Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bhevLCQYD6.exe

Overview

General Information

Sample name:bhevLCQYD6.exe
renamed because original name is a hash value
Original sample name:83b5f3c1326831ab20c2d8114e4c324e.exe
Analysis ID:1417465
MD5:83b5f3c1326831ab20c2d8114e4c324e
SHA1:5d0e55293b342f849f2a4a5e71174af52559a466
SHA256:29b71c3a7f3ae4017bd2e71cee4e9fbecfe5c7693ef30b5c541d27edc3d425b8
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • bhevLCQYD6.exe (PID: 6956 cmdline: "C:\Users\user\Desktop\bhevLCQYD6.exe" MD5: 83B5F3C1326831AB20C2D8114E4C324E)
    • RegSvcs.exe (PID: 6752 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • AddInProcess32.exe (PID: 6808 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 1076 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • WerFault.exe (PID: 7176 cmdline: C:\Windows\system32\WerFault.exe -u -p 6956 -s 1212 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.gosportz.in", "Username": "sales@gosportz.in", "Password": "Ss@gosportz"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              3.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                3.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    3.2.AddInProcess32.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x33521:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x33593:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x3361d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x336af:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x33719:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x3378b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x33821:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x338b1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 10 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 51.79.229.7, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, Initiated: true, ProcessId: 6808, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49738
                      Timestamp:03/29/24-11:34:49.924574
                      SID:2030171
                      Source Port:49773
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:51.057848
                      SID:2840032
                      Source Port:49762
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:41.095141
                      SID:2030171
                      Source Port:49754
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:30.134284
                      SID:2840032
                      Source Port:49769
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:30.134207
                      SID:2030171
                      Source Port:49769
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:41.095247
                      SID:2840032
                      Source Port:49754
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:49.924672
                      SID:2840032
                      Source Port:49773
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:08.140144
                      SID:2851779
                      Source Port:49767
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:24.039925
                      SID:2030171
                      Source Port:49761
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:06.243511
                      SID:2851779
                      Source Port:49759
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:19.602140
                      SID:2851779
                      Source Port:49760
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:58.011955
                      SID:2855542
                      Source Port:49766
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:30.134284
                      SID:2851779
                      Source Port:49769
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:30:59.881457
                      SID:2840032
                      Source Port:49738
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:24.039956
                      SID:2840032
                      Source Port:49761
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:51.057801
                      SID:2851779
                      Source Port:49762
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:51.910656
                      SID:2030171
                      Source Port:49757
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:16.704777
                      SID:2840032
                      Source Port:49768
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:46.441647
                      SID:2851779
                      Source Port:49756
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:30:59.881408
                      SID:2030171
                      Source Port:49738
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:30:59.881457
                      SID:2855245
                      Source Port:49738
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:51.057801
                      SID:2855542
                      Source Port:49762
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:30.134284
                      SID:2855542
                      Source Port:49769
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:46.441647
                      SID:2855542
                      Source Port:49756
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:06.243511
                      SID:2855542
                      Source Port:49759
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:08.140078
                      SID:2030171
                      Source Port:49767
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:58.011955
                      SID:2851779
                      Source Port:49766
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:19.602140
                      SID:2030171
                      Source Port:49760
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:24.039925
                      SID:2851779
                      Source Port:49761
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:30:59.881457
                      SID:2851779
                      Source Port:49738
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:46.440503
                      SID:2030171
                      Source Port:49756
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:51.910656
                      SID:2851779
                      Source Port:49757
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:19.603053
                      SID:2840032
                      Source Port:49760
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:46.445965
                      SID:2840032
                      Source Port:49756
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:08.140183
                      SID:2840032
                      Source Port:49767
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:16.704723
                      SID:2851779
                      Source Port:49768
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:51.910656
                      SID:2855542
                      Source Port:49757
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:24.039925
                      SID:2855542
                      Source Port:49761
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:16.704723
                      SID:2855542
                      Source Port:49768
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:41.095190
                      SID:2851779
                      Source Port:49754
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:49.924574
                      SID:2851779
                      Source Port:49773
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:51.910735
                      SID:2840032
                      Source Port:49757
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:16.704675
                      SID:2030171
                      Source Port:49768
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:06.243579
                      SID:2840032
                      Source Port:49759
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:58.011916
                      SID:2030171
                      Source Port:49766
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:30:59.881457
                      SID:2855542
                      Source Port:49738
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:06.243391
                      SID:2030171
                      Source Port:49759
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:58.011990
                      SID:2840032
                      Source Port:49766
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:19.602140
                      SID:2855542
                      Source Port:49760
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:49.924574
                      SID:2855542
                      Source Port:49773
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:32:41.095190
                      SID:2855542
                      Source Port:49754
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:34:08.140144
                      SID:2855542
                      Source Port:49767
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:03/29/24-11:33:51.057734
                      SID:2030171
                      Source Port:49762
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 3.2.AddInProcess32.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.gosportz.in", "Username": "sales@gosportz.in", "Password": "Ss@gosportz"}
                      Source: bhevLCQYD6.exeReversingLabs: Detection: 36%
                      Source: bhevLCQYD6.exeVirustotal: Detection: 44%Perma Link
                      Source: bhevLCQYD6.exeJoe Sandbox ML: detected

                      Exploits

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bhevLCQYD6.exe PID: 6956, type: MEMORYSTR
                      Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49735 version: TLS 1.2
                      Source: bhevLCQYD6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: System.Xml.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: Microsoft.CSharp.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Windows.Forms.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: C:\Windows\Containers\Confidential\DotnetGenerator\Stub\Projects\WorkHardKeepTrying\obj\Release\WorkHardKeepTrying.pdb source: bhevLCQYD6.exe
                      Source: Binary string: System.Drawing.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Drawing.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: WorkHardKeepTrying.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Xml.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS# source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Core.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Windows.Forms.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: mscorlib.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Dynamic.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Drawing.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.pdbH source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: mscorlib.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Core.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Drawing.pdbUyJ source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.pdbP source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49754 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49754 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49754 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49754 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49756 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49756 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49756 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49756 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49757 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49757 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49757 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49757 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49759 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49759 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49759 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49759 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49760 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49760 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49760 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49760 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49761 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49761 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49761 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49761 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49762 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49762 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49762 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49762 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49766 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49766 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49766 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49766 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49767 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49767 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49767 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49767 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49768 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49768 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49768 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49768 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49769 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49769 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49769 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49769 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49773 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49773 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49773 -> 51.79.229.7:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49773 -> 51.79.229.7:587
                      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: Joe Sandbox ViewIP Address: 51.79.229.7 51.79.229.7
                      Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 51.79.229.7:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: api.ipify.org
                      Source: bhevLCQYD6.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                      Source: bhevLCQYD6.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                      Source: AddInProcess32.exe, 00000003.00000002.4053823405.0000000002A33000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002BE8000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002C22000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002E1A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002CD6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002ADF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.gosportz.in
                      Source: bhevLCQYD6.exeString found in binary or memory: http://ocsp.sectigo.com0
                      Source: AddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: bhevLCQYD6.exe, 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: bhevLCQYD6.exe, 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: AddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: AddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: bhevLCQYD6.exeString found in binary or memory: https://sectigo.com/CPS0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                      Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49735 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, NDL2m67zO.cs.Net Code: N8XNDo8o
                      Source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.raw.unpack, NDL2m67zO.cs.Net Code: N8XNDo8o
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary

                      barindex
                      Source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8DF4000_2_00007FFD9B8DF400
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B7C400_2_00007FFD9B8B7C40
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8E1BD80_2_00007FFD9B8E1BD8
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B29EE0_2_00007FFD9B8B29EE
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8DE8700_2_00007FFD9B8DE870
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B28B90_2_00007FFD9B8B28B9
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B7CC80_2_00007FFD9B8B7CC8
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B7EC80_2_00007FFD9B8B7EC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D941C83_2_00D941C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D9E6C93_2_00D9E6C9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D9A9603_2_00D9A960
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D94A983_2_00D94A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D93E803_2_00D93E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D9D96F3_2_00D9D96F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D7D483_2_062D7D48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D65B83_2_062D65B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D55983_2_062D5598
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D30603_2_062D3060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D00403_2_062D0040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062DC1503_2_062DC150
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062DB1FA3_2_062DB1FA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D76683_2_062D7668
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D5C9F3_2_062D5C9F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062DE3683_2_062DE368
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D23793_2_062D2379
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_062D00063_2_062D0006
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6956 -s 1212
                      Source: bhevLCQYD6.exeStatic PE information: invalid certificate
                      Source: bhevLCQYD6.exeStatic PE information: No import functions for PE file found
                      Source: bhevLCQYD6.exe, 00000000.00000000.1593680021.000001D780800000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameApibequfebequle0 vs bhevLCQYD6.exe
                      Source: bhevLCQYD6.exe, 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef366647c-b5b7-4abe-a908-a8d3f9bee1f0.exe4 vs bhevLCQYD6.exe
                      Source: bhevLCQYD6.exe, 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIrehexeqF vs bhevLCQYD6.exe
                      Source: bhevLCQYD6.exeBinary or memory string: OriginalFilenameApibequfebequle0 vs bhevLCQYD6.exe
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: bhevLCQYD6.exe, Ldloc0MdSigCallingConvention.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, OTWUo99bfyR.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, OTWUo99bfyR.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, Ui9qhZiA7.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, Ui9qhZiA7.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, BqMB7yHhrXg.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, BqMB7yHhrXg.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, BqMB7yHhrXg.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, BqMB7yHhrXg.csCryptographic APIs: 'TransformFinalBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/5@2/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6956
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d334fb74-c17d-4400-8f57-4860fe335d8cJump to behavior
                      Source: bhevLCQYD6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: AddInProcess32.exe, 00000003.00000002.4052677096.0000000000AF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: select * from Win32_OperatingSystem);
                      Source: bhevLCQYD6.exeReversingLabs: Detection: 36%
                      Source: bhevLCQYD6.exeVirustotal: Detection: 44%
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeFile read: C:\Users\user\Desktop\bhevLCQYD6.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\bhevLCQYD6.exe "C:\Users\user\Desktop\bhevLCQYD6.exe"
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6956 -s 1212
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: bhevLCQYD6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: bhevLCQYD6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: bhevLCQYD6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: System.Xml.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: Microsoft.CSharp.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Windows.Forms.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: C:\Windows\Containers\Confidential\DotnetGenerator\Stub\Projects\WorkHardKeepTrying\obj\Release\WorkHardKeepTrying.pdb source: bhevLCQYD6.exe
                      Source: Binary string: System.Drawing.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Drawing.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: WorkHardKeepTrying.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Xml.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS# source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Core.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Windows.Forms.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: mscorlib.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Dynamic.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Drawing.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.pdbH source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: mscorlib.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Core.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Drawing.pdbUyJ source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Configuration.pdbP source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.ni.pdb source: WERA3BE.tmp.dmp.7.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WERA3BE.tmp.dmp.7.dr
                      Source: bhevLCQYD6.exeStatic PE information: 0x994824D9 [Thu Jun 29 09:01:13 2051 UTC]
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B5638 push cs; retn 5F50h0_2_00007FFD9B8CE13F
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B7933 push ebx; retf 0_2_00007FFD9B8B796A
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B8B057D push ebx; iretd 0_2_00007FFD9B8B058A
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeCode function: 0_2_00007FFD9B9E0C7B push esp; retf 4810h0_2_00007FFD9B9E0D22
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 3_2_00D90C3D push edi; ret 3_2_00D90CC2
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: bhevLCQYD6.exe PID: 6956, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory allocated: 1D780B30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory allocated: 1D79A600000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: D90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2970000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 26B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 1404Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 8455Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99874s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99765s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99656s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99547s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99437s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99328s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99218s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99109s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -99000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98890s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98781s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98672s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98562s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98417s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98312s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98203s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -98093s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97984s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97765s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97656s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97547s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97437s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97327s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97218s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97109s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -97000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96890s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96781s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96670s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96562s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96453s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96343s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96234s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96125s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -96015s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95906s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95797s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95687s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95578s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95468s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95359s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95250s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95140s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -95030s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -94922s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -94797s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -94687s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7264Thread sleep time: -94578s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99874Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99547Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99437Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99328Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99218Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99109Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98890Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98781Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98672Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98562Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98417Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98312Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98203Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98093Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97984Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97547Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97437Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97327Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97218Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97109Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96890Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96781Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96670Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96562Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96453Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96343Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96234Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96125Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 96015Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95906Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95797Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95687Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95578Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95468Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95359Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95250Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95140Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 95030Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94922Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94797Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94687Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 94578Jump to behavior
                      Source: Amcache.hve.7.drBinary or memory string: VMware
                      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                      Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                      Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: AddInProcess32.exe, 00000003.00000002.4058631804.0000000005C10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: bhevLCQYD6.exe, 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: bhevLCQYD6.exe, Ldloc0MdSigCallingConvention.csReference to suspicious API methods: ((Func3FileStandardInformation)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(TotalAvailableMemoryBytesMyComputer.EncoderFallbackBufferOnlyOnFaulted("getIsSignatureTypeReadLinesAsync")), TotalAvailableMemoryBytesMyComputer.EncoderFallbackBufferOnlyOnFaulted("IEquatable1CodeBase")), typeof(Func3FileStandardInformation)))(getParameterValueAsUint, getSerializationGuardgetUtcNow, EnumEqualityComparer1EventPayload, out Item2getASCII)
                      Source: bhevLCQYD6.exe, Ldloc0MdSigCallingConvention.csReference to suspicious API methods: ((Func3FileStandardInformation)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(TotalAvailableMemoryBytesMyComputer.EncoderFallbackBufferOnlyOnFaulted("getIsSignatureTypeReadLinesAsync")), TotalAvailableMemoryBytesMyComputer.EncoderFallbackBufferOnlyOnFaulted("IEquatable1CodeBase")), typeof(Func3FileStandardInformation)))(getParameterValueAsUint, getSerializationGuardgetUtcNow, EnumEqualityComparer1EventPayload, out Item2getASCII)
                      Source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, W4ip.csReference to suspicious API methods: ve645LMXEKU.OpenProcess(lUA9OgW.DuplicateHandle, bInheritHandle: true, (uint)aT9Qdac.ProcessID)
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43C000Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 74C008Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Users\user\Desktop\bhevLCQYD6.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bhevLCQYD6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d792687740.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bhevLCQYD6.exe PID: 6956, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6808, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d792687740.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bhevLCQYD6.exe PID: 6956, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6808, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 3.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d792687740.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d792687740.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.bhevLCQYD6.exe.1d79264ccf8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bhevLCQYD6.exe PID: 6956, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6808, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      Boot or Logon Initialization Scripts211
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      21
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      231
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Timestomp
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model21
                      Input Capture
                      2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets151
                      Virtualization/Sandbox Evasion
                      SSH1
                      Clipboard Data
                      23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts151
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
                      Process Injection
                      DCSync1
                      System Network Configuration Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      bhevLCQYD6.exe37%ReversingLabsWin64.Spyware.Negasteal
                      bhevLCQYD6.exe44%VirustotalBrowse
                      bhevLCQYD6.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      mail.gosportz.in0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                      http://mail.gosportz.in0%Avira URL Cloudsafe
                      http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                      http://www.founder.com.cn/cn0%VirustotalBrowse
                      http://mail.gosportz.in0%VirustotalBrowse
                      http://www.zhongyicts.com.cn1%VirustotalBrowse
                      http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.gosportz.in
                      51.79.229.7
                      truetrueunknown
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.combhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://sectigo.com/CPS0bhevLCQYD6.exefalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/?bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bThebhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://account.dyn.com/bhevLCQYD6.exe, 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.sectigo.com0bhevLCQYD6.exefalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers?bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.combhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://upx.sf.netAmcache.hve.7.drfalse
                                        high
                                        http://www.fontbureau.com/designersbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org/tAddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comlbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sajatypeworks.combhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.typography.netDbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tbhevLCQYD6.exefalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cn/cThebhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • 0%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.galapagosdesign.com/staff/dennis.htmbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://api.ipify.orgbhevLCQYD6.exe, 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cnbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • 0%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-user.htmlbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#bhevLCQYD6.exefalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://mail.gosportz.inAddInProcess32.exe, 00000003.00000002.4053823405.0000000002A33000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002BE8000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002C22000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002E1A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002CD6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000003.00000002.4053823405.0000000002ADF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/DPleasebhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8bhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fonts.combhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sandoll.co.krbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.urwpp.deDPleasebhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.zhongyicts.com.cnbhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • 1%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAddInProcess32.exe, 00000003.00000002.4053823405.0000000002971000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.sakkal.combhevLCQYD6.exe, 00000000.00000002.1743509855.000001D79BFD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        51.79.229.7
                                                        mail.gosportz.inCanada
                                                        16276OVHFRtrue
                                                        104.26.13.205
                                                        api.ipify.orgUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                        Analysis ID:1417465
                                                        Start date and time:2024-03-29 11:30:05 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 40s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:12
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:bhevLCQYD6.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:83b5f3c1326831ab20c2d8114e4c324e.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.expl.evad.winEXE@8/5@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 52%
                                                        • Number of executed functions: 67
                                                        • Number of non-executed functions: 7
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                        • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                        TimeTypeDescription
                                                        11:30:52API Interceptor12276582x Sleep call for process: AddInProcess32.exe modified
                                                        11:31:01API Interceptor1x Sleep call for process: WerFault.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        51.79.229.7https://apiservices.krxd.net/click_tracker/track?kxconfid=whjxbtb0h&_knopii=1&kxcampaignid=P.C.C-Class.W206.L.MI&kxplacementid=module2findmycar&kxbrand=MB&clk=http://mppl11.com/lobatan/goaway.spammer@loser.comGet hashmaliciousUnknownBrowse
                                                        • mppl11.com/favicon.ico
                                                        104.26.13.205Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/?format=json
                                                        E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                                        • api.ipify.org/
                                                        SecuriteInfo.com.Win64.RATX-gen.31127.4101.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                                        • api.ipify.org/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        mail.gosportz.inNew Order 3118.xlsxGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        New Order 3118.docGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        yR5xIsCFuq.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        EhPeM5ilb8.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        bt0dMehItq.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        SecuriteInfo.com.Win32.PWSX-gen.22236.2799.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        NjS1bK9vVF.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 51.79.229.7
                                                        api.ipify.orgTBC#01 Rev.A3 - lnexa.xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        DHL_LHER000678175.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 172.67.74.152
                                                        SecuriteInfo.com.Win32.PWSX-gen.9732.1319.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        ocrev ns.ordine 290520280324.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 172.67.74.152
                                                        CANKO DMC IMPORT ENQUIRY.PDF.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 104.26.13.205
                                                        Transaction Advice_280324-WS-394-1247.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 172.67.74.152
                                                        YPT23-117419 numaral#U0131 Dekont-20240328.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 172.67.74.152
                                                        FedEx_AWB#53203024643.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        BL-SHIPPING INVOICE.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        RFQ.docGet hashmaliciousAgentTeslaBrowse
                                                        • 172.67.74.152
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CLOUDFLARENETUSInjectToolInstaller.exeGet hashmaliciousPureLog StealerBrowse
                                                        • 104.26.4.15
                                                        Stealer.exeGet hashmaliciousEternity StealerBrowse
                                                        • 172.67.34.170
                                                        MXpl6HFisn.exeGet hashmaliciousRisePro StealerBrowse
                                                        • 104.26.5.15
                                                        https://airdrop-online-altlayer-anniversary.s3.us-east-2.amazonaws.com/posten.html?cid=freetomfr@hotmail.comGet hashmaliciousPhisherBrowse
                                                        • 172.64.150.248
                                                        7ITPeT3VWW.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.38.98
                                                        l2ZKczbGRq.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                        • 104.26.4.15
                                                        XqC4Zcp8qg.exeGet hashmaliciousRisePro StealerBrowse
                                                        • 104.26.5.15
                                                        3MdZ1WiAYP.exeGet hashmaliciousRisePro StealerBrowse
                                                        • 172.67.75.166
                                                        7GofFHQDvk.exeGet hashmaliciousRisePro StealerBrowse
                                                        • 172.67.75.166
                                                        TBC#01 Rev.A3 - lnexa.xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        OVHFRuk1HIyOQbk.exeGet hashmaliciousUnknownBrowse
                                                        • 51.91.30.159
                                                        uk1HIyOQbk.exeGet hashmaliciousUnknownBrowse
                                                        • 51.91.30.159
                                                        Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                        • 91.121.160.6
                                                        SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exeGet hashmaliciousUnknownBrowse
                                                        • 198.50.129.180
                                                        Facture_160087511.htmlGet hashmaliciousScreenConnect ToolBrowse
                                                        • 158.69.9.165
                                                        SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exeGet hashmaliciousUnknownBrowse
                                                        • 51.38.43.18
                                                        assento 555 pro-Model-2.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 144.217.159.195
                                                        awb_shipping_doc_23642.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 188.165.61.82
                                                        https://www.rewardgateway.com/Get hashmaliciousHTMLPhisherBrowse
                                                        • 51.222.241.100
                                                        http://www.rewardgateway.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 51.222.241.145
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        3b5074b1b5d032e5620f69f9f700ff0eTBC#01 Rev.A3 - lnexa.xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        package80171530600.jpg.lnkGet hashmaliciousXWormBrowse
                                                        • 104.26.13.205
                                                        DHL_LHER000678175.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        inpau292101.jsGet hashmaliciousFormBookBrowse
                                                        • 104.26.13.205
                                                        SecuriteInfo.com.Win32.PWSX-gen.9732.1319.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        ocrev ns.ordine 290520280324.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 104.26.13.205
                                                        CANKO DMC IMPORT ENQUIRY.PDF.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 104.26.13.205
                                                        Transaction Advice_280324-WS-394-1247.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 104.26.13.205
                                                        YPT23-117419 numaral#U0131 Dekont-20240328.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        FedEx_AWB#53203024643.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.13.205
                                                        No context
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):65536
                                                        Entropy (8bit):1.128599824478426
                                                        Encrypted:false
                                                        SSDEEP:192:AD+7kWBu50UnU9aWz3OlTwyZFqCAzuiFZZ24lO8Y:z7XBDUnU9a4oizuiFZY4lO8Y
                                                        MD5:BD1BC7A18685AF081D68CF690FDDC3C9
                                                        SHA1:D4FDF438D62CF73470311AF850AE509F62F9FD30
                                                        SHA-256:53CE435B7417A631C9378E1CFE9741A5C419BAFFA1512F279E102C84BDCF7C04
                                                        SHA-512:F4BE2C38C208D58DE789433A9A9DED6562A314FFFDCAD9F4D35F3A84CBBCC7B6DF143E1261876272B687CA22375675A6E4361EB27CA1312F3122338E941438A4
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.6.1.8.1.8.5.1.5.4.5.2.7.0.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.6.1.8.1.8.5.2.3.7.3.3.8.9.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.3.3.b.a.4.6.-.e.9.1.9.-.4.d.2.2.-.a.9.2.0.-.a.3.5.3.c.a.6.1.7.e.d.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.3.0.6.c.3.d.e.-.0.a.5.8.-.4.a.d.d.-.8.a.c.8.-.3.6.0.4.b.8.8.6.d.8.0.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.b.h.e.v.L.C.Q.Y.D.6...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.p.i.b.e.q.u.f.e.b.e.q.u.l.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.2.c.-.0.0.0.1.-.0.0.1.4.-.c.6.2.7.-.5.2.2.a.c.4.8.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.6.2.1.a.3.d.c.6.3.b.4.d.4.1.a.c.7.9.1.1.c.0.2.a.3.6.8.2.e.c.8.0.0.0.0.0.0.0.0.!.0.0.0.0.5.d.0.e.5.5.2.9.3.b.3.4.2.f.8.4.9.f.2.a.4.a.5.e.7.1.1.7.4.a.f.5.2.5.5.9.a.4.6.6.!.b.h.e.v.L.C.Q.
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:Mini DuMP crash report, 16 streams, Fri Mar 29 10:30:51 2024, 0x1205a4 type
                                                        Category:dropped
                                                        Size (bytes):541539
                                                        Entropy (8bit):3.5853850456050185
                                                        Encrypted:false
                                                        SSDEEP:3072:hdVIidoyvBnb3oC4e5mK5sn+oRamliWfl4pKoHePNJecS5EjBj1CCqQ+FJ3+vCyK:rKyvlUC4XK5snZ3aKrSKpqP3Qvf/M
                                                        MD5:3DFFADED25AECB633DEE0B983FEBEC5E
                                                        SHA1:AAC4B22532EA49F0A46E7F648D38E6746A6A3446
                                                        SHA-256:1C917CDC746A8F00971BCB32C07F69BC6362F1C317B325E00BF91488778DD9E2
                                                        SHA-512:33D3FD58B3F06D9237260A2EB35CA2399F1CDB7176B03E465517E77D856AF46A20130840D0CEAA82BEC82963D754715FFCE2D2B030EC5ECB8FEDB8F49E5E4D7B
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:MDMP..a..... .......[..f............D...............d.......$....!...... >..,!......................l.......8...........T............/..............L_..........8a..............................................................................eJ.......a......Lw......................T.......,...X..f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):8862
                                                        Entropy (8bit):3.7128611176645934
                                                        Encrypted:false
                                                        SSDEEP:192:R6l7wVeJRwlk6Y9VD4jC5gmfR6Jzprt89bboifVJm:R6lXJ2lk6Y/k25gmfRiEbtfy
                                                        MD5:851CD9F2C5151A2E58264348EED578A4
                                                        SHA1:D9372F662A5B1B44C2C3803EC0723326427DE006
                                                        SHA-256:00B29CEBC5D0BBFCC16C2F2F2971E794E1D6C6B1396BC1D239F71FF4C20ED8EB
                                                        SHA-512:2EF5DFD1ABF3C59B9F4693590588B6379D10D281CD27EE2C11544A9F98801EFA22C47E3CB9E7973D88E064BE15B4B39E4A261BD6993BBB3C1942F7FB8D1D74EB
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.5.6.<./.P.i.
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4772
                                                        Entropy (8bit):4.527655150679993
                                                        Encrypted:false
                                                        SSDEEP:48:cvIwWl8zsBJg771I9cXWpW8VYWYm8M4J+/KAFlqyq85q/trB0T0wd:uIjfTI7fm7VGJZPra4wd
                                                        MD5:5A02932174E5F7D9EA4DA145138A13BE
                                                        SHA1:31C5D52B864FF38799DB2E649827C0F961CAFD99
                                                        SHA-256:9C5F10A218712449AA1F2B7453D7A1BA6EA1EA27E6A90780E45DDC621C4EC86E
                                                        SHA-512:34D36EFBF0F15758EF77121B358ABD03D894234FF6A13E391250ED2C1FC2BF4B86A5544BC6A46C4A92293294F178ADF96E5166787DEAF944BAB99B75C7D84573
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="256413" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:MS Windows registry file, NT/2000 or above
                                                        Category:dropped
                                                        Size (bytes):1835008
                                                        Entropy (8bit):4.465962915971092
                                                        Encrypted:false
                                                        SSDEEP:6144:nIXfpi67eLPU9skLmb0b47WSPKaJG8nAgejZMMhA2gX4WABl0uNIdwBCswSbp:IXD947WlLZMM6YFHi+p
                                                        MD5:2F675F823D464E1880BD2F2755168892
                                                        SHA1:ED042A5D3A2BA1355461CE5A4C331D9D2B76BAE8
                                                        SHA-256:5221EA4C8A0E0C8C013F80AF52FA6AC813C1E41DD24B463F587F63C2CE1D67D4
                                                        SHA-512:DEFADBC4ED7F02BC5842A224A26B25507EFAA4BC4EE7A35161782CDA419231E089567F02529AB23F77FFD3C4E4638F5FF6111D7C1606D518C0CBCA8F6DDDD9D4
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>@.,...............................................................................................................................................................................................................................................................................................................................................\[..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):7.889636783099047
                                                        TrID:
                                                        • Win64 Executable GUI (202006/5) 92.65%
                                                        • Win64 Executable (generic) (12005/4) 5.51%
                                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                                        • DOS Executable Generic (2002/1) 0.92%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:bhevLCQYD6.exe
                                                        File size:661'864 bytes
                                                        MD5:83b5f3c1326831ab20c2d8114e4c324e
                                                        SHA1:5d0e55293b342f849f2a4a5e71174af52559a466
                                                        SHA256:29b71c3a7f3ae4017bd2e71cee4e9fbecfe5c7693ef30b5c541d27edc3d425b8
                                                        SHA512:2148ac63bdafa9eda5c2e11ae97d7bde1930142d93b3b38dde16d09059ff9ce8d51c387928f4a16243c1e85050c327c79e6e49a5c79efb303bbdc8e67d5cbb66
                                                        SSDEEP:12288:i2WIm0FEUjrw3i/03o7BcD1Q38vYWYNwmDSOaqaJez7bKaNoVsnjBf/LT3pCj:i2W70F7jL03GcDyeYjwqSOvaJezaaNsF
                                                        TLSH:92E42260B3D5E922F3DE13748E16E2FA12716E219C6BD20778E17F1F3E3768041966A1
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....$H..........."...0.|j...t........... ....@...... ....................... ............`................................
                                                        Icon Hash:a2aba2abab03abc0
                                                        Entrypoint:0x400000
                                                        Entrypoint Section:
                                                        Digitally signed:true
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x994824D9 [Thu Jun 29 09:01:13 2051 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:
                                                        Signature Valid:false
                                                        Signature Issuer:C=US, S=Washington, L=Redmond, OU=Microsoft Corporation, O=Microsoft Corporation, CN=Microsoft Code Signing PCA 2011
                                                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                        Error Number:-2146762487
                                                        Not Before, Not After
                                                        • 28/03/2024 13:51:09 28/03/2025 13:51:09
                                                        Subject Chain
                                                        • C=US, S=Washington, L=Redmond, OU=Microsoft Corporation, O=Microsoft Corporation, CN=Microsoft Code Signing PCA 2011
                                                        Version:3
                                                        Thumbprint MD5:AF43B38396E0148F4B8F8CE69C74190D
                                                        Thumbprint SHA-1:A1F3F0CE0EC2D6A4FE094B9D8445582CDD9550BE
                                                        Thumbprint SHA-256:7211D1B4DA4FFABC4A34573E18EC97B8352505577566B6CED252B218292EAC73
                                                        Serial:00A1C20FCF63876110BDB00FFDAF35AE7A
                                                        Instruction
                                                        dec ebp
                                                        pop edx
                                                        nop
                                                        add byte ptr [ebx], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax+eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x73c2.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0xa00880x18e0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x89b40x38.text
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x6a7c0x6c005715a5e27d2d58ff8e6bbcfe473fc15cFalse0.5087167245370371data5.866953296877542IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xa0000x73c20x74002325bde099a30553d43dcc251480b6d2False0.046875data1.5146428557157101IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xa21c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.007557864903164856
                                                        RT_ICON0xe4440x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.017823639774859287
                                                        RT_ICON0xf4ec0x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.025819672131147543
                                                        RT_ICON0xfe740x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 00.03604651162790698
                                                        RT_ICON0x1052c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.05053191489361702
                                                        RT_GROUP_ICON0x109940x4cdata0.8026315789473685
                                                        RT_VERSION0x109e00x3fcdata0.4931372549019608
                                                        RT_VERSION0x10ddc0x3fcdataEnglishUnited States0.4950980392156863
                                                        RT_MANIFEST0x111d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                        03/29/24-11:34:49.924574TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49773587192.168.2.451.79.229.7
                                                        03/29/24-11:33:51.057848TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249762587192.168.2.451.79.229.7
                                                        03/29/24-11:32:41.095141TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49754587192.168.2.451.79.229.7
                                                        03/29/24-11:34:30.134284TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249769587192.168.2.451.79.229.7
                                                        03/29/24-11:34:30.134207TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49769587192.168.2.451.79.229.7
                                                        03/29/24-11:32:41.095247TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249754587192.168.2.451.79.229.7
                                                        03/29/24-11:34:49.924672TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249773587192.168.2.451.79.229.7
                                                        03/29/24-11:34:08.140144TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49767587192.168.2.451.79.229.7
                                                        03/29/24-11:33:24.039925TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49761587192.168.2.451.79.229.7
                                                        03/29/24-11:33:06.243511TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49759587192.168.2.451.79.229.7
                                                        03/29/24-11:33:19.602140TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49760587192.168.2.451.79.229.7
                                                        03/29/24-11:33:58.011955TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49766587192.168.2.451.79.229.7
                                                        03/29/24-11:34:30.134284TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49769587192.168.2.451.79.229.7
                                                        03/29/24-11:30:59.881457TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249738587192.168.2.451.79.229.7
                                                        03/29/24-11:33:24.039956TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249761587192.168.2.451.79.229.7
                                                        03/29/24-11:33:51.057801TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49762587192.168.2.451.79.229.7
                                                        03/29/24-11:32:51.910656TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49757587192.168.2.451.79.229.7
                                                        03/29/24-11:34:16.704777TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249768587192.168.2.451.79.229.7
                                                        03/29/24-11:32:46.441647TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49756587192.168.2.451.79.229.7
                                                        03/29/24-11:30:59.881408TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49738587192.168.2.451.79.229.7
                                                        03/29/24-11:30:59.881457TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49738587192.168.2.451.79.229.7
                                                        03/29/24-11:33:51.057801TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49762587192.168.2.451.79.229.7
                                                        03/29/24-11:34:30.134284TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49769587192.168.2.451.79.229.7
                                                        03/29/24-11:32:46.441647TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49756587192.168.2.451.79.229.7
                                                        03/29/24-11:33:06.243511TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49759587192.168.2.451.79.229.7
                                                        03/29/24-11:34:08.140078TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49767587192.168.2.451.79.229.7
                                                        03/29/24-11:33:58.011955TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49766587192.168.2.451.79.229.7
                                                        03/29/24-11:33:19.602140TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49760587192.168.2.451.79.229.7
                                                        03/29/24-11:33:24.039925TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49761587192.168.2.451.79.229.7
                                                        03/29/24-11:30:59.881457TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49738587192.168.2.451.79.229.7
                                                        03/29/24-11:32:46.440503TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49756587192.168.2.451.79.229.7
                                                        03/29/24-11:32:51.910656TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49757587192.168.2.451.79.229.7
                                                        03/29/24-11:33:19.603053TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249760587192.168.2.451.79.229.7
                                                        03/29/24-11:32:46.445965TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249756587192.168.2.451.79.229.7
                                                        03/29/24-11:34:08.140183TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249767587192.168.2.451.79.229.7
                                                        03/29/24-11:34:16.704723TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49768587192.168.2.451.79.229.7
                                                        03/29/24-11:32:51.910656TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49757587192.168.2.451.79.229.7
                                                        03/29/24-11:33:24.039925TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49761587192.168.2.451.79.229.7
                                                        03/29/24-11:34:16.704723TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49768587192.168.2.451.79.229.7
                                                        03/29/24-11:32:41.095190TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49754587192.168.2.451.79.229.7
                                                        03/29/24-11:34:49.924574TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49773587192.168.2.451.79.229.7
                                                        03/29/24-11:32:51.910735TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249757587192.168.2.451.79.229.7
                                                        03/29/24-11:34:16.704675TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49768587192.168.2.451.79.229.7
                                                        03/29/24-11:33:06.243579TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249759587192.168.2.451.79.229.7
                                                        03/29/24-11:33:58.011916TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49766587192.168.2.451.79.229.7
                                                        03/29/24-11:30:59.881457TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49738587192.168.2.451.79.229.7
                                                        03/29/24-11:33:06.243391TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49759587192.168.2.451.79.229.7
                                                        03/29/24-11:33:58.011990TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249766587192.168.2.451.79.229.7
                                                        03/29/24-11:33:19.602140TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49760587192.168.2.451.79.229.7
                                                        03/29/24-11:34:49.924574TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49773587192.168.2.451.79.229.7
                                                        03/29/24-11:32:41.095190TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49754587192.168.2.451.79.229.7
                                                        03/29/24-11:34:08.140144TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49767587192.168.2.451.79.229.7
                                                        03/29/24-11:33:51.057734TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49762587192.168.2.451.79.229.7
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 29, 2024 11:30:52.780472994 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:52.780515909 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:52.780584097 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:52.791181087 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:52.791199923 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:52.993832111 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:52.993911982 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:52.997706890 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:52.997729063 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:52.998050928 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:53.050164938 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:53.125649929 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:53.168245077 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:53.302434921 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:53.302495956 CET44349735104.26.13.205192.168.2.4
                                                        Mar 29, 2024 11:30:53.302552938 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:53.349200964 CET49735443192.168.2.4104.26.13.205
                                                        Mar 29, 2024 11:30:54.417860985 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:54.748786926 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:54.749253988 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:57.053921938 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:57.057949066 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:57.388297081 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:57.390759945 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:57.721575975 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:57.722280979 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:58.093048096 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:58.374062061 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:58.374439955 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:58.704823017 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:58.705063105 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:59.076364994 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:59.550096035 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:59.550374985 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:59.880866051 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:59.880887985 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:30:59.881407976 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:59.881457090 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:59.881475925 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:30:59.881491899 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:31:00.211637020 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:31:00.211740017 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:31:00.217231035 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:31:00.268898010 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:29.404280901 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:29.405026913 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:29.732148886 CET5874975251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:29.732259035 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:29.735270023 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:29.735364914 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:29.735364914 CET49738587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:30.066039085 CET5874973851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:32.236251116 CET5874975251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:32.237797976 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:32.550750971 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:32.564769983 CET5874975251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:32.564827919 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:32.627751112 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:32.877808094 CET5874975251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:32.877851963 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:32.878129005 CET5874975251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:32.878169060 CET49752587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:32.955130100 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:32.955200911 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:34.562933922 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:34.563081980 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:34.890671968 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:34.890929937 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:35.218631029 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:35.218811989 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:35.586850882 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:35.866506100 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:35.866699934 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:36.194207907 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:36.196078062 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:36.564419031 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:36.847512007 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:36.847636938 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:37.019331932 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:37.072119951 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:37.175080061 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:37.175096989 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:37.175143957 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:37.346690893 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:37.346738100 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:37.346936941 CET5874975351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:37.346977949 CET49753587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:37.395770073 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:37.395838022 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:38.623836040 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:38.623965979 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:38.947662115 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:38.947809935 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:39.271543980 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:39.271771908 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:39.602577925 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:39.606076956 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:39.929730892 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:39.929933071 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:40.293746948 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:40.769996881 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:40.770112038 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.093662024 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.093678951 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.095038891 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.095140934 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.095190048 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.095247030 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.096564054 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.418705940 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.418862104 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.419625998 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.419639111 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.419680119 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.419704914 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.419713974 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.419755936 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.419763088 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.419807911 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.419831991 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.419877052 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.483545065 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.742923021 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.742938042 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743057013 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743067980 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743077040 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.743104935 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743149042 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.743196964 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743218899 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.743261099 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743288040 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.743352890 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.743402004 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.744153976 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:41.810864925 CET5874975551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:41.810956001 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:42.066533089 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.066549063 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.066620111 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.066802979 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.066982031 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067116976 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067183018 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067353010 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067378998 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067468882 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067496061 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067542076 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.067584038 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.070473909 CET5874975451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.070563078 CET49754587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:42.906980038 CET5874975551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:42.907212973 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:42.941041946 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:42.991761923 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:43.234561920 CET5874975551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:43.234647036 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:43.268547058 CET5874975551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:43.268640995 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:43.268832922 CET5874975551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:43.268910885 CET49755587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:43.320117950 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:43.320200920 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:43.809849024 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:43.831559896 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:44.160342932 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:44.165663004 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:44.494664907 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:44.534625053 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:44.598853111 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:44.934900999 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:44.935012102 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:45.263410091 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:45.263545990 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:45.632975101 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.104513884 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.104655027 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.433034897 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.433049917 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.440392971 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.440502882 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.441647053 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.445965052 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.459706068 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.768724918 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.773957968 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.774007082 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.787991047 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.788003922 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.788049936 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.788060904 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.788072109 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.788116932 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:46.788198948 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:46.788248062 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.116444111 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116460085 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116538048 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.116636038 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116672993 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116686106 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.116727114 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.116822958 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116873026 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.116887093 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116911888 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.116960049 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.157979012 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.444926023 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.444963932 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.444976091 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.444987059 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.444997072 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445096016 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445173025 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445291042 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445358038 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445432901 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445542097 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445590973 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445651054 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445672989 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445853949 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445866108 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.445929050 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.446006060 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.446017027 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.446115971 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.450308084 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:47.534677029 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:47.739995003 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:48.069359064 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:48.069454908 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:48.069488049 CET49756587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:48.070313931 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:48.397731066 CET5874975651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:48.401360035 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:48.401448011 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:49.205162048 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:49.205331087 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:49.536838055 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:49.537081957 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:49.868706942 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:49.868908882 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:50.207633972 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:50.207811117 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:50.539326906 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:50.539484978 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:50.912317038 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:51.578958988 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:51.579442024 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:51.910361052 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:51.910372972 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:51.910603046 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:51.910655975 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:51.910655975 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:51.910734892 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:51.911758900 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:52.241637945 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.241903067 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:52.242908001 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.242925882 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.243032932 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:52.574244022 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.574265957 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.574275970 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.574337959 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.574342966 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:52.574404001 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:52.574423075 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.574459076 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:52.906110048 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906125069 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906132936 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906142950 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906265974 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906275034 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906282902 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.906361103 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:52.908586025 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:53.128380060 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:59.633996010 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:59.966006041 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:32:59.966097116 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:59.966186047 CET49757587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:32:59.967271090 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:00.297240019 CET5874975751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:00.298640013 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:00.298727036 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:01.933011055 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:01.965972900 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:02.296955109 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:02.297213078 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:02.628475904 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:02.628909111 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:02.691014051 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:02.740760088 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:02.967454910 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:02.967530966 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:03.022068977 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:03.022151947 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:03.022474051 CET5874975851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:03.022511959 CET49758587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:03.067881107 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:03.067936897 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:03.556862116 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:03.562078953 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:03.889468908 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:03.890111923 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:04.217725992 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:04.218096972 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:04.553942919 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:04.558012009 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:04.885474920 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:04.886534929 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:05.255237103 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:05.915577888 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:05.915775061 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.243113995 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.243138075 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.243391037 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.243391037 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.243510962 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.243578911 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.245996952 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.570837021 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.570895910 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.573617935 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.573693991 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.900929928 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.900973082 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.901009083 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.901036978 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.901046038 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.901079893 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.901092052 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.901128054 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.901141882 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.901181936 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.901199102 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:06.901248932 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:06.942290068 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228174925 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228255033 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228333950 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228395939 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228508949 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228519917 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228600979 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228610992 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228651047 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228672981 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228743076 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228753090 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228805065 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228851080 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.228909016 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.232022047 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:07.284734011 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:15.448297977 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:15.776487112 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:15.778091908 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:15.778223991 CET49759587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:15.779098988 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:16.105384111 CET5874975951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:16.107618093 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:16.107706070 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:16.597810984 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:16.598009109 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:16.926455021 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:16.927232981 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:17.256053925 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:17.291434050 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:17.627615929 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:17.676091909 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:17.817698002 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:18.146157026 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:18.192049980 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:18.334162951 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:18.703576088 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.177416086 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.237891912 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.273478031 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.601774931 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.601792097 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.602139950 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.602139950 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.602139950 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.603053093 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.603053093 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.930983067 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.931041956 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.931941032 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.932018042 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:19.932339907 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:19.932404995 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:20.095182896 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:20.260291100 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.260327101 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.260440111 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:20.260447025 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.260499954 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.260567904 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:20.260611057 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.424385071 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.424458027 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:20.589194059 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589210987 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589226007 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589375973 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589546919 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589557886 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589682102 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589814901 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.589912891 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.590176105 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.590315104 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.590415001 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.596304893 CET5874976051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:20.596355915 CET49760587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:21.724108934 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:21.724339008 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:22.056971073 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:22.057145119 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:22.386478901 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:22.386661053 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:22.723340988 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:22.723507881 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:23.052629948 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:23.052793026 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:23.422614098 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:23.705164909 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:23.710088968 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.039448977 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:24.039536953 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:24.039865017 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.039925098 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.039925098 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.039956093 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.046008110 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.369035959 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:24.369162083 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.375164032 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:24.375271082 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.375319004 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:24.375473022 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:24.705231905 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:24.705360889 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:25.035013914 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.035115957 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:25.035393000 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.035455942 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.035645008 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.035741091 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.035809994 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.035985947 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.036227942 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.036283016 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.036423922 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.036571980 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.036775112 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.036947012 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.364557028 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.368417978 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:25.409651995 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:46.591531992 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:46.929729939 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:46.929788113 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:48.343677044 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:48.343837023 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:48.681770086 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:48.681910038 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:49.020174980 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:49.020421982 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:49.399347067 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:49.712979078 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:49.717989922 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:50.055988073 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:50.056225061 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:50.435487032 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:50.719082117 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:50.719218016 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.057389021 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.057405949 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.057670116 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.057734013 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.057801008 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.057847977 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.059207916 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.371807098 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.395664930 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.395723104 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.397027969 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.397089005 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.397207975 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.397267103 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.397327900 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.397368908 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.397692919 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.397741079 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.701870918 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.704339027 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.704339027 CET49761587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.708118916 CET49763587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.735075951 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735378027 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735394955 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735455990 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735559940 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.735598087 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735716105 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735778093 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:51.735838890 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.735964060 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:51.736017942 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.033389091 CET5874976151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.036114931 CET5874976351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.036189079 CET49763587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.073316097 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.073328972 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.073450089 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.073719025 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.073771000 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.073895931 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.073990107 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074177980 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074292898 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074398994 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074474096 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074585915 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074678898 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074749947 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074795008 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074857950 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074923992 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.074995041 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.075249910 CET5874976251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.076119900 CET49762587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.097280025 CET49763587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.153836966 CET49764587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.425422907 CET5874976351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.479208946 CET5874976451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.480228901 CET49764587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.526532888 CET5874976351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.526546955 CET5874976351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.526609898 CET49763587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.526609898 CET49763587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.526853085 CET5874976351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.527044058 CET49763587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.566188097 CET49764587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.628999949 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.891339064 CET5874976451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.963637114 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.963704109 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.966814041 CET5874976451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.966840982 CET5874976451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.966895103 CET49764587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.967156887 CET5874976451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:52.967185020 CET49764587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:52.967205048 CET49764587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:53.892549992 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:53.894192934 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:54.229209900 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:54.229417086 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:54.565218925 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:54.570250988 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:54.816246986 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:54.888421059 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:54.912740946 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:54.912800074 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:55.151262045 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:55.151310921 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:55.151571989 CET5874976551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:55.151628971 CET49765587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:55.216442108 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:55.218138933 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:55.708498955 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:55.709254026 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:56.036773920 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:56.036978960 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:56.364911079 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:56.365103006 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:56.700086117 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:56.700246096 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:57.027564049 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:57.027707100 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:57.396076918 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:57.679044008 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:57.684030056 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.011626959 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.011641026 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.011915922 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.011915922 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.011955023 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.011990070 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.013016939 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.340037107 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.340960979 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.341083050 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.341109991 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.341202021 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.341203928 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.341315031 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.381902933 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.382036924 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669101000 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669117928 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669132948 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669156075 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669205904 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669229031 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669269085 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669281960 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669292927 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669316053 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669325113 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669346094 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669362068 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669363022 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669384956 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.669413090 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.669442892 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:58.709198952 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.996630907 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.996646881 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.996659040 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.996689081 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997606993 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997657061 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997667074 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997700930 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997747898 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997812986 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997823954 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997843981 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997869968 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997934103 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997944117 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.997952938 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.998001099 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.998040915 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.998053074 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.998094082 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.998105049 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:58.998187065 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:59.315931082 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:59.325177908 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:59.327943087 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:33:59.378446102 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:33:59.643106937 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:03.646014929 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:03.973010063 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:03.973320961 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:03.974015951 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:03.976102114 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:03.976102114 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:03.982003927 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:04.300314903 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:04.302050114 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:04.303376913 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:04.305635929 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:04.305758953 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:04.627490044 CET5874976651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:04.627545118 CET49766587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:05.859705925 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:05.860129118 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:06.184118986 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:06.184314966 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:06.508233070 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:06.512458086 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:06.843652964 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:06.843823910 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:07.167639017 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:07.167783022 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:07.531861067 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:07.815110922 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:07.816261053 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.139795065 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.139830112 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.140047073 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.140078068 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.140144110 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.140182972 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.144038916 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.463613987 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.463716030 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.467561960 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.467933893 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.468007088 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.468046904 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.468154907 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.468177080 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.468302011 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.791743040 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.791836023 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.791841984 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.791848898 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:08.791889906 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:08.791908026 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:09.115530014 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115658998 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115670919 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115680933 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115691900 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115709066 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115748882 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115830898 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115909100 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.115957022 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.121484041 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:09.175335884 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:13.030797958 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:13.355309010 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:13.355412006 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:13.355412006 CET49767587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:13.356550932 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:13.679497957 CET5874976751.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:13.688112020 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:13.696001053 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:14.189565897 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:14.192274094 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:14.524430037 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:14.526124954 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:14.858160973 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:14.858397961 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:15.197937965 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:15.198147058 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:15.530333996 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:15.530488014 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:15.902359962 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:16.371783018 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:16.372304916 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:16.704197884 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:16.704224110 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:16.704585075 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:16.704674959 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:16.704722881 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:16.704777002 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:16.705939054 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.036765099 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.036828995 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.038408041 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.038455963 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.038516998 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.079452991 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.079511881 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.368920088 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.368999004 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370532036 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370573997 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370604038 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370604992 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370630980 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370649099 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370691061 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370728016 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370738029 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370770931 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370795965 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370835066 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370896101 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370906115 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.370939016 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.370959997 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.371011972 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.371056080 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.371073008 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.371145964 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:17.411792994 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.700849056 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.702336073 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.702368021 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.702414036 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.702461958 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703104973 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703208923 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703298092 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703358889 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703459024 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703521967 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.703558922 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.705933094 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:17.756050110 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:26.630986929 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:26.963865995 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:26.963933945 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:26.963994980 CET49768587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:26.965231895 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:27.295672894 CET5874976851.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:27.297367096 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:27.297435999 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:27.790985107 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:27.794133902 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:28.127245903 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:28.128165007 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:28.461091995 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:28.464168072 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:28.804677963 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:28.811490059 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:29.143872976 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:29.144042969 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:29.516944885 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:29.799726963 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:29.801211119 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.133912086 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.133930922 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.134162903 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.134207010 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.134284019 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.134284019 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.135294914 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.466784000 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.467648029 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.467700958 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.467798948 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.467900038 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.467936993 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.468008995 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.468139887 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.800415993 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.800432920 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.800481081 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.800570965 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.800582886 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.800605059 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.800622940 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.800637960 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.800685883 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.800832033 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.800875902 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.800966024 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.801004887 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.802081108 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.802128077 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.802190065 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:30.802228928 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:30.842264891 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133325100 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133342981 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133353949 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133364916 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133378029 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133496046 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133507013 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133517981 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133527994 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133538961 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133663893 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133711100 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133721113 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133784056 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133800983 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133846045 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133970022 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133980989 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.133991003 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.134095907 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.134145021 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.134207964 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.134284973 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.134294987 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.134377956 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:31.456589937 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:31.466543913 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.470031977 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:31.519097090 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:31.789016962 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:40.630558014 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:40.956602097 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:40.962979078 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:40.963645935 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:40.963695049 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:40.963767052 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:40.964863062 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:41.284739017 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:41.289103031 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:41.295883894 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:41.300066948 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:41.300162077 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:41.616775990 CET5874976951.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:41.616821051 CET49769587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:41.796077967 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:41.798223019 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:42.133290052 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:42.133563042 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:42.469429016 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:42.470230103 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:42.813056946 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:42.813230038 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:43.148365021 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:43.148509979 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:43.524221897 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:43.628587961 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:43.691706896 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:43.807437897 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:43.814016104 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:43.964032888 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:43.964158058 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:43.964504004 CET5874977051.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:43.964628935 CET49770587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:44.018493891 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:44.018630981 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:44.667638063 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:44.667804003 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:44.995027065 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:44.995183945 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.323563099 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:45.323905945 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.519196033 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.567610979 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.659008980 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:45.659101963 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.846625090 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:45.846971035 CET5874977151.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:45.847033024 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.847033024 CET49771587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:45.895037889 CET5874977251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:45.898113012 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:46.698137045 CET5874977251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:46.708982944 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:46.722526073 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:46.841892958 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:47.036694050 CET5874977251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:47.036778927 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:47.050024986 CET5874977251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:47.050069094 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:47.050242901 CET5874977251.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:47.050287962 CET49772587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:47.165134907 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:47.165227890 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:47.650085926 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:47.650243998 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:47.973659992 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:47.974162102 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:48.297979116 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:48.298187017 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:48.629096985 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:48.630151987 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:48.953470945 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:48.953615904 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:49.317302942 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:49.600481033 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:49.600617886 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:49.924232006 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:49.924263954 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:49.924520969 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:49.924573898 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:49.924573898 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:49.924671888 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:49.925775051 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:50.248092890 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.248266935 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:50.249373913 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.249547005 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:50.573121071 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.573137045 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.573218107 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.573255062 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.573282003 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:50.573379993 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:50.896516085 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896531105 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896575928 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:50.896612883 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896687984 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896748066 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896790981 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896831989 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896948099 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.896985054 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.897007942 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.897058010 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.897098064 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.897146940 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:50.897298098 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.082184076 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:51.143570900 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:51.221853018 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.225039959 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.225090981 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:51.405668974 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.405714035 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:51.406045914 CET5874977351.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.406085968 CET49773587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:51.473921061 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.473988056 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:51.966362000 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:51.973031044 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:52.304411888 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:52.306179047 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:52.637283087 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:52.645045996 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:53.016381025 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:53.284852982 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:53.328732967 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:53.328787088 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:53.370712996 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:53.615247011 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:53.615300894 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:53.615459919 CET5874977451.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:53.615505934 CET49774587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:53.696557045 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:53.696666956 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:54.184283972 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:54.184521914 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:54.510925055 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:54.511113882 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:54.837763071 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:54.838098049 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:55.172066927 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:55.172291994 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:55.498246908 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:55.573195934 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:56.973143101 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:56.973241091 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:57.054467916 CET49776587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:57.341006041 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:57.382307053 CET5874977651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:57.382394075 CET49776587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:57.622916937 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:57.622935057 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:57.623001099 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:57.623001099 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:57.623313904 CET5874977551.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:57.623359919 CET49775587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:57.871319056 CET5874977651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:57.871436119 CET49776587192.168.2.451.79.229.7
                                                        Mar 29, 2024 11:34:58.199166059 CET5874977651.79.229.7192.168.2.4
                                                        Mar 29, 2024 11:34:58.253501892 CET49776587192.168.2.451.79.229.7
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 29, 2024 11:30:52.671713114 CET6526353192.168.2.41.1.1.1
                                                        Mar 29, 2024 11:30:52.767791986 CET53652631.1.1.1192.168.2.4
                                                        Mar 29, 2024 11:30:53.942142963 CET6195953192.168.2.41.1.1.1
                                                        Mar 29, 2024 11:30:54.416799068 CET53619591.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Mar 29, 2024 11:30:52.671713114 CET192.168.2.41.1.1.10x59a1Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                        Mar 29, 2024 11:30:53.942142963 CET192.168.2.41.1.1.10xf74aStandard query (0)mail.gosportz.inA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Mar 29, 2024 11:30:52.767791986 CET1.1.1.1192.168.2.40x59a1No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                        Mar 29, 2024 11:30:52.767791986 CET1.1.1.1192.168.2.40x59a1No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                        Mar 29, 2024 11:30:52.767791986 CET1.1.1.1192.168.2.40x59a1No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                        Mar 29, 2024 11:30:54.416799068 CET1.1.1.1192.168.2.40xf74aNo error (0)mail.gosportz.in51.79.229.7A (IP address)IN (0x0001)false
                                                        • api.ipify.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449735104.26.13.2054436808C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-03-29 10:30:53 UTC155OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                        Host: api.ipify.org
                                                        Connection: Keep-Alive
                                                        2024-03-29 10:30:53 UTC211INHTTP/1.1 200 OK
                                                        Date: Fri, 29 Mar 2024 10:30:53 GMT
                                                        Content-Type: text/plain
                                                        Content-Length: 13
                                                        Connection: close
                                                        Vary: Origin
                                                        CF-Cache-Status: DYNAMIC
                                                        Server: cloudflare
                                                        CF-RAY: 86bf2fe6582e3952-IAD
                                                        2024-03-29 10:30:53 UTC13INData Raw: 31 30 32 2e 31 36 35 2e 34 38 2e 34 33
                                                        Data Ascii: 102.165.48.43


                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                        Mar 29, 2024 11:30:57.053921938 CET5874973851.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:00:55 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:30:57.057949066 CET49738587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:30:57.388297081 CET5874973851.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:30:57.390759945 CET49738587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:30:57.721575975 CET5874973851.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:30:58.374062061 CET5874973851.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:30:58.374439955 CET49738587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:30:58.704823017 CET5874973851.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:30:58.705063105 CET49738587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:30:59.550096035 CET5874973851.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:30:59.550374985 CET49738587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:30:59.880887985 CET5874973851.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:30:59.881491899 CET49738587192.168.2.451.79.229.7.
                                                        Mar 29, 2024 11:31:00.217231035 CET5874973851.79.229.7192.168.2.4250 OK id=1rq9Va-00C0Jc-Lw
                                                        Mar 29, 2024 11:32:29.404280901 CET49738587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:32:29.735270023 CET5874973851.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:32:32.236251116 CET5874975251.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:02:31 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:32:32.237797976 CET49752587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:32:32.564769983 CET5874975251.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:32:32.877808094 CET5874975251.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:32:34.562933922 CET5874975351.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:02:33 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:32:34.563081980 CET49753587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:32:34.890671968 CET5874975351.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:32:34.890929937 CET49753587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:32:35.218631029 CET5874975351.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:32:35.866506100 CET5874975351.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:32:35.866699934 CET49753587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:32:36.194207907 CET5874975351.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:32:36.196078062 CET49753587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:32:36.847512007 CET5874975351.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:32:36.847636938 CET49753587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:32:37.175096989 CET5874975351.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:32:37.346690893 CET5874975351.79.229.7192.168.2.4421 Lost incoming connection
                                                        Mar 29, 2024 11:32:38.623836040 CET5874975451.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:02:37 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:32:38.623965979 CET49754587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:32:38.947662115 CET5874975451.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:32:38.947809935 CET49754587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:32:39.271543980 CET5874975451.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:32:39.602577925 CET5874975451.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:32:39.606076956 CET49754587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:32:39.929730892 CET5874975451.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:32:39.929933071 CET49754587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:32:40.769996881 CET5874975451.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:32:40.770112038 CET49754587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:32:41.093678951 CET5874975451.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:32:42.906980038 CET5874975551.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:02:41 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:32:42.907212973 CET49755587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:32:43.234561920 CET5874975551.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:32:43.268547058 CET5874975551.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:32:43.809849024 CET5874975651.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:02:42 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:32:43.831559896 CET49756587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:32:44.160342932 CET5874975651.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:32:44.165663004 CET49756587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:32:44.494664907 CET5874975651.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:32:44.934900999 CET5874975651.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:32:44.935012102 CET49756587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:32:45.263410091 CET5874975651.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:32:45.263545990 CET49756587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:32:46.104513884 CET5874975651.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:32:46.104655027 CET49756587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:32:46.433049917 CET5874975651.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:32:47.450308084 CET5874975651.79.229.7192.168.2.4250 OK id=1rq9XJ-00C0sO-7V
                                                        Mar 29, 2024 11:32:47.739995003 CET49756587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:32:48.069359064 CET5874975651.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:32:49.205162048 CET5874975751.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:02:48 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:32:49.205331087 CET49757587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:32:49.536838055 CET5874975751.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:32:49.537081957 CET49757587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:32:49.868706942 CET5874975751.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:32:50.207633972 CET5874975751.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:32:50.207811117 CET49757587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:32:50.539326906 CET5874975751.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:32:50.539484978 CET49757587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:32:51.578958988 CET5874975751.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:32:51.579442024 CET49757587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:32:51.910372972 CET5874975751.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:32:52.908586025 CET5874975751.79.229.7192.168.2.4250 OK id=1rq9XO-00C0sl-Mj
                                                        Mar 29, 2024 11:32:59.633996010 CET49757587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:32:59.966006041 CET5874975751.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:33:01.933011055 CET5874975851.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:00 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:01.965972900 CET49758587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:02.296955109 CET5874975851.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:02.297213078 CET49758587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:02.628475904 CET5874975851.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:02.967454910 CET5874975851.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:03.022068977 CET5874975851.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:33:03.556862116 CET5874975951.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:02 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:03.562078953 CET49759587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:03.889468908 CET5874975951.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:03.890111923 CET49759587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:04.217725992 CET5874975951.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:04.553942919 CET5874975951.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:04.558012009 CET49759587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:33:04.885474920 CET5874975951.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:33:04.886534929 CET49759587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:33:05.915577888 CET5874975951.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:33:05.915775061 CET49759587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:33:06.243138075 CET5874975951.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:33:07.232022047 CET5874975951.79.229.7192.168.2.4250 OK id=1rq9Xd-00C0ui-1I
                                                        Mar 29, 2024 11:33:15.448297977 CET49759587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:33:15.776487112 CET5874975951.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:33:16.597810984 CET5874976051.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:15 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:16.598009109 CET49760587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:16.926455021 CET5874976051.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:16.927232981 CET49760587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:17.256053925 CET5874976051.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:17.627615929 CET5874976051.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:17.817698002 CET49760587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:33:18.146157026 CET5874976051.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:33:18.334162951 CET49760587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:33:19.177416086 CET5874976051.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:33:19.273478031 CET49760587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:33:19.601792097 CET5874976051.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:33:21.724108934 CET5874976151.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:20 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:21.724339008 CET49761587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:22.056971073 CET5874976151.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:22.057145119 CET49761587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:22.386478901 CET5874976151.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:22.723340988 CET5874976151.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:22.723507881 CET49761587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:33:23.052629948 CET5874976151.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:33:23.052793026 CET49761587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:33:23.705164909 CET5874976151.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:33:23.710088968 CET49761587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:33:24.039536953 CET5874976151.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:33:25.368417978 CET5874976151.79.229.7192.168.2.4250 OK id=1rq9Xu-00C0xQ-Qw
                                                        Mar 29, 2024 11:33:48.343677044 CET5874976251.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:47 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:48.343837023 CET49762587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:48.681770086 CET5874976251.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:48.681910038 CET49762587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:49.020174980 CET5874976251.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:49.712979078 CET5874976251.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:49.717989922 CET49762587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:33:50.055988073 CET5874976251.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:33:50.056225061 CET49762587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:33:50.719082117 CET5874976251.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:33:50.719218016 CET49762587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:33:51.057405949 CET5874976251.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:33:51.371807098 CET49761587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:33:51.701870918 CET5874976151.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:33:52.074923992 CET5874976251.79.229.7192.168.2.4421 Lost incoming connection
                                                        Mar 29, 2024 11:33:52.526532888 CET5874976351.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:51 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:52.526546955 CET5874976351.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:33:52.966814041 CET5874976451.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:51 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:52.966840982 CET5874976451.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:33:53.892549992 CET5874976551.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:52 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:53.894192934 CET49765587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:54.229209900 CET5874976551.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:54.229417086 CET49765587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:54.565218925 CET5874976551.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:54.912740946 CET5874976551.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:55.151262045 CET5874976551.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:33:55.708498955 CET5874976651.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:03:54 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:33:55.709254026 CET49766587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:33:56.036773920 CET5874976651.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:33:56.036978960 CET49766587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:33:56.364911079 CET5874976651.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:33:56.700086117 CET5874976651.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:33:56.700246096 CET49766587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:33:57.027564049 CET5874976651.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:33:57.027707100 CET49766587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:33:57.679044008 CET5874976651.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:33:57.684030056 CET49766587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:33:58.011641026 CET5874976651.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:33:58.998187065 CET49766587192.168.2.451.79.229.7.
                                                        Mar 29, 2024 11:33:59.315931082 CET49766587192.168.2.451.79.229.7.
                                                        Mar 29, 2024 11:33:59.327943087 CET5874976651.79.229.7192.168.2.4250 OK id=1rq9YS-00C111-Q5
                                                        Mar 29, 2024 11:34:03.646014929 CET49766587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:34:03.973010063 CET49766587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:34:03.974015951 CET5874976651.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:34:05.859705925 CET5874976751.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:04 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:05.860129118 CET49767587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:06.184118986 CET5874976751.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:06.184314966 CET49767587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:06.508233070 CET5874976751.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:06.843652964 CET5874976751.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:06.843823910 CET49767587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:34:07.167639017 CET5874976751.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:34:07.167783022 CET49767587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:34:07.815110922 CET5874976751.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:34:07.816261053 CET49767587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:34:08.139830112 CET5874976751.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:34:09.121484041 CET5874976751.79.229.7192.168.2.4250 OK id=1rq9Yc-00C12I-UL
                                                        Mar 29, 2024 11:34:13.030797958 CET49767587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:34:13.355309010 CET5874976751.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:34:14.189565897 CET5874976851.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:13 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:14.192274094 CET49768587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:14.524430037 CET5874976851.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:14.526124954 CET49768587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:14.858160973 CET5874976851.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:15.197937965 CET5874976851.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:15.198147058 CET49768587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:34:15.530333996 CET5874976851.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:34:15.530488014 CET49768587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:34:16.371783018 CET5874976851.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:34:16.372304916 CET49768587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:34:16.704224110 CET5874976851.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:34:17.705933094 CET5874976851.79.229.7192.168.2.4250 OK id=1rq9Yl-00C13D-G0
                                                        Mar 29, 2024 11:34:26.630986929 CET49768587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:34:26.963865995 CET5874976851.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:34:27.790985107 CET5874976951.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:26 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:27.794133902 CET49769587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:28.127245903 CET5874976951.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:28.128165007 CET49769587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:28.461091995 CET5874976951.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:28.804677963 CET5874976951.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:28.811490059 CET49769587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:34:29.143872976 CET5874976951.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:34:29.144042969 CET49769587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:34:29.799726963 CET5874976951.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:34:29.801211119 CET49769587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:34:30.133930922 CET5874976951.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:34:31.134377956 CET49769587192.168.2.451.79.229.7.
                                                        Mar 29, 2024 11:34:31.456589937 CET49769587192.168.2.451.79.229.7.
                                                        Mar 29, 2024 11:34:31.470031977 CET5874976951.79.229.7192.168.2.4250 OK id=1rq9Yy-00C15H-Tr
                                                        Mar 29, 2024 11:34:40.630558014 CET49769587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:34:40.956602097 CET49769587192.168.2.451.79.229.7QUIT
                                                        Mar 29, 2024 11:34:40.963645935 CET5874976951.79.229.7192.168.2.4221 ns5005362.ip-51-79-229.net closing connection
                                                        Mar 29, 2024 11:34:41.796077967 CET5874977051.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:40 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:41.798223019 CET49770587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:42.133290052 CET5874977051.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:42.133563042 CET49770587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:42.469429016 CET5874977051.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:42.813056946 CET5874977051.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:42.813230038 CET49770587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:34:43.148365021 CET5874977051.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:34:43.148509979 CET49770587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:34:43.807437897 CET5874977051.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:34:43.964032888 CET5874977051.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:34:44.667638063 CET5874977151.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:43 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:44.667804003 CET49771587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:44.995027065 CET5874977151.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:44.995183945 CET49771587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:45.323563099 CET5874977151.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:45.659008980 CET5874977151.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:45.846625090 CET5874977151.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:34:46.698137045 CET5874977251.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:45 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:46.708982944 CET49772587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:47.036694050 CET5874977251.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:47.050024986 CET5874977251.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:34:47.650085926 CET5874977351.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:46 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:47.650243998 CET49773587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:47.973659992 CET5874977351.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:47.974162102 CET49773587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:48.297979116 CET5874977351.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:48.629096985 CET5874977351.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:48.630151987 CET49773587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:34:48.953470945 CET5874977351.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:34:48.953615904 CET49773587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:34:49.600481033 CET5874977351.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:34:49.600617886 CET49773587192.168.2.451.79.229.7DATA
                                                        Mar 29, 2024 11:34:49.924263954 CET5874977351.79.229.7192.168.2.4354 Enter message, ending with "." on a line by itself
                                                        Mar 29, 2024 11:34:51.225039959 CET5874977351.79.229.7192.168.2.4250 OK id=1rq9ZI-00C186-NM
                                                        Mar 29, 2024 11:34:51.405668974 CET5874977351.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:34:51.966362000 CET5874977451.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:50 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:51.973031044 CET49774587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:52.304411888 CET5874977451.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:52.306179047 CET49774587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:52.637283087 CET5874977451.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:53.328732967 CET5874977451.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:53.615247011 CET5874977451.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:34:54.184283972 CET5874977551.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:53 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:54.184521914 CET49775587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:54.510925055 CET5874977551.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Mar 29, 2024 11:34:54.511113882 CET49775587192.168.2.451.79.229.7AUTH login c2FsZXNAZ29zcG9ydHouaW4=
                                                        Mar 29, 2024 11:34:54.837763071 CET5874977551.79.229.7192.168.2.4334 UGFzc3dvcmQ6
                                                        Mar 29, 2024 11:34:55.172066927 CET5874977551.79.229.7192.168.2.4235 Authentication succeeded
                                                        Mar 29, 2024 11:34:55.172291994 CET49775587192.168.2.451.79.229.7MAIL FROM:<sales@gosportz.in>
                                                        Mar 29, 2024 11:34:55.498246908 CET5874977551.79.229.7192.168.2.4250 OK
                                                        Mar 29, 2024 11:34:56.973143101 CET49775587192.168.2.451.79.229.7RCPT TO:<info.superseal@yandex.com>
                                                        Mar 29, 2024 11:34:57.622916937 CET5874977551.79.229.7192.168.2.4250 Accepted
                                                        Mar 29, 2024 11:34:57.622935057 CET5874977551.79.229.7192.168.2.4421 ns5005362.ip-51-79-229.net lost input connection
                                                        Mar 29, 2024 11:34:57.871319056 CET5874977651.79.229.7192.168.2.4220-ns5005362.ip-51-79-229.net ESMTP Exim 4.94.2 #2 Fri, 29 Mar 2024 16:04:56 +0530
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Mar 29, 2024 11:34:57.871436119 CET49776587192.168.2.451.79.229.7EHLO 302494
                                                        Mar 29, 2024 11:34:58.199166059 CET5874977651.79.229.7192.168.2.4250-ns5005362.ip-51-79-229.net Hello 302494 [102.165.48.43]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:11:30:48
                                                        Start date:29/03/2024
                                                        Path:C:\Users\user\Desktop\bhevLCQYD6.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\bhevLCQYD6.exe"
                                                        Imagebase:0x1d7807f0000
                                                        File size:661'864 bytes
                                                        MD5 hash:83B5F3C1326831AB20C2D8114E4C324E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1738465464.000001D782B1C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1739589900.000001D792611000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:11:30:50
                                                        Start date:29/03/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                                                        Imagebase:
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:3
                                                        Start time:11:30:51
                                                        Start date:29/03/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                        Imagebase:0x560000
                                                        File size:43'008 bytes
                                                        MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4052069622.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4053823405.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:11:30:51
                                                        Start date:29/03/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                        Imagebase:0x420000
                                                        File size:43'008 bytes
                                                        MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:11:30:51
                                                        Start date:29/03/2024
                                                        Path:C:\Windows\System32\WerFault.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 6956 -s 1212
                                                        Imagebase:0x7ff757a70000
                                                        File size:570'736 bytes
                                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:16%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:3
                                                          Total number of Limit Nodes:0
                                                          execution_graph 15074 7ffd9b8b3f39 15075 7ffd9b8b3f47 VirtualProtect 15074->15075 15077 7ffd9b8b400e 15075->15077

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 80 7ffd9b8b7c40-7ffd9b8da4c5 82 7ffd9b8da4c7-7ffd9b8da50d 80->82 83 7ffd9b8da50f-7ffd9b8da516 call 7ffd9b8bbbc8 80->83 82->83 87 7ffd9b8da52b-7ffd9b8da532 83->87 88 7ffd9b8da518-7ffd9b8da526 call 7ffd9b8b6860 83->88 90 7ffd9b8da538-7ffd9b8da562 call 7ffd9b8b7cb8 87->90 91 7ffd9b8dab22-7ffd9b8dab68 call 7ffd9b8b75b0 87->91 88->87 96 7ffd9b8da5a9-7ffd9b8da5c6 90->96 97 7ffd9b8da564-7ffd9b8da574 call 7ffd9b8b7f28 90->97 101 7ffd9b8da5c8-7ffd9b8da5ed call 7ffd9b8d59d0 call 7ffd9b8d67f0 96->101 102 7ffd9b8da5fe-7ffd9b8da604 96->102 100 7ffd9b8da579-7ffd9b8da5a8 call 7ffd9b8b7f28 97->100 112 7ffd9b8da63e 101->112 121 7ffd9b8da5ef-7ffd9b8da5fd call 7ffd9b8d6b30 101->121 103 7ffd9b8da606-7ffd9b8da613 call 7ffd9b8d6ae0 102->103 104 7ffd9b8da615 102->104 108 7ffd9b8da61a-7ffd9b8da61c 103->108 104->108 108->112 113 7ffd9b8da61e-7ffd9b8da628 call 7ffd9b8d6b30 108->113 117 7ffd9b8da640-7ffd9b8da645 112->117 123 7ffd9b8da62a-7ffd9b8da635 call 7ffd9b8d6ae0 113->123 124 7ffd9b8da637 113->124 118 7ffd9b8da64b-7ffd9b8da64f 117->118 119 7ffd9b8da7b3-7ffd9b8da7b5 117->119 118->119 122 7ffd9b8da655-7ffd9b8da6a0 call 7ffd9b8d5a18 call 7ffd9b8d7790 118->122 125 7ffd9b8da9da-7ffd9b8da9f0 119->125 126 7ffd9b8da7bb 119->126 121->102 168 7ffd9b8da71c-7ffd9b8da71e 122->168 169 7ffd9b8da6a2-7ffd9b8da6a8 122->169 130 7ffd9b8da63c 123->130 124->130 134 7ffd9b8daacb-7ffd9b8daad7 125->134 135 7ffd9b8da9f6-7ffd9b8daa01 call 7ffd9b8d67f0 125->135 132 7ffd9b8da7bc-7ffd9b8da7c7 126->132 130->117 132->125 136 7ffd9b8da7cd-7ffd9b8da7eb call 7ffd9b8b7d10 132->136 137 7ffd9b8daad9-7ffd9b8dab12 call 7ffd9b8d5a68 call 7ffd9b8b7c78 134->137 138 7ffd9b8dab14-7ffd9b8dab1d call 7ffd9b8b7c48 134->138 135->134 148 7ffd9b8daa07-7ffd9b8daa99 call 7ffd9b8b02d8 135->148 149 7ffd9b8da7ed-7ffd9b8da7fb call 7ffd9b8b7c48 136->149 150 7ffd9b8da800-7ffd9b8da804 136->150 137->91 138->91 149->91 155 7ffd9b8da80a-7ffd9b8da817 call 7ffd9b8bbb98 150->155 156 7ffd9b8da88e-7ffd9b8da892 150->156 172 7ffd9b8da819-7ffd9b8da850 call 7ffd9b8d5a18 call 7ffd9b8d7778 155->172 173 7ffd9b8da855-7ffd9b8da88c call 7ffd9b8d5a18 call 7ffd9b8d7778 155->173 161 7ffd9b8da8d6-7ffd9b8da8d7 156->161 162 7ffd9b8da894-7ffd9b8da8ab call 7ffd9b8d5a18 call 7ffd9b8d77b8 156->162 164 7ffd9b8da8d9-7ffd9b8da8f7 161->164 192 7ffd9b8da8be 162->192 193 7ffd9b8da8ad-7ffd9b8da8bc 162->193 190 7ffd9b8da8f9-7ffd9b8da93e 164->190 175 7ffd9b8da720-7ffd9b8da728 168->175 176 7ffd9b8da6aa-7ffd9b8da6af 169->176 177 7ffd9b8da729-7ffd9b8da730 169->177 172->161 173->161 175->177 176->175 181 7ffd9b8da6b1-7ffd9b8da6b6 176->181 188 7ffd9b8da737-7ffd9b8da756 177->188 187 7ffd9b8da6b8-7ffd9b8da6de 181->187 181->188 187->177 216 7ffd9b8da6e0-7ffd9b8da717 187->216 205 7ffd9b8da758-7ffd9b8da75d 188->205 206 7ffd9b8da7a1-7ffd9b8da7ae 188->206 224 7ffd9b8da989-7ffd9b8da9b9 call 7ffd9b8b02d8 190->224 225 7ffd9b8da940-7ffd9b8da984 190->225 192->190 199 7ffd9b8da8c0-7ffd9b8da8c7 192->199 193->192 199->164 201 7ffd9b8da8c9-7ffd9b8da8d4 199->201 201->161 213 7ffd9b8da762-7ffd9b8da77a call 7ffd9b8b02d8 205->213 206->91 213->132 226 7ffd9b8da77c-7ffd9b8da792 213->226 216->213 235 7ffd9b8da719-7ffd9b8da71b 216->235 224->91 239 7ffd9b8da9bf-7ffd9b8da9d5 224->239 225->224 226->91 236 7ffd9b8da798-7ffd9b8da79d 226->236 235->168 236->206 239->91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: >K_I$zI_L
                                                          • API String ID: 0-2214994172
                                                          • Opcode ID: b652ff5e4cc41453a1822f1539f18745bbb120ceae21bb2e93eed446489ddddc
                                                          • Instruction ID: f9b8f944ce858075c880d1aac26a271dfbcdebb23b6ad310a424977000fe2240
                                                          • Opcode Fuzzy Hash: b652ff5e4cc41453a1822f1539f18745bbb120ceae21bb2e93eed446489ddddc
                                                          • Instruction Fuzzy Hash: 8A22E731B1DA4E5BE76CAB6894666B573D2EFD8340F51437EE04EC32D3DE38A9024681
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1d0827321530d8c79b6b9b99d621e237fd1897705593ce264b4293ff68730d0b
                                                          • Instruction ID: 418861f47c7ef88f7ff1b5c45b46b93073923b78e1c2d1961275a81532effbe2
                                                          • Opcode Fuzzy Hash: 1d0827321530d8c79b6b9b99d621e237fd1897705593ce264b4293ff68730d0b
                                                          • Instruction Fuzzy Hash: 8C33827061DB898FD7B8DB58C495AAA77E1FF98300F11467ED08DC72A2DE34A942C742
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 883 7ffd9b8de870-7ffd9b8de8b9 884 7ffd9b8de8bb-7ffd9b8de8bc 883->884 885 7ffd9b8de8be-7ffd9b8de8f5 call 7ffd9b8b7e98 call 7ffd9b8dd640 883->885 884->885 890 7ffd9b8de8f7-7ffd9b8de904 call 7ffd9b8dd640 885->890 891 7ffd9b8de961-7ffd9b8de96e call 7ffd9b8dd640 885->891 898 7ffd9b8de906-7ffd9b8de91b 890->898 899 7ffd9b8de940-7ffd9b8de957 call 7ffd9b8b7ea0 890->899 896 7ffd9b8de991-7ffd9b8de9ad call 7ffd9b8b7ea0 891->896 897 7ffd9b8de970-7ffd9b8de98f call 7ffd9b8b7ea0 891->897 909 7ffd9b8de9af-7ffd9b8de9fc 896->909 897->909 898->899 903 7ffd9b8de91d-7ffd9b8de937 call 7ffd9b8d6c80 898->903 904 7ffd9b8de95c-7ffd9b8de95f 899->904 908 7ffd9b8de93c-7ffd9b8de93e 903->908 904->909 908->891 908->899 912 7ffd9b8dea09-7ffd9b8dea26 909->912 913 7ffd9b8de9fe-7ffd9b8dea07 909->913 914 7ffd9b8dea2c-7ffd9b8dea36 912->914 913->914 915 7ffd9b8dea38-7ffd9b8dea3b 914->915 916 7ffd9b8dea3d-7ffd9b8dea8e call 7ffd9b8cd850 call 7ffd9b8cd900 914->916 917 7ffd9b8deab6-7ffd9b8deabc 915->917 938 7ffd9b8dea90-7ffd9b8deaad call 7ffd9b8b6e38 916->938 939 7ffd9b8deaaf-7ffd9b8deab0 916->939 919 7ffd9b8deabe-7ffd9b8deac2 917->919 920 7ffd9b8deb0f-7ffd9b8deb13 917->920 919->920 922 7ffd9b8deac4-7ffd9b8deafa call 7ffd9b8b7580 919->922 923 7ffd9b8deb19-7ffd9b8deb2a call 7ffd9b8dd640 920->923 924 7ffd9b8df131-7ffd9b8df16d call 7ffd9b8b7580 920->924 934 7ffd9b8deafc-7ffd9b8deb01 call 7ffd9b8c9248 922->934 935 7ffd9b8deb06-7ffd9b8deb0a 922->935 936 7ffd9b8dec78-7ffd9b8dec7c 923->936 937 7ffd9b8deb30-7ffd9b8deb33 923->937 940 7ffd9b8df179-7ffd9b8df17d 924->940 941 7ffd9b8df16f-7ffd9b8df174 call 7ffd9b8c9248 924->941 934->935 945 7ffd9b8df1f3-7ffd9b8df206 935->945 946 7ffd9b8dede8-7ffd9b8dedf1 936->946 947 7ffd9b8dec82-7ffd9b8deca2 936->947 948 7ffd9b8deb75-7ffd9b8deb82 937->948 949 7ffd9b8deb35-7ffd9b8deb70 937->949 938->917 939->917 942 7ffd9b8df18b-7ffd9b8df18f 940->942 943 7ffd9b8df17f-7ffd9b8df183 940->943 941->940 952 7ffd9b8df19a-7ffd9b8df19f 942->952 953 7ffd9b8df191-7ffd9b8df194 942->953 943->952 958 7ffd9b8dedfb-7ffd9b8dee51 946->958 959 7ffd9b8dedf3-7ffd9b8dedf8 946->959 947->946 965 7ffd9b8deca8-7ffd9b8decab 947->965 954 7ffd9b8deb88-7ffd9b8debae 948->954 949->945 963 7ffd9b8df1ba-7ffd9b8df1c7 call 7ffd9b8dd640 952->963 964 7ffd9b8df1a1-7ffd9b8df1a4 952->964 953->952 961 7ffd9b8df196 953->961 993 7ffd9b8debe9-7ffd9b8debed 954->993 994 7ffd9b8debb0-7ffd9b8debe8 call 7ffd9b8c00d8 954->994 979 7ffd9b8dee98-7ffd9b8dee9c 958->979 980 7ffd9b8dee53-7ffd9b8dee56 958->980 959->958 961->952 983 7ffd9b8df1c9-7ffd9b8df1d4 call 7ffd9b8b7eb0 963->983 984 7ffd9b8df1e4-7ffd9b8df1e7 963->984 967 7ffd9b8df1ab-7ffd9b8df1ac 964->967 968 7ffd9b8df1a6-7ffd9b8df1a9 964->968 970 7ffd9b8deced-7ffd9b8ded63 call 7ffd9b8c00d8 965->970 971 7ffd9b8decad-7ffd9b8dece8 965->971 976 7ffd9b8df1af-7ffd9b8df1b5 call 7ffd9b8b7ec0 967->976 968->976 970->946 971->945 976->963 979->924 988 7ffd9b8dee58-7ffd9b8dee93 980->988 989 7ffd9b8deea1-7ffd9b8deea4 980->989 995 7ffd9b8df1d9-7ffd9b8df1db 983->995 990 7ffd9b8df1e9 984->990 991 7ffd9b8df1f0-7ffd9b8df1f1 984->991 988->945 999 7ffd9b8deeaa-7ffd9b8df01b call 7ffd9b8c00d8 call 7ffd9b8b02d8 989->999 1000 7ffd9b8df045-7ffd9b8df0e1 call 7ffd9b8c00d8 call 7ffd9b8b02d8 989->1000 990->991 991->945 993->954 1001 7ffd9b8debef-7ffd9b8dec4e call 7ffd9b8b02d8 993->1001 994->993 995->984 1003 7ffd9b8df1dd 995->1003 1053 7ffd9b8df03c-7ffd9b8df040 999->1053 1054 7ffd9b8df01d-7ffd9b8df037 999->1054 1037 7ffd9b8df0e4-7ffd9b8df0eb 1000->1037 1027 7ffd9b8dec50-7ffd9b8dec6a 1001->1027 1028 7ffd9b8dec6f-7ffd9b8dec73 1001->1028 1003->984 1027->924 1028->924 1040 7ffd9b8df0ed-7ffd9b8df115 1037->1040 1044 7ffd9b8df185-7ffd9b8df189 1040->1044 1045 7ffd9b8df117-7ffd9b8df12e 1040->1045 1044->924 1045->924 1053->924 1054->924
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 6I_H
                                                          • API String ID: 0-3463136791
                                                          • Opcode ID: b0b13cee7539f7a08d7613317dae4fd9cafbc35987c677b41d767af3d7c5ad0c
                                                          • Instruction ID: 109f4db94b78d76e8ad0c8c36095754aa71aa4d0e4be528903077a3c52dca476
                                                          • Opcode Fuzzy Hash: b0b13cee7539f7a08d7613317dae4fd9cafbc35987c677b41d767af3d7c5ad0c
                                                          • Instruction Fuzzy Hash: CC624370B19A1D8FDBA8DB58C465BB873E1FF9C300F5542BAD00DD7296DE34A9428B41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bfb4b56db5d86237d208feb8640d9c34fac3d8458ea1e8191fd0118f10cfcf90
                                                          • Instruction ID: 749ce23a3306b3b2da1563efdce92a2333de161169d59e41dad3c8b86af13bbc
                                                          • Opcode Fuzzy Hash: bfb4b56db5d86237d208feb8640d9c34fac3d8458ea1e8191fd0118f10cfcf90
                                                          • Instruction Fuzzy Hash: 7B720531B1DA1E4FEB6C9BB8982567977D1EF58310F15427ED00EC31E6DE29AC428B81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d9a207ada37e6999247f92cab0a790bbc9ce5acc7730963cf2e2561c6c95d702
                                                          • Instruction ID: e044cd1ad10b913fff36b5a401598942eebf14441619cb5fa79ea860ce824564
                                                          • Opcode Fuzzy Hash: d9a207ada37e6999247f92cab0a790bbc9ce5acc7730963cf2e2561c6c95d702
                                                          • Instruction Fuzzy Hash: 3652B031B19A4A4FEBA8DB189465A7473D2FF9C340F1543BAD04EC72E6DE24AD428781
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 45b5aa3467a2050fea1278f2f9dac7439a14e36635aeec533584c4397096ed23
                                                          • Instruction ID: 3baa387b66797619f2b93779f2cb6ce382a18e66b0e3c46b7622f3a8bda54dc3
                                                          • Opcode Fuzzy Hash: 45b5aa3467a2050fea1278f2f9dac7439a14e36635aeec533584c4397096ed23
                                                          • Instruction Fuzzy Hash: 75224A30A1DB894FE75AEB6888615657BE1EF5A300B0A41FFD089C71F3DD28AD46C741
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a884abe7484f6a1e2f159ea487ce49f90f4557d9aa34e44aac69fb745b072801
                                                          • Instruction ID: fba23cb7a3cabcb9f5c10c3bd4b002dfdc628edbf960d2787b1eca4739cfd9d1
                                                          • Opcode Fuzzy Hash: a884abe7484f6a1e2f159ea487ce49f90f4557d9aa34e44aac69fb745b072801
                                                          • Instruction Fuzzy Hash: FE911671B2EB5A4FD36DAFBC18261B47BC1EF58350B0542BED40AC72F6ED5968028781
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 733 7ffd9b9e0c7b-7ffd9b9e0c7d 734 7ffd9b9e0dc1-7ffd9b9e0dc7 733->734 735 7ffd9b9e0c7e-7ffd9b9e0c8c 733->735 738 7ffd9b9e0dc9-7ffd9b9e0dd8 734->738 737 7ffd9b9e0c94-7ffd9b9e0c96 735->737 739 7ffd9b9e0c98-7ffd9b9e0c99 737->739 740 7ffd9b9e0d07-7ffd9b9e0d16 737->740 742 7ffd9b9e0dd9-7ffd9b9e0e37 738->742 743 7ffd9b9e0c9b 739->743 744 7ffd9b9e0c5f-7ffd9b9e0c65 739->744 741 7ffd9b9e0d17-7ffd9b9e0d19 740->741 741->734 747 7ffd9b9e0d1a-7ffd9b9e0d58 741->747 758 7ffd9b9e0e39-7ffd9b9e0e50 742->758 759 7ffd9b9e0e6c-7ffd9b9e0e84 742->759 743->741 749 7ffd9b9e0c9d 743->749 745 7ffd9b9e0c67-7ffd9b9e0c7a 744->745 746 7ffd9b9e0c02-7ffd9b9e0c32 744->746 745->733 746->734 750 7ffd9b9e0c38-7ffd9b9e0c4b 746->750 747->738 773 7ffd9b9e0d5a-7ffd9b9e0d5d 747->773 753 7ffd9b9e0ce4 749->753 754 7ffd9b9e0c9f-7ffd9b9e0cc8 749->754 750->734 756 7ffd9b9e0c51-7ffd9b9e0c5e 750->756 753->734 755 7ffd9b9e0cea-7ffd9b9e0d05 753->755 754->734 765 7ffd9b9e0cce-7ffd9b9e0ce1 754->765 755->740 756->744 762 7ffd9b9e0e52-7ffd9b9e0e6a 758->762 763 7ffd9b9e0ec1-7ffd9b9e0f10 758->763 762->759 779 7ffd9b9e0f12-7ffd9b9e0f44 763->779 780 7ffd9b9e0f81-7ffd9b9e0fd0 763->780 765->753 773->742 775 7ffd9b9e0d5f 773->775 777 7ffd9b9e0da6-7ffd9b9e0dc0 775->777 778 7ffd9b9e0d61-7ffd9b9e0d71 775->778 788 7ffd9b9e0fd2-7ffd9b9e1004 780->788 789 7ffd9b9e1041-7ffd9b9e108a 780->789 792 7ffd9b9e108c-7ffd9b9e108e 789->792 793 7ffd9b9e10fb-7ffd9b9e1109 789->793 795 7ffd9b9e110a-7ffd9b9e114c 792->795 796 7ffd9b9e1090 792->796 793->795 805 7ffd9b9e1196-7ffd9b9e119b 795->805 806 7ffd9b9e114e 795->806 798 7ffd9b9e10d6-7ffd9b9e10d7 796->798 799 7ffd9b9e1092-7ffd9b9e10b8 796->799 803 7ffd9b9e10ba-7ffd9b9e10ca 799->803 804 7ffd9b9e10cc-7ffd9b9e10d5 799->804 803->804 804->798 809 7ffd9b9e119c-7ffd9b9e11ae 805->809 810 7ffd9b9e1452-7ffd9b9e1466 805->810 808 7ffd9b9e1152-7ffd9b9e1182 806->808 808->810 812 7ffd9b9e1188-7ffd9b9e1195 808->812 811 7ffd9b9e11af-7ffd9b9e11b5 809->811 815 7ffd9b9e1467-7ffd9b9e14c7 810->815 811->808 814 7ffd9b9e11b7-7ffd9b9e11cd 811->814 812->805 814->810 818 7ffd9b9e11d3-7ffd9b9e11e6 814->818 819 7ffd9b9e14c9-7ffd9b9e14e0 815->819 820 7ffd9b9e14fc-7ffd9b9e1514 815->820 826 7ffd9b9e11e8-7ffd9b9e11e9 818->826 827 7ffd9b9e1257-7ffd9b9e1266 818->827 821 7ffd9b9e14e2-7ffd9b9e14fb 819->821 822 7ffd9b9e1551-7ffd9b9e15a0 819->822 820->822 821->820 833 7ffd9b9e15a2-7ffd9b9e15d4 822->833 834 7ffd9b9e1611-7ffd9b9e1647 822->834 826->811 831 7ffd9b9e11eb 826->831 829 7ffd9b9e1267-7ffd9b9e1269 827->829 829->810 835 7ffd9b9e126a-7ffd9b9e1282 829->835 831->829 836 7ffd9b9e11ed 831->836 847 7ffd9b9e1649-7ffd9b9e1660 834->847 848 7ffd9b9e167c-7ffd9b9e1694 834->848 849 7ffd9b9e1284-7ffd9b9e1287 835->849 850 7ffd9b9e12f3-7ffd9b9e1300 835->850 839 7ffd9b9e1234 836->839 840 7ffd9b9e11ef-7ffd9b9e1218 836->840 839->810 845 7ffd9b9e123a-7ffd9b9e1255 839->845 840->810 851 7ffd9b9e121e-7ffd9b9e1231 840->851 845->827 853 7ffd9b9e1662-7ffd9b9e1678 847->853 854 7ffd9b9e16d1-7ffd9b9e170e 847->854 855 7ffd9b9e1289 849->855 856 7ffd9b9e1303 849->856 850->856 851->839 853->848 859 7ffd9b9e128b-7ffd9b9e12b2 855->859 860 7ffd9b9e12d0 855->860 856->810 862 7ffd9b9e1309-7ffd9b9e131c 856->862 859->810 869 7ffd9b9e12b8-7ffd9b9e12ce 859->869 865 7ffd9b9e12d2 860->865 866 7ffd9b9e12d3-7ffd9b9e12f1 860->866 872 7ffd9b9e131e-7ffd9b9e1322 862->872 873 7ffd9b9e138d-7ffd9b9e13a0 862->873 865->866 866->850 869->810 869->860 874 7ffd9b9e1324 872->874 875 7ffd9b9e13a3 872->875 873->875 876 7ffd9b9e1384-7ffd9b9e138b 874->876 875->810 877 7ffd9b9e13a9-7ffd9b9e13f6 875->877 876->873 877->815 880 7ffd9b9e13f8-7ffd9b9e13fd 877->880 880->876 882 7ffd9b9e13ff 880->882 882->810
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1745229501.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b9e0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: A
                                                          • API String ID: 0-3554254475
                                                          • Opcode ID: 24226122240dcf5b3b391bfb2a06da7daaaa7bd384ba3c6c4607e69a190c9a31
                                                          • Instruction ID: 3ba5ff72ed5702e438e361af535d32616e8e0b9f58b1baa7c532aaf3c79c5fae
                                                          • Opcode Fuzzy Hash: 24226122240dcf5b3b391bfb2a06da7daaaa7bd384ba3c6c4607e69a190c9a31
                                                          • Instruction Fuzzy Hash: 65629C31A1E7CA4FEB66DB68C8655A47FF0FF56300F0905FED089CB1A2DA246A46C741
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1264 7ffd9b8b3f39-7ffd9b8b3f45 1265 7ffd9b8b3f47 1264->1265 1266 7ffd9b8b3f49-7ffd9b8b3f88 1264->1266 1265->1266 1267 7ffd9b8b3f89-7ffd9b8b400c VirtualProtect 1265->1267 1266->1267 1272 7ffd9b8b400e 1267->1272 1273 7ffd9b8b4014-7ffd9b8b4045 1267->1273 1272->1273
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 9f98306dadea7fc25b0800d426febe5ab5a3fa0ea640d13d116e554ff733be16
                                                          • Instruction ID: 54b4c412f4e685ed3cbc2608a084de6499ce1fc346dfd2816cfde7932e48c8bb
                                                          • Opcode Fuzzy Hash: 9f98306dadea7fc25b0800d426febe5ab5a3fa0ea640d13d116e554ff733be16
                                                          • Instruction Fuzzy Hash: 1931183190DB5C8FDB1C9BA898556FE7BE1EF95311F00426FE049C3292DA74680587C1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1745229501.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b9e0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ab1c92a0ea4c3acb4e9cfe91082663b9576834e06746721116537ebacb094c5a
                                                          • Instruction ID: 67ba4c1eee446f03854b0b169e19a8b861866741faafcc8ff5b14844b69346ae
                                                          • Opcode Fuzzy Hash: ab1c92a0ea4c3acb4e9cfe91082663b9576834e06746721116537ebacb094c5a
                                                          • Instruction Fuzzy Hash: A2426A32A1E7D95FE766CB7888655A47FE0FF56304F0605FED088CB1A3DA246A46C381
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1745229501.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b9e0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d18cf3228f7e215c48d837c349a76553778f3c0ea69fca6828d89fcad186b787
                                                          • Instruction ID: 8238cb3fadf348ff0685e2046594c638a92adb6c1a26fb285a7b4b60a2100cf6
                                                          • Opcode Fuzzy Hash: d18cf3228f7e215c48d837c349a76553778f3c0ea69fca6828d89fcad186b787
                                                          • Instruction Fuzzy Hash: 7C41761270FB8E1FE79647B818612B47BD1DF86920B0E02FBC449C71E7EE099D468391
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1745229501.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b9e0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: adac41c353f769d1eaa34041dcd7051dc0785545a9228742a4668482c4504bbc
                                                          • Instruction ID: ca35480f49baace703ed06e3912c310da161112276e5b2a02ae475d728e5ccf6
                                                          • Opcode Fuzzy Hash: adac41c353f769d1eaa34041dcd7051dc0785545a9228742a4668482c4504bbc
                                                          • Instruction Fuzzy Hash: E8415931A1EB9D9FDB66DF28C8644E57BF0FF65304B0601BED04AC71A2DA25AA41C781
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1745229501.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b9e0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e652a853bace77dcde0f5e31f598005771cf9212cee933517905ba5f49a1a0c2
                                                          • Instruction ID: f2547b66673605d6f5b59d435bf937d12209f555d0e6ff7e6fb66e434f9ec7d6
                                                          • Opcode Fuzzy Hash: e652a853bace77dcde0f5e31f598005771cf9212cee933517905ba5f49a1a0c2
                                                          • Instruction Fuzzy Hash: D1E0C212B09D090FEBD8A65D3C9817863D3DBD851139811BFD05EC329BDD28DC478300
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1744688635.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd9b8b0000_bhevLCQYD6.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (
                                                          • API String ID: 0-3887548279
                                                          • Opcode ID: 035778ef177095eee8f1c53b8c8d356b19da4f93a5f4a1454c6b37dd742daa16
                                                          • Instruction ID: b065ef732982066c1ce0d3918c7cec57f1f3a1c903b034626b7c7b7e948c93ef
                                                          • Opcode Fuzzy Hash: 035778ef177095eee8f1c53b8c8d356b19da4f93a5f4a1454c6b37dd742daa16
                                                          • Instruction Fuzzy Hash: 51428270B1DA4A8FDBA8DB5884A5A65B7D1FFA8300F11457ED04EC32A6DE34E942C781
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Execution Graph

                                                          Execution Coverage:11.7%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:17
                                                          Total number of Limit Nodes:4
                                                          execution_graph 25854 d90848 25856 d9084e 25854->25856 25855 d9091b 25856->25855 25858 d91380 25856->25858 25859 d91384 25858->25859 25860 d91480 25859->25860 25862 d97eb0 25859->25862 25860->25856 25863 d97eba 25862->25863 25864 d97ed4 25863->25864 25867 62dfa00 25863->25867 25871 62df9f0 25863->25871 25864->25859 25868 62dfa15 25867->25868 25869 62dfc2a 25868->25869 25870 62dfc41 GlobalMemoryStatusEx 25868->25870 25869->25864 25870->25868 25872 62df9ff 25871->25872 25873 62dfc2a 25872->25873 25874 62dfc41 GlobalMemoryStatusEx 25872->25874 25873->25864 25874->25872

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 128 62d3060-62d3081 129 62d3083-62d3086 128->129 130 62d30ac-62d30af 129->130 131 62d3088-62d30a7 129->131 132 62d30b5-62d30d4 130->132 133 62d3850-62d3852 130->133 131->130 141 62d30ed-62d30f7 132->141 142 62d30d6-62d30d9 132->142 134 62d3859-62d385c 133->134 135 62d3854 133->135 134->129 138 62d3862-62d386b 134->138 135->134 145 62d30fd-62d310c 141->145 142->141 143 62d30db-62d30eb 142->143 143->145 254 62d310e call 62d3878 145->254 255 62d310e call 62d3880 145->255 147 62d3113-62d3118 148 62d311a-62d3120 147->148 149 62d3125-62d3402 147->149 148->138 170 62d3408-62d34b7 149->170 171 62d3842-62d384f 149->171 180 62d34b9-62d34de 170->180 181 62d34e0 170->181 183 62d34e9-62d34fc 180->183 181->183 185 62d3829-62d3835 183->185 186 62d3502-62d3524 183->186 185->170 187 62d383b 185->187 186->185 189 62d352a-62d3534 186->189 187->171 189->185 190 62d353a-62d3545 189->190 190->185 191 62d354b-62d3621 190->191 203 62d362f-62d365f 191->203 204 62d3623-62d3625 191->204 208 62d366d-62d3679 203->208 209 62d3661-62d3663 203->209 204->203 210 62d36d9-62d36dd 208->210 211 62d367b-62d367f 208->211 209->208 212 62d381a-62d3823 210->212 213 62d36e3-62d371f 210->213 211->210 214 62d3681-62d36ab 211->214 212->185 212->191 224 62d372d-62d373b 213->224 225 62d3721-62d3723 213->225 221 62d36ad-62d36af 214->221 222 62d36b9-62d36d6 214->222 221->222 222->210 228 62d373d-62d3748 224->228 229 62d3752-62d375d 224->229 225->224 228->229 232 62d374a 228->232 233 62d375f-62d3765 229->233 234 62d3775-62d3786 229->234 232->229 235 62d3769-62d376b 233->235 236 62d3767 233->236 238 62d379e-62d37aa 234->238 239 62d3788-62d378e 234->239 235->234 236->234 243 62d37ac-62d37b2 238->243 244 62d37c2-62d3813 238->244 240 62d3790 239->240 241 62d3792-62d3794 239->241 240->238 241->238 245 62d37b4 243->245 246 62d37b6-62d37b8 243->246 244->212 245->244 246->244 254->147 255->147
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                          • API String ID: 0-2392861976
                                                          • Opcode ID: be3c6566c8cc6c8ff3de1e617b88149ff7376360902127603ad9cda16f6db9a9
                                                          • Instruction ID: a636e93bf8e987b11ee9508ba49bb67c662c576c06cdf9bda90d91f1a14cbd27
                                                          • Opcode Fuzzy Hash: be3c6566c8cc6c8ff3de1e617b88149ff7376360902127603ad9cda16f6db9a9
                                                          • Instruction Fuzzy Hash: 19321E31E1061ACFDB54EF75D89459DB7B2FF89300F10C6A9D409AB264EB30AD85CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 797 62d7d48-62d7d66 798 62d7d68-62d7d6b 797->798 799 62d7d6d-62d7d7b 798->799 800 62d7d82-62d7d85 798->800 806 62d7d7d 799->806 807 62d7dee-62d7e04 799->807 801 62d7da8-62d7dab 800->801 802 62d7d87-62d7da3 800->802 803 62d7dad-62d7db7 801->803 804 62d7db8-62d7dbb 801->804 802->801 809 62d7dbd-62d7dd7 804->809 810 62d7ddc-62d7dde 804->810 806->800 816 62d801f-62d8022 807->816 817 62d7e0a-62d7e13 807->817 809->810 811 62d7de5-62d7de8 810->811 812 62d7de0 810->812 811->798 811->807 812->811 821 62d8024-62d8029 816->821 819 62d7e19-62d7e36 817->819 820 62d802a-62d8034 817->820 831 62d800c-62d8019 819->831 832 62d7e3c-62d7e64 819->832 824 62d8085-62d8096 820->824 825 62d8036-62d805f 820->825 835 62d807b-62d807f 824->835 836 62d8097 824->836 826 62d8061-62d8064 825->826 828 62d8299-62d829c 826->828 829 62d806a-62d8079 826->829 833 62d82bf-62d82c2 828->833 834 62d829e-62d82ba 828->834 829->835 841 62d8098-62d80dc 829->841 831->816 831->817 832->831 851 62d7e6a-62d7e73 832->851 839 62d836d-62d836f 833->839 840 62d82c8-62d82d4 833->840 834->833 835->824 836->821 836->841 842 62d8376-62d8379 839->842 843 62d8371 839->843 847 62d82df-62d82e1 840->847 849 62d826d-62d8283 841->849 850 62d80e2-62d80f3 841->850 842->826 846 62d837f-62d8388 842->846 843->842 853 62d82f9-62d82fd 847->853 854 62d82e3-62d82e9 847->854 849->828 865 62d80f9-62d8116 850->865 866 62d8258-62d8267 850->866 851->820 858 62d7e79-62d7e95 851->858 855 62d82ff-62d8309 853->855 856 62d830b 853->856 859 62d82ed-62d82ef 854->859 860 62d82eb 854->860 861 62d8310-62d8312 855->861 856->861 869 62d7e9b-62d7ec5 858->869 870 62d7ffa-62d8006 858->870 859->853 860->853 863 62d8314-62d8317 861->863 864 62d8323-62d835c 861->864 863->846 864->829 885 62d8362-62d836c 864->885 865->866 877 62d811c-62d8212 call 62d6568 865->877 866->849 866->850 883 62d7ecb-62d7ef3 869->883 884 62d7ff0-62d7ff5 869->884 870->831 870->851 933 62d8214-62d821e 877->933 934 62d8220 877->934 883->884 892 62d7ef9-62d7f27 883->892 884->870 892->884 897 62d7f2d-62d7f36 892->897 897->884 899 62d7f3c-62d7f6e 897->899 906 62d7f79-62d7f95 899->906 907 62d7f70-62d7f74 899->907 906->870 909 62d7f97-62d7fee call 62d6568 906->909 907->884 908 62d7f76 907->908 908->906 909->870 935 62d8225-62d8227 933->935 934->935 935->866 936 62d8229-62d822e 935->936 937 62d823c 936->937 938 62d8230-62d823a 936->938 939 62d8241-62d8243 937->939 938->939 939->866 940 62d8245-62d8251 939->940 940->866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q
                                                          • API String ID: 0-355816377
                                                          • Opcode ID: db4d23e888954ea023fd2a891b0c66f260a285decb5dc7b58c69facd4eefc758
                                                          • Instruction ID: 6a6c049e3c960afd8a1f44ffd3981856e3f1efa79829f49122690dcc95b8de16
                                                          • Opcode Fuzzy Hash: db4d23e888954ea023fd2a891b0c66f260a285decb5dc7b58c69facd4eefc758
                                                          • Instruction Fuzzy Hash: 5A02CE31B102168FDB54EF68D4946AEB7E2FF84304F248529D80ADB795DB35EC82CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 254cec6d5cddd0de8dae992a43a6ecedf656408a29e3d1917cbf3ef5acadf5d1
                                                          • Instruction ID: 91ebf23c5c601deca6bcb9c4b49c5e77878154e7646dea9f1a1233f53e628355
                                                          • Opcode Fuzzy Hash: 254cec6d5cddd0de8dae992a43a6ecedf656408a29e3d1917cbf3ef5acadf5d1
                                                          • Instruction Fuzzy Hash: 3123FC31D2071A8ECB11EF68C89469DF7B1FF99300F15C69AE459A7221EB70AAC5CB41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9f2331318cd7b45114d2b53ed8d6c2e1caff6ef4164b88e60c134f0b91ec403b
                                                          • Instruction ID: e85fe5ec4206ed4c5c935a0254d661b1f84a542eb1fe467eee0a1eaadff7bd62
                                                          • Opcode Fuzzy Hash: 9f2331318cd7b45114d2b53ed8d6c2e1caff6ef4164b88e60c134f0b91ec403b
                                                          • Instruction Fuzzy Hash: 08928534A11205CFCBA4DB68C184A5DBBF2FB45314F54C8A9E90AAB361DB35ED81CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 327161123041d0e980cd939f0f8058c2b268bdbdbaa445d4c0861726937f647c
                                                          • Instruction ID: 23702bfaa628172a98cad8cc98954afedccc26d1a1be6e1a389a7242c4b98fe2
                                                          • Opcode Fuzzy Hash: 327161123041d0e980cd939f0f8058c2b268bdbdbaa445d4c0861726937f647c
                                                          • Instruction Fuzzy Hash: 6F62BE34B202058FDB54DB68D584BADB7F2EF88314F148469E806EB395DB35ED82CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a188ea959e725088250bb70a623811b7d65f44927225b16ed63f53ff4d0b1e7a
                                                          • Instruction ID: bb38db7b151491203dbb00114fcd5dc916531a41709b89d485a9b6a51a1a78ab
                                                          • Opcode Fuzzy Hash: a188ea959e725088250bb70a623811b7d65f44927225b16ed63f53ff4d0b1e7a
                                                          • Instruction Fuzzy Hash: CF32A234B142069FDF54EB68D580BAEB7B6FB89314F108525E805EB394DB35EC42CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7ebc2ae81d2d89bc8ae61769c5977cb937050e53d3418c132760571ce23d74c6
                                                          • Instruction ID: 36367f690420d90718c99010d0ab372d936db784e8142ace4e2dba9335b38679
                                                          • Opcode Fuzzy Hash: 7ebc2ae81d2d89bc8ae61769c5977cb937050e53d3418c132760571ce23d74c6
                                                          • Instruction Fuzzy Hash: 3412E231F202169FEF64DF64D88066EB7A2EF84314F208429D85AEB384DB74DC42CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b36889080ec710446293dba1e2a429a5983ef660ebeff5a0f3dfe9851b52eeb2
                                                          • Instruction ID: d035d514e24072a1ea24b55e5fd12d2a47bf7b80bec892dee02f5c9b724afc70
                                                          • Opcode Fuzzy Hash: b36889080ec710446293dba1e2a429a5983ef660ebeff5a0f3dfe9851b52eeb2
                                                          • Instruction Fuzzy Hash: 1C229574E2010A8FEF64DF68D5A07AEB7B2EB45311F218825E845EB395CB35DC81CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 62daca0-62dacbe 1 62dacc0-62dacc3 0->1 2 62daccd-62dacd0 1->2 3 62dacc5-62dacca 1->3 4 62dace1-62dace4 2->4 5 62dacd2-62dacd6 2->5 3->2 8 62daebd-62daec6 4->8 9 62dacea-62daced 4->9 6 62daecc-62daed6 5->6 7 62dacdc 5->7 7->4 8->6 10 62dacef-62dacf8 8->10 9->10 11 62dad07-62dad0a 9->11 12 62dacfe-62dad02 10->12 13 62daed7-62daee1 10->13 14 62dad0c-62dad1f 11->14 15 62dad24-62dad27 11->15 12->11 23 62daf08-62daf0e 13->23 24 62daee3-62daee9 13->24 14->15 16 62dad29-62dad36 15->16 17 62dad3b-62dad3e 15->17 16->17 18 62dad61-62dad64 17->18 19 62dad40-62dad5c 17->19 25 62dad74-62dad76 18->25 26 62dad66-62dad6f 18->26 19->18 29 62daf10-62daf13 23->29 28 62daeeb-62daf07 24->28 24->29 30 62dad7d-62dad80 25->30 31 62dad78 25->31 26->25 28->23 32 62daf15 call 62db1fa 29->32 33 62daf22-62daf25 29->33 30->1 34 62dad86-62dadaa 30->34 31->30 38 62daf1b-62daf1d 32->38 35 62daf48-62daf4b 33->35 36 62daf27-62daf43 33->36 51 62daeba 34->51 52 62dadb0-62dadbf 34->52 40 62daf4d-62daf51 35->40 41 62daf58-62daf5b 35->41 36->35 38->33 43 62daf71-62dafac 40->43 44 62daf53 40->44 45 62daf5d-62daf67 41->45 46 62daf68-62daf6b 41->46 55 62db19f-62db1b2 43->55 56 62dafb2-62dafbe 43->56 44->41 46->43 48 62db1d4-62db1d6 46->48 49 62db1dd-62db1e0 48->49 50 62db1d8 48->50 49->29 57 62db1e6-62db1f0 49->57 50->49 51->8 60 62dadd7-62dae12 call 62d6568 52->60 61 62dadc1-62dadc7 52->61 58 62db1b4 55->58 66 62dafde-62db022 56->66 67 62dafc0-62dafd9 56->67 63 62db1b5 58->63 78 62dae2a-62dae41 60->78 79 62dae14-62dae1a 60->79 64 62dadc9 61->64 65 62dadcb-62dadcd 61->65 63->63 64->60 65->60 83 62db03e-62db07d 66->83 84 62db024-62db036 66->84 67->58 93 62dae59-62dae6a 78->93 94 62dae43-62dae49 78->94 81 62dae1c 79->81 82 62dae1e-62dae20 79->82 81->78 82->78 88 62db164-62db179 83->88 89 62db083-62db15e call 62d6568 83->89 84->83 88->55 89->88 100 62dae6c-62dae72 93->100 101 62dae82-62daeb3 93->101 95 62dae4d-62dae4f 94->95 96 62dae4b 94->96 95->93 96->93 103 62dae74 100->103 104 62dae76-62dae78 100->104 101->51 103->101 104->101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                          • API String ID: 0-3823777903
                                                          • Opcode ID: 1f7c35ff444b2930bbd53c91d36ee1a96a38c2a3a1afa016a2ea1b5bc95f7cf7
                                                          • Instruction ID: bd899e4483b180f5c85dd2bb714728365cdbe53dfa0e8c67309c81235f9c21cf
                                                          • Opcode Fuzzy Hash: 1f7c35ff444b2930bbd53c91d36ee1a96a38c2a3a1afa016a2ea1b5bc95f7cf7
                                                          • Instruction Fuzzy Hash: 6EE17030F2020A8FDF55DF68D494AAEB7B2EF85304F118929D809EB394DB75D846CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 256 62db618-62db63a 257 62db63c-62db63f 256->257 258 62db64f-62db652 257->258 259 62db641-62db64a 257->259 260 62db675-62db678 258->260 261 62db654-62db658 258->261 259->258 264 62db69b-62db69e 260->264 265 62db67a-62db67e 260->265 262 62db65e-62db66e 261->262 263 62db9b5-62db9ee 261->263 275 62db6e9-62db6ea 262->275 276 62db670 262->276 280 62db9f0-62db9f3 263->280 266 62db6b1-62db6b4 264->266 267 62db6a0-62db6a6 264->267 265->263 268 62db684-62db694 265->268 271 62db6d7-62db6da 266->271 272 62db6b6-62db6d2 266->272 269 62db74d-62db753 267->269 270 62db6ac 267->270 268->261 284 62db696 268->284 269->263 279 62db759-62db760 269->279 270->266 277 62db6dc-62db6e1 271->277 278 62db6e4-62db6e7 271->278 272->271 286 62db6ef-62db6f2 275->286 276->260 277->278 278->275 278->286 287 62db765-62db768 279->287 282 62db9f5-62dba11 280->282 283 62dba16-62dba19 280->283 282->283 288 62dba1f-62dba47 283->288 289 62dbc85-62dbc87 283->289 284->264 290 62db704-62db707 286->290 291 62db6f4-62db6ff 286->291 292 62db77c-62db77f 287->292 293 62db76a-62db76e 287->293 336 62dba49-62dba4c 288->336 337 62dba51-62dba95 288->337 299 62dbc8e-62dbc91 289->299 300 62dbc89 289->300 297 62db71e-62db721 290->297 298 62db709-62db70d 290->298 291->290 292->275 296 62db785-62db788 292->296 293->263 294 62db774-62db777 293->294 294->292 296->275 303 62db78e-62db791 296->303 305 62db748-62db74b 297->305 306 62db723-62db727 297->306 298->263 304 62db713-62db719 298->304 299->280 307 62dbc97-62dbca0 299->307 300->299 310 62db803-62db80c 303->310 311 62db793-62db796 303->311 304->297 305->269 305->287 306->263 312 62db72d-62db73d 306->312 313 62db80e 310->313 314 62db7d3-62db7dc 310->314 315 62db7a8-62db7ab 311->315 316 62db798 311->316 312->265 327 62db743 312->327 318 62db813-62db816 313->318 314->263 322 62db7e2-62db7e9 314->322 319 62db7ad-62db7af 315->319 320 62db7b2-62db7b5 315->320 326 62db7a0-62db7a3 316->326 324 62db838-62db83b 318->324 325 62db818-62db833 318->325 319->320 328 62db7c5-62db7c8 320->328 329 62db7b7-62db7c0 320->329 323 62db7ee-62db7f1 322->323 331 62db7fe-62db801 323->331 332 62db7f3-62db7f9 323->332 333 62db83d-62db840 324->333 334 62db845-62db848 324->334 325->324 326->315 327->305 328->275 335 62db7ce-62db7d1 328->335 329->328 331->310 331->318 332->331 333->334 339 62db85f-62db862 334->339 340 62db84a-62db84e 334->340 335->314 335->323 336->307 356 62dba9b-62dbaa4 337->356 357 62dbc7a-62dbc84 337->357 342 62db864-62db86d 339->342 343 62db872-62db875 339->343 340->263 344 62db854-62db85a 340->344 342->343 345 62db877-62db87d 343->345 346 62db882-62db885 343->346 344->339 345->346 349 62db8e9-62db8ec 346->349 350 62db887-62db8e4 call 62d6568 346->350 351 62db8ee-62db903 349->351 352 62db92a-62db92d 349->352 350->349 351->263 364 62db909-62db925 351->364 352->267 355 62db933-62db936 352->355 360 62db938-62db941 355->360 361 62db946-62db949 355->361 362 62dbaaa-62dbb16 call 62d6568 356->362 363 62dbc70-62dbc75 356->363 360->361 366 62db94b-62db94f 361->366 367 62db95a-62db95d 361->367 390 62dbb1c-62dbb21 362->390 391 62dbc10-62dbc25 362->391 363->357 364->352 366->259 368 62db955 366->368 369 62db95f-62db974 367->369 370 62db998-62db99a 367->370 368->367 369->263 379 62db976-62db993 369->379 373 62db99c 370->373 374 62db9a1-62db9a4 370->374 373->374 374->257 378 62db9aa-62db9b4 374->378 379->370 392 62dbb3d 390->392 393 62dbb23-62dbb29 390->393 391->363 397 62dbb3f-62dbb45 392->397 395 62dbb2f-62dbb31 393->395 396 62dbb2b-62dbb2d 393->396 398 62dbb3b 395->398 396->398 399 62dbb5a-62dbb67 397->399 400 62dbb47-62dbb4d 397->400 398->397 407 62dbb7f-62dbb8c 399->407 408 62dbb69-62dbb6f 399->408 401 62dbbfb-62dbc0a 400->401 402 62dbb53 400->402 401->390 401->391 402->399 403 62dbb8e-62dbb9b 402->403 404 62dbbc2-62dbbcf 402->404 416 62dbb9d-62dbba3 403->416 417 62dbbb3-62dbbc0 403->417 413 62dbbe7-62dbbf4 404->413 414 62dbbd1-62dbbd7 404->414 407->401 411 62dbb71 408->411 412 62dbb73-62dbb75 408->412 411->407 412->407 413->401 418 62dbbd9 414->418 419 62dbbdb-62dbbdd 414->419 420 62dbba5 416->420 421 62dbba7-62dbba9 416->421 417->401 418->413 419->413 420->417 421->417
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                          • API String ID: 0-2392861976
                                                          • Opcode ID: 45d77c377a4e5cbb080ff7336230dfb7420e2d4fee1736e98706f04e4a99995e
                                                          • Instruction ID: 7f66ab62eff879d1a8ce482e3529a0257ac83bda14b42d23f184c58ea20dc5c8
                                                          • Opcode Fuzzy Hash: 45d77c377a4e5cbb080ff7336230dfb7420e2d4fee1736e98706f04e4a99995e
                                                          • Instruction Fuzzy Hash: B402A170E2020A8FDFA4DF68D4A06ADB7B1FB45311F12892AD845DB395DB34DC85CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 424 62d9120-62d9145 425 62d9147-62d914a 424->425 426 62d9a08-62d9a0b 425->426 427 62d9150-62d9165 425->427 428 62d9a0d-62d9a2c 426->428 429 62d9a31-62d9a33 426->429 435 62d917d-62d9193 427->435 436 62d9167-62d916d 427->436 428->429 431 62d9a3a-62d9a3d 429->431 432 62d9a35 429->432 431->425 433 62d9a43-62d9a4d 431->433 432->431 441 62d919e-62d91a0 435->441 437 62d916f 436->437 438 62d9171-62d9173 436->438 437->435 438->435 442 62d91b8-62d9229 441->442 443 62d91a2-62d91a8 441->443 454 62d922b-62d924e 442->454 455 62d9255-62d9271 442->455 444 62d91ac-62d91ae 443->444 445 62d91aa 443->445 444->442 445->442 454->455 460 62d929d-62d92b8 455->460 461 62d9273-62d9296 455->461 466 62d92ba-62d92dc 460->466 467 62d92e3-62d92fe 460->467 461->460 466->467 472 62d9300-62d931c 467->472 473 62d9323-62d9331 467->473 472->473 474 62d9341-62d93bb 473->474 475 62d9333-62d933c 473->475 481 62d93bd-62d93db 474->481 482 62d9408-62d941d 474->482 475->433 486 62d93dd-62d93ec 481->486 487 62d93f7-62d9406 481->487 482->426 486->487 487->481 487->482
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q
                                                          • API String ID: 0-2125118731
                                                          • Opcode ID: f4fcbc187ac6a5d933c9ec0727336dcffb8490a0fdb11d4c73428ebab56739c8
                                                          • Instruction ID: abe7d31f57647d2c88b6f6e25a2913d049bead125db7b07fa4eb5f3cb2abef1e
                                                          • Opcode Fuzzy Hash: f4fcbc187ac6a5d933c9ec0727336dcffb8490a0fdb11d4c73428ebab56739c8
                                                          • Instruction Fuzzy Hash: 08915231F1021A9FDB54EF65D9507AFB3F6ABC5204F108569D809EB384EB70DC868B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 490 62dcf08-62dcf23 491 62dcf25-62dcf28 490->491 492 62dcf2a-62dcf40 491->492 493 62dcf45-62dcf48 491->493 492->493 494 62dcf4e-62dcf51 493->494 495 62dd3f4-62dd400 493->495 496 62dcf9a-62dcf9d 494->496 497 62dcf53-62dcf62 494->497 499 62dd249-62dd258 495->499 500 62dd406-62dd6f3 495->500 505 62dcf9f-62dcfbb 496->505 506 62dcfc0-62dcfc3 496->506 501 62dcf64-62dcf69 497->501 502 62dcf71-62dcf7d 497->502 503 62dd25a-62dd25f 499->503 504 62dd267-62dd273 499->504 703 62dd6f9-62dd6ff 500->703 704 62dd91a-62dd924 500->704 501->502 507 62dd925-62dd95e 502->507 508 62dcf83-62dcf95 502->508 503->504 504->507 509 62dd279-62dd28b 504->509 505->506 512 62dd00c-62dd00f 506->512 513 62dcfc5-62dd007 506->513 532 62dd960-62dd963 507->532 508->496 530 62dd290-62dd293 509->530 515 62dd01e-62dd021 512->515 516 62dd011-62dd013 512->516 513->512 522 62dd06a-62dd06d 515->522 523 62dd023-62dd065 515->523 520 62dd2af-62dd2b8 516->520 521 62dd019 516->521 526 62dd2ba-62dd2bf 520->526 527 62dd2c7-62dd2d3 520->527 521->515 528 62dd06f-62dd0b1 522->528 529 62dd0b6-62dd0b9 522->529 523->522 526->527 537 62dd2d9-62dd2ed 527->537 538 62dd3e4-62dd3e9 527->538 528->529 539 62dd0bb-62dd0fd 529->539 540 62dd102-62dd105 529->540 541 62dd29d-62dd29f 530->541 542 62dd295-62dd29a 530->542 533 62dd965-62dd991 532->533 534 62dd996-62dd999 532->534 533->534 547 62dd9bc-62dd9bf 534->547 548 62dd99b-62dd9b7 534->548 553 62dd3f1 537->553 563 62dd2f3-62dd305 537->563 538->553 539->540 544 62dd114-62dd117 540->544 545 62dd107-62dd109 540->545 549 62dd2a6-62dd2a9 541->549 550 62dd2a1 541->550 542->541 554 62dd119-62dd15b 544->554 555 62dd160-62dd163 544->555 552 62dd10f 545->552 545->553 561 62dd9ce-62dd9d0 547->561 562 62dd9c1 call 62dda7d 547->562 548->547 549->491 549->520 550->549 552->544 553->495 554->555 565 62dd1ac-62dd1af 555->565 566 62dd165-62dd1a7 555->566 568 62dd9d7-62dd9da 561->568 569 62dd9d2 561->569 575 62dd9c7-62dd9c9 562->575 588 62dd329-62dd32b 563->588 589 62dd307-62dd30d 563->589 576 62dd1f8-62dd1fb 565->576 577 62dd1b1-62dd1f3 565->577 566->565 568->532 578 62dd9dc-62dd9eb 568->578 569->568 575->561 579 62dd1fd-62dd23f 576->579 580 62dd244-62dd247 576->580 577->576 594 62dd9ed-62dda50 call 62d6568 578->594 595 62dda52-62dda67 578->595 579->580 580->499 580->530 600 62dd335-62dd341 588->600 597 62dd30f 589->597 598 62dd311-62dd31d 589->598 594->595 621 62dda68 595->621 605 62dd31f-62dd327 597->605 598->605 619 62dd34f 600->619 620 62dd343-62dd34d 600->620 605->600 626 62dd354-62dd356 619->626 620->626 621->621 626->553 630 62dd35c-62dd378 call 62d6568 626->630 644 62dd37a-62dd37f 630->644 645 62dd387-62dd393 630->645 644->645 645->538 647 62dd395-62dd3e2 645->647 647->553 705 62dd70e-62dd717 703->705 706 62dd701-62dd706 703->706 705->507 707 62dd71d-62dd730 705->707 706->705 709 62dd90a-62dd914 707->709 710 62dd736-62dd73c 707->710 709->703 709->704 711 62dd73e-62dd743 710->711 712 62dd74b-62dd754 710->712 711->712 712->507 713 62dd75a-62dd77b 712->713 716 62dd77d-62dd782 713->716 717 62dd78a-62dd793 713->717 716->717 717->507 718 62dd799-62dd7b6 717->718 718->709 721 62dd7bc-62dd7c2 718->721 721->507 722 62dd7c8-62dd7e1 721->722 724 62dd8fd-62dd904 722->724 725 62dd7e7-62dd80e 722->725 724->709 724->721 725->507 728 62dd814-62dd81e 725->728 728->507 729 62dd824-62dd83b 728->729 731 62dd83d-62dd848 729->731 732 62dd84a-62dd865 729->732 731->732 732->724 737 62dd86b-62dd884 call 62d6568 732->737 741 62dd886-62dd88b 737->741 742 62dd893-62dd89c 737->742 741->742 742->507 743 62dd8a2-62dd8f6 742->743 743->724
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q
                                                          • API String ID: 0-831282457
                                                          • Opcode ID: 6dd6773b2c4e0f1370194031a3893e175b577bc5b85db1ba5f7d3cfb4194a7d4
                                                          • Instruction ID: 3eb1249f9a2cf471037e0ad48906a2fc5188669bea909fcb60b46ed707cfe2a1
                                                          • Opcode Fuzzy Hash: 6dd6773b2c4e0f1370194031a3893e175b577bc5b85db1ba5f7d3cfb4194a7d4
                                                          • Instruction Fuzzy Hash: 5C625030A106168FCB55EF68D590A5EB7F2FF84304F208969D4099F359DB71ED8ACB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 751 62d4b68-62d4b8c 752 62d4b8e-62d4b91 751->752 753 62d4b93-62d4bad 752->753 754 62d4bb2-62d4bb5 752->754 753->754 755 62d4bbb-62d4cb3 754->755 756 62d5294-62d5296 754->756 774 62d4cb9-62d4d06 call 62d5411 755->774 775 62d4d36-62d4d3d 755->775 758 62d529d-62d52a0 756->758 759 62d5298 756->759 758->752 760 62d52a6-62d52b3 758->760 759->758 788 62d4d0c-62d4d28 774->788 776 62d4dc1-62d4dca 775->776 777 62d4d43-62d4db3 775->777 776->760 794 62d4dbe 777->794 795 62d4db5 777->795 791 62d4d2a 788->791 792 62d4d33 788->792 791->792 792->775 794->776 795->794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: fcq$XPcq$\Ocq
                                                          • API String ID: 0-3575482020
                                                          • Opcode ID: 2d9432a8f3c06182e404ae4e6bf2196dbe1f58cb890e30ab814a9b205c82df9b
                                                          • Instruction ID: f4e574534cf76e2e8a2fdfc3f7ff170de36dc753115c926a2029f80feb7d9919
                                                          • Opcode Fuzzy Hash: 2d9432a8f3c06182e404ae4e6bf2196dbe1f58cb890e30ab814a9b205c82df9b
                                                          • Instruction Fuzzy Hash: AA618030E102199FEB54AFA9D8547AEBBF2FF88300F208429D506EB395DB754D458BA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1721 62d9110-62d9145 1723 62d9147-62d914a 1721->1723 1724 62d9a08-62d9a0b 1723->1724 1725 62d9150-62d9165 1723->1725 1726 62d9a0d-62d9a2c 1724->1726 1727 62d9a31-62d9a33 1724->1727 1733 62d917d-62d9193 1725->1733 1734 62d9167-62d916d 1725->1734 1726->1727 1729 62d9a3a-62d9a3d 1727->1729 1730 62d9a35 1727->1730 1729->1723 1731 62d9a43-62d9a4d 1729->1731 1730->1729 1739 62d919e-62d91a0 1733->1739 1735 62d916f 1734->1735 1736 62d9171-62d9173 1734->1736 1735->1733 1736->1733 1740 62d91b8-62d9229 1739->1740 1741 62d91a2-62d91a8 1739->1741 1752 62d922b-62d924e 1740->1752 1753 62d9255-62d9271 1740->1753 1742 62d91ac-62d91ae 1741->1742 1743 62d91aa 1741->1743 1742->1740 1743->1740 1752->1753 1758 62d929d-62d92b8 1753->1758 1759 62d9273-62d9296 1753->1759 1764 62d92ba-62d92dc 1758->1764 1765 62d92e3-62d92fe 1758->1765 1759->1758 1764->1765 1770 62d9300-62d931c 1765->1770 1771 62d9323-62d9331 1765->1771 1770->1771 1772 62d9341-62d93bb 1771->1772 1773 62d9333-62d933c 1771->1773 1779 62d93bd-62d93db 1772->1779 1780 62d9408-62d941d 1772->1780 1773->1731 1784 62d93dd-62d93ec 1779->1784 1785 62d93f7-62d9406 1779->1785 1780->1724 1784->1785 1785->1779 1785->1780
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q
                                                          • API String ID: 0-355816377
                                                          • Opcode ID: 64946b9dd51f5bbc8ece4f14397be0d3b03f4d6976282d65dd78bbcf230624fa
                                                          • Instruction ID: f4440ddf92341ca9403e0ec69d3db41732269a92f8a07cb692803073a9fdfc7e
                                                          • Opcode Fuzzy Hash: 64946b9dd51f5bbc8ece4f14397be0d3b03f4d6976282d65dd78bbcf230624fa
                                                          • Instruction Fuzzy Hash: 1D516F31F141069FDB54EB64D951BAF73FAAB88644F108469D809DB788EB30DC82CB95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1825 62d4b58-62d4b8c 1827 62d4b8e-62d4b91 1825->1827 1828 62d4b93-62d4bad 1827->1828 1829 62d4bb2-62d4bb5 1827->1829 1828->1829 1830 62d4bbb-62d4cb3 1829->1830 1831 62d5294-62d5296 1829->1831 1849 62d4cb9-62d4d06 call 62d5411 1830->1849 1850 62d4d36-62d4d3d 1830->1850 1833 62d529d-62d52a0 1831->1833 1834 62d5298 1831->1834 1833->1827 1835 62d52a6-62d52b3 1833->1835 1834->1833 1863 62d4d0c-62d4d28 1849->1863 1851 62d4dc1-62d4dca 1850->1851 1852 62d4d43-62d4db3 1850->1852 1851->1835 1869 62d4dbe 1852->1869 1870 62d4db5 1852->1870 1866 62d4d2a 1863->1866 1867 62d4d33 1863->1867 1866->1867 1867->1850 1869->1851 1870->1869
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: fcq$XPcq
                                                          • API String ID: 0-936005338
                                                          • Opcode ID: c92287d63cc11a27973bcea9df4e03fdad885e04dce91b3461065f755fc659f6
                                                          • Instruction ID: 7f05ceeb4ab3be3ae9b35422b1cdb81a5327f8a8d5d0c205d05979bd6f66fcec
                                                          • Opcode Fuzzy Hash: c92287d63cc11a27973bcea9df4e03fdad885e04dce91b3461065f755fc659f6
                                                          • Instruction Fuzzy Hash: E1518230F102189FDB549FA9C85479EBAF6FF88700F208429E546AB395DA758D018BA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2270 d9eb60-d9eb7b 2271 d9eb7d-d9eba4 2270->2271 2272 d9eba5-d9ebc4 call d9e2d8 2270->2272 2277 d9ebca-d9ec29 2272->2277 2278 d9ebc6-d9ebc9 2272->2278 2285 d9ec2b-d9ec2e 2277->2285 2286 d9ec2f-d9ecbc GlobalMemoryStatusEx 2277->2286 2290 d9ecbe-d9ecc4 2286->2290 2291 d9ecc5-d9eced 2286->2291 2290->2291
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4053113231.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d90000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2db39baa0cb3b66aae3cbff79a9596cde7bee7e915c710914c7e1abbf2630938
                                                          • Instruction ID: 723f79f3237b47322890953ffdf311649f77dec9288bd7580b8c0b74bed87b20
                                                          • Opcode Fuzzy Hash: 2db39baa0cb3b66aae3cbff79a9596cde7bee7e915c710914c7e1abbf2630938
                                                          • Instruction Fuzzy Hash: 6B414472D103599FCB14DF69D8042DEBBF5EF89310F14856AD805A7391DB349885CBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GlobalMemoryStatusEx.KERNELBASE ref: 00D9ECAF
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4053113231.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d90000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemoryStatus
                                                          • String ID:
                                                          • API String ID: 1890195054-0
                                                          • Opcode ID: 098f211d51c5e0c69c3617a98fe582b776feab12cae81ef1ad3769d81e30ccc6
                                                          • Instruction ID: 02c4651487fde7d7ed9c5442502345e40a4405ddb8d700f4e3269cea0ea71f87
                                                          • Opcode Fuzzy Hash: 098f211d51c5e0c69c3617a98fe582b776feab12cae81ef1ad3769d81e30ccc6
                                                          • Instruction Fuzzy Hash: 1711EFB1C006699BCB10DF9AC544BEEFBF4AB48320F14856AD858A7290D778A944CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PH^q
                                                          • API String ID: 0-2549759414
                                                          • Opcode ID: 40673bf35f4aaf2a3182388c1a5b597364291f8ae6895432386fe07fff0b26f8
                                                          • Instruction ID: b6174cef2e9eabfd8c192a79ef039252d8d2d945d464d87c4cdbcffcfe3d7688
                                                          • Opcode Fuzzy Hash: 40673bf35f4aaf2a3182388c1a5b597364291f8ae6895432386fe07fff0b26f8
                                                          • Instruction Fuzzy Hash: 8E41B130E147469FDB519F78D8446AEBBB2FF85304F244929E805EB380EB70D946CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PH^q
                                                          • API String ID: 0-2549759414
                                                          • Opcode ID: b7d8ffe7c63eaa38a9dc41cf09b8f86faaa4f34e4562453cebbd7dee1ac1ea31
                                                          • Instruction ID: 1a83ca09d42d0ba2e88330239b3828a1af98b0853e360fbce15651fa38740f5d
                                                          • Opcode Fuzzy Hash: b7d8ffe7c63eaa38a9dc41cf09b8f86faaa4f34e4562453cebbd7dee1ac1ea31
                                                          • Instruction Fuzzy Hash: 5C31D230B20206CFDB49AB78D51866F7BE2AB89704F104428D906DB394DF75DE46CBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q
                                                          • API String ID: 0-388095546
                                                          • Opcode ID: 090b978819813ce5f31ffdcb808cfb4caf69ba1ade30328f076da6421527a41e
                                                          • Instruction ID: bf61fcfc3f27fd51e8d439878eec460dd1a68b6a3c99c59754d5ef5f0184622b
                                                          • Opcode Fuzzy Hash: 090b978819813ce5f31ffdcb808cfb4caf69ba1ade30328f076da6421527a41e
                                                          • Instruction Fuzzy Hash: D0F0FF32B241028FDFE8AA89E9812B873A5EB40304F104426CC09CF684C739E905C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e0c4e8d617ce41d31c4f293e6042c6ec7642fc4ca4538c8f66f7cfdd46a26e5c
                                                          • Instruction ID: 1b9d93d58638705836750b76eb83cb835c5a1dc816e02153d2f6ae37f579efec
                                                          • Opcode Fuzzy Hash: e0c4e8d617ce41d31c4f293e6042c6ec7642fc4ca4538c8f66f7cfdd46a26e5c
                                                          • Instruction Fuzzy Hash: 9361D071F100224FCF50AA7EC88866FAAD7AFD4624F25443AD80EDB364DE65DD0287D2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2f2d06d0d62f7d349741da834d4ff70f4e1e0fb6e9cec0b2c72c53aaa5e73745
                                                          • Instruction ID: 9b2c017426694410f65b466c14cfd32721554a59a20aafe3e79de4201c8723b4
                                                          • Opcode Fuzzy Hash: 2f2d06d0d62f7d349741da834d4ff70f4e1e0fb6e9cec0b2c72c53aaa5e73745
                                                          • Instruction Fuzzy Hash: 2A813034B1020A9FDF54EFA9D55479EB7F6AF89304F108429D80ADB394DB74EC828B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 242a198013acda551d483ccff45085ae6eda1dfa8fa4dcfb05a96b152e495ee2
                                                          • Instruction ID: b5de06c0d6a0380aa86dedb4e800d12f7d8b82d5881f3b655277a85cdae23c60
                                                          • Opcode Fuzzy Hash: 242a198013acda551d483ccff45085ae6eda1dfa8fa4dcfb05a96b152e495ee2
                                                          • Instruction Fuzzy Hash: 88914030E1021A8FDF60DF68C890B9DB7B1FF89304F208595D549EB295DB70AA85CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5fd9f1d788b3e83f121ae43c83858b439e7538e02d877d6aa58a8df6323078c0
                                                          • Instruction ID: d5b21547b4b289e4392ae408ac7e36017092af02924356175098470877a0084b
                                                          • Opcode Fuzzy Hash: 5fd9f1d788b3e83f121ae43c83858b439e7538e02d877d6aa58a8df6323078c0
                                                          • Instruction Fuzzy Hash: 7F912E30E1061A8BDF60DF68C880B9DB7B1FF89304F208695D549AB295DB70AA85CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ca9b80c1bf76377200c3017b1f502144877439e66259ebae5a9861c7ae1eff94
                                                          • Instruction ID: 829c154629df802738f83c53e2002d0e87995759e1ede4b6e82a61f7325f0ef1
                                                          • Opcode Fuzzy Hash: ca9b80c1bf76377200c3017b1f502144877439e66259ebae5a9861c7ae1eff94
                                                          • Instruction Fuzzy Hash: 1F713D30A102099FDB54DFA9D980A9DBBF6FF84304F258529E449EB355DB30ED46CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0424353c2318366de6868919a943b0b458b0eddce2ebca15f337c73ed91d6448
                                                          • Instruction ID: 0464bbeb7c8ddcca1c06456a775859ab605e0199a4d097e2892ff92da169e6b5
                                                          • Opcode Fuzzy Hash: 0424353c2318366de6868919a943b0b458b0eddce2ebca15f337c73ed91d6448
                                                          • Instruction Fuzzy Hash: E2711B30A102099FDB54EFA9D980A9DBBF6FF84304F258529E449EB355DB30ED46CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 13969a26987036c9c95704a58762595ef43040179d9b4513ce1d9183f01bfe22
                                                          • Instruction ID: ec5570d336772a5afc75f5487549e58262dff4649fe3c249a3036a0e75501512
                                                          • Opcode Fuzzy Hash: 13969a26987036c9c95704a58762595ef43040179d9b4513ce1d9183f01bfe22
                                                          • Instruction Fuzzy Hash: 25511331E10206DFCF64EF78E6446ADBBB2EB88315F108829E90BD7391DB318955CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3d9cabd511f33c4a088ecc5ffa434ddb556323099a8d683c80769b7ce26da0e9
                                                          • Instruction ID: ff6d02be676ae2352f39f47f5df21bf477557b6991b91981fcbf3274ccbae153
                                                          • Opcode Fuzzy Hash: 3d9cabd511f33c4a088ecc5ffa434ddb556323099a8d683c80769b7ce26da0e9
                                                          • Instruction Fuzzy Hash: 6251D930B202159FEF70667CDA5476F2A5FD789710F20492AE80BDB3D5CA69CC8587A2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5d45ce9a98d74ec280d996a6e62a1eb6dbff88f174e45b95f3572cee2195b55c
                                                          • Instruction ID: 141fb094703e0e9ab217af0e836f1652d29c73cfe3953b7d2ff902c553c5182f
                                                          • Opcode Fuzzy Hash: 5d45ce9a98d74ec280d996a6e62a1eb6dbff88f174e45b95f3572cee2195b55c
                                                          • Instruction Fuzzy Hash: 5651D630B20215DFEF74666CDA5472F365EE789710F20492AE80BDB3D8CA69CC8547A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4855be967170e425f5984cd65d4e237b0118c3a24bc5000049a9267ac5091aa5
                                                          • Instruction ID: d7aa6de788f92031371044eff3c60fb92a7c6237d2a1e0bef987238075efe307
                                                          • Opcode Fuzzy Hash: 4855be967170e425f5984cd65d4e237b0118c3a24bc5000049a9267ac5091aa5
                                                          • Instruction Fuzzy Hash: 3E415B72E1060A8BDF70CFA9D881AAFFBB2FB44310F10492AE556E7650D370E9558B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3ea80f15165c988c82b1dbe7eb53027282629fd5f2fb3848c81cb38f423bd157
                                                          • Instruction ID: b070a62a4d0d9c836188f7419e4f81d851101eaf95befda0d459af0000aca157
                                                          • Opcode Fuzzy Hash: 3ea80f15165c988c82b1dbe7eb53027282629fd5f2fb3848c81cb38f423bd157
                                                          • Instruction Fuzzy Hash: 5831C630E2061A8FCF11DF68D99069EB7B1FF85304F148929E805EB344DB71E946CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ed56a65ccf2f9d0d4023d5d42f815939ae3bfc3bc3762c8fb82626eda82d21d3
                                                          • Instruction ID: d1a090a6eeb729e1ea690d1227076b064c967f2760d69f49f83df164d756fc89
                                                          • Opcode Fuzzy Hash: ed56a65ccf2f9d0d4023d5d42f815939ae3bfc3bc3762c8fb82626eda82d21d3
                                                          • Instruction Fuzzy Hash: 0921AE75F156069FDB40DF69D880AAEBBF5EB89710F148025E905EB380E730DC428B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 375f005cd7c0644a0b86fd86103439da9ad12a0bba8bfae35a7972e285ab785e
                                                          • Instruction ID: c597567f35c5bea95f86e77a07e04479129e67041f49323292c75b9d4c084754
                                                          • Opcode Fuzzy Hash: 375f005cd7c0644a0b86fd86103439da9ad12a0bba8bfae35a7972e285ab785e
                                                          • Instruction Fuzzy Hash: AD21AC75F116069FDB40EFA9D880AAEBBF5EB49750F108029E905EB380E730DC41CB96
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4052915683.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d3d000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c88570358ccab9ebca4700b70dc7040f230a43dc678f9e45172331dbc1d3a8ac
                                                          • Instruction ID: 2c3c8350d41464169137af3b2226c13ed9e0b52e6d6858a9f74f7c85f215a084
                                                          • Opcode Fuzzy Hash: c88570358ccab9ebca4700b70dc7040f230a43dc678f9e45172331dbc1d3a8ac
                                                          • Instruction Fuzzy Hash: 8121F271504204DFCB18DF14E980B26BBA6FB84714F24C569E8494B296C37AD846CE72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4052915683.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d3d000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c3e278b71dfecb824a80edb58a4de9f5606494f509e6236ad309054a4d8f7ea2
                                                          • Instruction ID: 66bdfb0c108871370a5dc78e224b3532a49c565cdd6e8ee907eaa8acafffbd54
                                                          • Opcode Fuzzy Hash: c3e278b71dfecb824a80edb58a4de9f5606494f509e6236ad309054a4d8f7ea2
                                                          • Instruction Fuzzy Hash: 1B2135B9504200DFDB14DF14E9C4B2BBBA6FB84324F24C569E8494B246C37AD846CEB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4052915683.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d3d000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fafaee40311f7eb415ef7596b1e01c42b3b8967ad8fba0178c38efc9bfa68e41
                                                          • Instruction ID: 3d1cabbc5158101a77119d1df46f5bdf76edbae303bdd9979a681a271a33b7df
                                                          • Opcode Fuzzy Hash: fafaee40311f7eb415ef7596b1e01c42b3b8967ad8fba0178c38efc9bfa68e41
                                                          • Instruction Fuzzy Hash: E52126B1604204DFCB05DF14E9C4B26BBA6FB84314F24C56DD9494B256C376E846CF72
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dee09a3c3ccaeb7a2da3bde8209c0cba1e8f70d75d998214b3d46a1a2cc6a07c
                                                          • Instruction ID: 507dc6632d17eee45176d02609f77aa1d991ee1c2d9dd1aaa66db22f1a904963
                                                          • Opcode Fuzzy Hash: dee09a3c3ccaeb7a2da3bde8209c0cba1e8f70d75d998214b3d46a1a2cc6a07c
                                                          • Instruction Fuzzy Hash: 2211A521F242156BEF65296D9D507AB158EC785750F208826F80FD7394D959CC4603F6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4052915683.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d3d000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a2d637a85b2e5fa7aec01719676b0b0943bf5d5bcfc7745788580fb0f8e4d261
                                                          • Instruction ID: 3ba06e2da0f77e867edfea6184cb6fe15a2fb31cf0891b6bbac025a0fcb6ae32
                                                          • Opcode Fuzzy Hash: a2d637a85b2e5fa7aec01719676b0b0943bf5d5bcfc7745788580fb0f8e4d261
                                                          • Instruction Fuzzy Hash: EA213D7550E3C08FD717CB24D990715BF71AB46214F29C5DBD8898F2A7C23A980ACB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0c71bb4de61fda10d7fcee647093aa512dabe39d0c3a074c1f1ccc15aa8b3958
                                                          • Instruction ID: 20fb1bef746011f6184e3b085e430a0dae259863d76d5aedeba2b0101cb0da76
                                                          • Opcode Fuzzy Hash: 0c71bb4de61fda10d7fcee647093aa512dabe39d0c3a074c1f1ccc15aa8b3958
                                                          • Instruction Fuzzy Hash: 65018431F3021667EF64297D9E5576F108EC7C5760F20882AE90FE7398D959CC8603EA
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 382ff934dc39b2a855d6dd61f8edff7a48d05d9c90df560daab0ae26ec900dbf
                                                          • Instruction ID: 57e17b29bf5bca58055685ee166f2d2dba0d40761e4ca441e59af8b1d53d43fc
                                                          • Opcode Fuzzy Hash: 382ff934dc39b2a855d6dd61f8edff7a48d05d9c90df560daab0ae26ec900dbf
                                                          • Instruction Fuzzy Hash: A911A135B241295FDF54E668D8146AF73EAEBC9350F00853AD90AE7380EE64DC028BD2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93ca6f3ba91e805eeafb39f7b584503a846e7bcdb78d4de0846182d4fc21aaa9
                                                          • Instruction ID: 042c16a4656eb70b097481ce8817eb93509f910841ed93197cb9797f87426721
                                                          • Opcode Fuzzy Hash: 93ca6f3ba91e805eeafb39f7b584503a846e7bcdb78d4de0846182d4fc21aaa9
                                                          • Instruction Fuzzy Hash: DB019634B101111FDB61967DA814A2F77EADBCA610F11842AF94ACB341DE25DC0247A5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 486d2b6b00373f46e6be01b4053c601c58599deec3f7c697b1f888da6397a064
                                                          • Instruction ID: dff9b8c340a2d13cd337b779bf68bd5bd4ea6206ad60551ed47c69f4ba7493e1
                                                          • Opcode Fuzzy Hash: 486d2b6b00373f46e6be01b4053c601c58599deec3f7c697b1f888da6397a064
                                                          • Instruction Fuzzy Hash: 6E01D431B141111BDBA4A6ADA81871FB7DBDBC9718F148439E90EC7780D965DC4243A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5fce8246940e28ca950165519fc10fb853507ad4c3899c316166b368d8772b8e
                                                          • Instruction ID: d93fa5f9dd4571e684bbf2c74572330f081add048d4d9c64a2844ccddfe34f13
                                                          • Opcode Fuzzy Hash: 5fce8246940e28ca950165519fc10fb853507ad4c3899c316166b368d8772b8e
                                                          • Instruction Fuzzy Hash: 5E21C2B5D01259EFCB10DF9AD885ADEFFB4FB49310F10812AE918A7240C774A554CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4052915683.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d3d000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                                          • Instruction ID: cda352a894a08e123460769564a2e2750cbce9f26ca9f75c9b6fb5682d2b3172
                                                          • Opcode Fuzzy Hash: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                                          • Instruction Fuzzy Hash: 81119079504280DFDB12CF14E5C4B16BB62FB94324F28C6AAD8494B656C33AD81ACFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4052915683.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_d3d000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                          • Instruction ID: b7ac9adb6ccf1597023e9f328aa8b8a85f07faacc4b34136f3fb1afb2c17baa9
                                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                          • Instruction Fuzzy Hash: 41118BB5504280DFDB05CF14E5C4B15BBA2FB94314F28C6AAD9494B666C33AE84ACF62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 52784f629d14b9a31f0ae82ffc4386c55f96245698902e5bf05792630243c377
                                                          • Instruction ID: a9efa6dfed8f4904d7ab120b5c4c24e9c5767a64cb5a6851faa79af87c923e08
                                                          • Opcode Fuzzy Hash: 52784f629d14b9a31f0ae82ffc4386c55f96245698902e5bf05792630243c377
                                                          • Instruction Fuzzy Hash: 8501D832F241195BDB54A669DC116AF77EADBC9250F04403AD90BE7280EE209C0247D6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 58d8c059d7c5cd91743fae6283359979c812366b77973a112a5dc375c4705401
                                                          • Instruction ID: 85f23c0f073b87627f159adae8cbf294d6428f256dccaa316a3685abb2429f1d
                                                          • Opcode Fuzzy Hash: 58d8c059d7c5cd91743fae6283359979c812366b77973a112a5dc375c4705401
                                                          • Instruction Fuzzy Hash: 8911AFB5D01259AFCB00DF9AD884ADEFFB4FB49320F10812AE918A7240C374A954CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8197fd8616d69006e4c0b7ce9799550d947c4b3d7a6c032de81de1d2f1fa7028
                                                          • Instruction ID: 5dd64d76ac975f3218eb9c931cca87bcbd4d60eb38fd8369e335f7cc94f7cead
                                                          • Opcode Fuzzy Hash: 8197fd8616d69006e4c0b7ce9799550d947c4b3d7a6c032de81de1d2f1fa7028
                                                          • Instruction Fuzzy Hash: 0001F431B101110BDBA4A6ADA418B2FB3DBDBC9728F108839E90EC7780DD31DC4243A9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c55d65872f21199aca3e734aa7b163750c1e8f8ea99d3b546d2c8166dd9d28fc
                                                          • Instruction ID: 66df56de0db4be95f7997bdf2077b904498ed12b807f2527174efb40e4e9a012
                                                          • Opcode Fuzzy Hash: c55d65872f21199aca3e734aa7b163750c1e8f8ea99d3b546d2c8166dd9d28fc
                                                          • Instruction Fuzzy Hash: 5401F730B142110FC7E1EA7DE815B5E73D6DB89714F108429E50ECB385EA15DC828B95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 22ed3660b91794437ad5dfdf2e2806a3fb27de7815eadb49a7d481a5e173bb58
                                                          • Instruction ID: 384c2da03cb72732dd6ba2121fa09587c3aebba4de980a567e388a209798569b
                                                          • Opcode Fuzzy Hash: 22ed3660b91794437ad5dfdf2e2806a3fb27de7815eadb49a7d481a5e173bb58
                                                          • Instruction Fuzzy Hash: B901A435B101111FDB65966DA85472F63DADBCA714F118839E54ECB340DE25DC0247A5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 17341bad7464552e392701c34667bbd5752356d49bae43117eee76af791ba860
                                                          • Instruction ID: 500fa96e3f42457270910457bd158ea1b653427f5ed92fef2ca2f4b25e97224f
                                                          • Opcode Fuzzy Hash: 17341bad7464552e392701c34667bbd5752356d49bae43117eee76af791ba860
                                                          • Instruction Fuzzy Hash: 9901A430B141110FDBE0EA6DE454B6E73D7EB89714F108838E90ECB384EA26EC424B95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ce9906906235680c42ec5d6e1e6a44b8f2e42fe9e068da65d810edb1667315cc
                                                          • Instruction ID: 110f6a7191666ca42372f68b3d4a2a0915e71249fc4fbf183b3818df0df0a62d
                                                          • Opcode Fuzzy Hash: ce9906906235680c42ec5d6e1e6a44b8f2e42fe9e068da65d810edb1667315cc
                                                          • Instruction Fuzzy Hash: 18F03070A052059FD794FF78D51025E7BF6EB85204F5041B9980AD7299EB309942CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 87f40585d2e80c759fc3b16696dd0b7c3b930d40e5e39ec60fe2b2e9d7d62061
                                                          • Instruction ID: 3115cbf5dd52c3039009ed5792e49cd185967aa617a6bcfefaac64d34cdcbec8
                                                          • Opcode Fuzzy Hash: 87f40585d2e80c759fc3b16696dd0b7c3b930d40e5e39ec60fe2b2e9d7d62061
                                                          • Instruction Fuzzy Hash: 12F05E70A052098FD380FFB8D51025E77F2EB85200F504179880AD7398FB309942CFA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe55d8764e97bb0d49a913ac7b06a6d5861ebbc2778e3274bd8e568d8c708acf
                                                          • Instruction ID: 82cf775e5ba16eeadeca14c131120c7f81955410b68434ca4ce49f2853523795
                                                          • Opcode Fuzzy Hash: fe55d8764e97bb0d49a913ac7b06a6d5861ebbc2778e3274bd8e568d8c708acf
                                                          • Instruction Fuzzy Hash: A5E048B2D341495BEFA0DAB0D95579AB76DD705204F1188A5DC05D7181E176CD055341
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                          • API String ID: 0-2222239885
                                                          • Opcode ID: 00d877aa05ce10e42e63394806352a85d946677ebe10150e6293c9adacce4187
                                                          • Instruction ID: 53276d607cc1419d04ecc9233fcd509804cd18f00d4612e1af2594dc1a8bf6af
                                                          • Opcode Fuzzy Hash: 00d877aa05ce10e42e63394806352a85d946677ebe10150e6293c9adacce4187
                                                          • Instruction Fuzzy Hash: A8123C30E1021A8FDB64DF65D954A9EB7F2FF88304F2089A9D40AAB354DB349D85CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                          • API String ID: 0-3823777903
                                                          • Opcode ID: 6ce6a9e2a0d7d763943bcc7094725a24ab79b86e89fea989b5a3354af13fa64b
                                                          • Instruction ID: 2193241fc5084edfcfb4a1ab8f6e63e0b4428aee899178603275d7e31990ddda
                                                          • Opcode Fuzzy Hash: 6ce6a9e2a0d7d763943bcc7094725a24ab79b86e89fea989b5a3354af13fa64b
                                                          • Instruction Fuzzy Hash: 5A916030E2020ADFDB64EF68D585B6EBBB2FF44300F108529E8029B394DB759D45CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                          • API String ID: 0-390881366
                                                          • Opcode ID: a89536ad9a87724abcb7d1548c5c93370ab8668546a8dd32dd1a1681adbe14b8
                                                          • Instruction ID: 16e15d2807b1765d4d15406225384b397f02b8128a81ecd506f9973d4a29c5bb
                                                          • Opcode Fuzzy Hash: a89536ad9a87724abcb7d1548c5c93370ab8668546a8dd32dd1a1681adbe14b8
                                                          • Instruction Fuzzy Hash: A7F16130B11209CFDB54EF68D554A6EBBB2FF84304F208528D805AB399DB35DC82CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q
                                                          • API String ID: 0-2125118731
                                                          • Opcode ID: 5a0406637142b25bbb41994fc226457adad057726177d1cf1e74088a30baf4a9
                                                          • Instruction ID: d140c45bdfa37bc4e28c784d7b2b4a65bff0ea646a907702c6fcb35a043c2a2a
                                                          • Opcode Fuzzy Hash: 5a0406637142b25bbb41994fc226457adad057726177d1cf1e74088a30baf4a9
                                                          • Instruction Fuzzy Hash: 55B15D34B10209DFDB54EF68D58466EB7B2FF84314F248929D8069B359DB79DC82CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^q$$^q$$^q$$^q
                                                          • API String ID: 0-2125118731
                                                          • Opcode ID: 5145499a152d5db9e8891683d831a3a94cf601370d8e55e42dd6f4330a001ecb
                                                          • Instruction ID: 66b91c32ca9b15dedf45eec94975dfe4890bc235b2f4c9e1536746cfbca6023c
                                                          • Opcode Fuzzy Hash: 5145499a152d5db9e8891683d831a3a94cf601370d8e55e42dd6f4330a001ecb
                                                          • Instruction Fuzzy Hash: DD518030E212059FDF65DB68E984AAEB7B2EB85310F148939DC16DB395DB30DC41CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.4059911588.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_62d0000_AddInProcess32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: LR^q$LR^q$$^q$$^q
                                                          • API String ID: 0-2454687669
                                                          • Opcode ID: b740de4fefd35fe9b6f99fe0c08b1a1085a76d4029feeb4e5422df556c51fb6c
                                                          • Instruction ID: cf07145427410a158ddc17b180910b2a1c649686be04d75f590bc7df1628e310
                                                          • Opcode Fuzzy Hash: b740de4fefd35fe9b6f99fe0c08b1a1085a76d4029feeb4e5422df556c51fb6c
                                                          • Instruction Fuzzy Hash: D551A331B202059FDB54EF28D941A6A77E2FF84704F108968E806DF399DB75EC45CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%