a72edbe208eb9f7f80a718336dc999f757fa1644bf2837c0e2e88546a471468
        • Instruction Fuzzy Hash: 0D11A372E00229AF8F219F94DC898AFBFB9FB04315B504166EC45E2210D7359911D794
        APIs
        • SendMessageW.USER32(?,00000419,?,00000000), ref: 004254F9
        • SendMessageW.USER32(?,0000041D,00000000,?), ref: 00425506
        • ClientToScreen.USER32(?), ref: 00425527
        • SendMessageW.USER32(?,00000403,?,00000001), ref: 00425538
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageSend$ClientScreen
        • String ID:
        • API String ID: 1264711397-0
        • Opcode ID: 21e99f49a25e7fbfcdc5034213d00d10bced2840db0a81dce533fe62294a2d52
        • Instruction ID: 10029316b969c1ebf7fa3ffa1d4ece043839d52826b7b2918982b16436b64cd7
        • Opcode Fuzzy Hash: 21e99f49a25e7fbfcdc5034213d00d10bced2840db0a81dce533fe62294a2d52
        • Instruction Fuzzy Hash: BA01EDB6600308BFD714DF59DC85E9ABBE8EF48710F00841DFA5AA7291D6B0A940CF64
        APIs
        • GetClientRect.USER32(00000000,00000000), ref: 0042D600
        • GetWindowLongW.USER32(00000000,000000EC), ref: 0042D622
        • DrawEdge.USER32(?,0000200F,0000000A,0000200F), ref: 0042D63D
        • FillRect.USER32(?,?,0000000D), ref: 0042D64C
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: Rect$ClientDrawEdgeFillLongWindow
        • String ID:
        • API String ID: 3481374107-0
        • Opcode ID: e8cfec484e0ef5a0949931e2ad442549fda3965c659d69b96471c2229f3c6ed5
        • Instruction ID: 96f4ce3220ef17525b354dea075bca18e00ecb8dabc2a2a3ce0780306437d17c
        • Opcode Fuzzy Hash: e8cfec484e0ef5a0949931e2ad442549fda3965c659d69b96471c2229f3c6ed5
        • Instruction Fuzzy Hash: 05012132900219BFDB109F64DC49FAABBB8FB54750F004926F955F2160D770A9058B95
        APIs
        • InterlockedExchange.KERNEL32(004808E8,00000001), ref: 004380C8
        • InitializeCriticalSection.KERNEL32(004808D0,?,?,?,00422D81), ref: 004380D3
        • EnterCriticalSection.KERNEL32(004808D0,?,?,?,0042CB90,?,?,00470638,?,?,?,00422D81), ref: 00438112
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: CriticalSection$EnterExchangeInitializeInterlocked
        • String ID:
        • API String ID: 3643093385-0
        • Opcode ID: d66494a0eb13fe10eba1f62d4e9df0684cb66f902e58c6fc4cb43092a07d42e0
        • Instruction ID: c9d80109e13dfd4b469843542c2470c3f20b05a7db7b7469771456da1fb489db
        • Opcode Fuzzy Hash: d66494a0eb13fe10eba1f62d4e9df0684cb66f902e58c6fc4cb43092a07d42e0
        • Instruction Fuzzy Hash: 7CF04930B80300D7D9A0B7546C85A1F73A4EB48351F20243FF504E0102CD6848C9679D
        APIs
          • Part of subcall function 00435E57: GetSysColor.USER32(00000004), ref: 00435E70
          • Part of subcall function 00435E57: CreateSolidBrush.GDI32(00202020), ref: 00435E79
        • GetCurrentThreadId.KERNEL32 ref: 00435EC8
        • SetWindowsHookExW.USER32(000000FF,0043607A,00000000,00000000), ref: 00435ED9
        • TrackPopupMenuEx.USER32(00000001,?,?,?,?,00000000), ref: 00435EFB
          • Part of subcall function 00435BC2: SendMessageW.USER32(?,00000403,?,?), ref: 00435BDA
        • UnhookWindowsHookEx.USER32(?), ref: 00435F17
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: HookWindows$BrushColorCreateCurrentMenuMessagePopupSendSolidThreadTrackUnhook
        • String ID:
        • API String ID: 848778860-0
        • Opcode ID: 1d873a512fcda4e245097d57ed7911f59a8c40b2c60a321dac30504288063662
        • Instruction ID: cf64ac5a47d6376922e15437f2d7f2f83126d17ed40067883966b7e05527ed14
        • Opcode Fuzzy Hash: 1d873a512fcda4e245097d57ed7911f59a8c40b2c60a321dac30504288063662
        • Instruction Fuzzy Hash: 81015672100204BFEBA25F56EC8985ABFF9EFA8720B10552EF41992270C7B568909F58
        APIs
        • __EH_prolog.LIBCMT ref: 0042172D
        • SendMessageW.USER32(?,00000440,?,00000000), ref: 00421798
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: H_prologMessageSend
        • String ID: 4AD
        • API String ID: 2337391251-1156607891
        • Opcode ID: 7c7efd9a41c4564eb31d483a36773584485011917f6f380ef5ccd48d1d8448ba
        • Instruction ID: 733a4daa048f09d878c84373d9e27e6e514a652ddd9bfd7e8f13655adea388da
        • Opcode Fuzzy Hash: 7c7efd9a41c4564eb31d483a36773584485011917f6f380ef5ccd48d1d8448ba
        • Instruction Fuzzy Hash: 06116A72D14248EBDB10DFA9D845BDEFBB8BF54318F10816AE251B71D0C7B85648CBA8
        APIs
        • SHGetFileInfoW.SHELL32(C:\,00000000,00004001,000002B4,00004001), ref: 00435438
        • SHGetFileInfoW.SHELL32(C:\,00000000,?,000002B4,00004000), ref: 0043544B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: FileInfo
        • String ID: C:\
        • API String ID: 4041567068-3404278061
        • Opcode ID: 01dc84b88e69e622cc95e543275c728969252cc4be772f7a86a4fbfaad203ff7
        • Instruction ID: 1c494cc5095be1daaf244086f18a01e1dbc19f33f732a340317776a5c34a2c14
        • Opcode Fuzzy Hash: 01dc84b88e69e622cc95e543275c728969252cc4be772f7a86a4fbfaad203ff7
        • Instruction Fuzzy Hash: 99F012B25007046FF324DA15FD80B67B7DCEBC5704F41883AB650A7291D7B569088B6A
        APIs
          • Part of subcall function 00425052: wsprintfW.USER32 ref: 00425084
          • Part of subcall function 00424F77: lstrcatW.KERNEL32(?,00000000,?,00425030,?,?,?,?,?,76AA5540), ref: 00424FE3
        • lstrcatW.KERNEL32(?, + ,?,?,?,76AA5540), ref: 0042503F
        • lstrcatW.KERNEL32(?,?,?,?,?,76AA5540), ref: 00425049
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: lstrcat$wsprintf
        • String ID: +
        • API String ID: 3128662910-2316452435
        • Opcode ID: 9d691adb5465460d9d67230d8dad96486cfee40a2408d7953968010c8d6e6f81
        • Instruction ID: 31f09c5765a734f01087b9e08a0d40a2a40db7a6571c408345fa732e7d9f4246
        • Opcode Fuzzy Hash: 9d691adb5465460d9d67230d8dad96486cfee40a2408d7953968010c8d6e6f81
        • Instruction Fuzzy Hash: 72F090339002196BEB10AB55EC85FAA3BB9FB84710F0040A6F918A6152E375AA55CF95
        APIs
        • GetSysColor.USER32(00000004), ref: 00435E70
        • CreateSolidBrush.GDI32(00202020), ref: 00435E79
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: BrushColorCreateSolid
        • String ID:
        • API String ID: 2798526982-1776720792
        • Opcode ID: aaca61e81d3d844478bb37b696ac1b44aa490725bc7ce6fe2d2d7237d7cd6fc2
        • Instruction ID: 3dd9d888673b6d09164eca94f326f92a682deda0ecca37f3c94d09e4dc8b9edb
        • Opcode Fuzzy Hash: aaca61e81d3d844478bb37b696ac1b44aa490725bc7ce6fe2d2d7237d7cd6fc2
        • Instruction Fuzzy Hash: C8F08973904205AFEF04AFA4E846BEF7BB9DB54314F10402AEE00F7286D67555054BE9
        APIs
        • MessageBoxW.USER32(?,00000000,00000000,00000040), ref: 0041F80C
        • ShowWindow.USER32(?,00000000,?,?,0041F968,C4835751), ref: 0041F817
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: MessageShowWindow
        • String ID: hide_info
        • API String ID: 1109058218-3109604556
        • Opcode ID: b9230161a3779dda53718df8cb150e70b502c5954e8802a94d92c968c098faf2
        • Instruction ID: 670fa4bd13f936933ccb9705c5f427323db3bd5e0f271bb626fa3a6f08ccd94f
        • Opcode Fuzzy Hash: b9230161a3779dda53718df8cb150e70b502c5954e8802a94d92c968c098faf2
        • Instruction Fuzzy Hash: BAE0E5312002103AFA213226BC67F6B25599BD0B64F00803FF6047A1D2CFA99846811C
        APIs
        • __EH_prolog.LIBCMT ref: 00427FBD
          • Part of subcall function 00428006: __EH_prolog.LIBCMT ref: 0042800B
          • Part of subcall function 00428006: GetWindowRect.USER32(?,?), ref: 00428025
          • Part of subcall function 00428006: GetWindowPlacement.USER32(?,?), ref: 00428056
          • Part of subcall function 00428006: CopyRect.USER32(?,?), ref: 00428068
          • Part of subcall function 00428006: GetWindowRect.USER32(00000000,?), ref: 0042807B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: RectWindow$H_prolog$CopyPlacement
        • String ID: 4AD$WinRC
        • API String ID: 384457727-3046519757
        • Opcode ID: d584f39abd0066c7d0c7e6084122aa754c3476f513a26c518f2ddf577feac939
        • Instruction ID: 9e81357f82514438959cc7da28018d79f5230014129dd3606e7822f21274c685
        • Opcode Fuzzy Hash: d584f39abd0066c7d0c7e6084122aa754c3476f513a26c518f2ddf577feac939
        • Instruction Fuzzy Hash: 1FE03971914219AADB14EB90E802BEDB7B8FB44308F10446EA422A21C2DB789A488A18
        APIs
        • GetModuleHandleW.KERNEL32(shell32,004212C7,0000000E), ref: 004354F7
        • LoadIconW.USER32(?,0000000E), ref: 0043550D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2540264393.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2540235598.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540424753.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540453302.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540493998.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540536213.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540577383.00000000004F9000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540598914.00000000004FC000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540618644.0000000000505000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540641028.0000000000508000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540722707.0000000000510000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540747051.0000000000513000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540768855.000000000051B000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540822828.0000000000520000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540856505.000000000054D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2540919752.0000000000551000.00000040.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste (2).jbxd
        Similarity
        • API ID: HandleIconLoadModule
        • String ID: shell32
        • API String ID: 3495291681-4179111565
        • Opcode ID: 03b9c54a1b8e5c80b5bd845499610cc0e2a2e66cb0a35801c504cfa6e16a83cf
        • Instruction ID: e6696932341dcb94caecbd5586413caec97c01d6295ff654805490fc0b1eae49
        • Opcode Fuzzy Hash: 03b9c54a1b8e5c80b5bd845499610cc0e2a2e66cb0a35801c504cfa6e16a83cf
        • Instruction Fuzzy Hash: 49D05B702205006A67D05F209C4862736D89A04701B10343EB005C2154E734E944FF1C