Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
Analysis ID:1427767
MD5:8745c960022bcefff65c91a47374a169
SHA1:e503dd1b85b17ba61e468890d11f3259e9437b72
SHA256:8fd4a4dcbe8b649c8c8cec213352c6da213caaefffc76450efee498e51f63cda
Tags:exe
Infos:

Detection

Score:32
Range:0 - 100
Whitelisted:false
Confidence:20%

Compliance

Score:35
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Deletes itself after installation
Enables network access during safeboot for specific services
Found string related to ransomware
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to delete services
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample searches for specific file, try point organization specific fake files to the analysis machine
  • System is w10x64
  • SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe (PID: 3624 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe" MD5: 8745C960022BCEFFF65C91A47374A169)
    • TMLauncher.exe (PID: 7312 cmdline: "C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe" MD5: 8FCA72C59D3A9AA6EDA33C64DAA0296D)
      • TurboMeeting.exe (PID: 7452 cmdline: "C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe" --program C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\rsp1024hcmd.txt MD5: D973EE70262ADF0A3D8AC412964517F9)
        • TurboMeeting.exe (PID: 7612 cmdline: TurboMeeting.exe --MagDetect MD5: D973EE70262ADF0A3D8AC412964517F9)
        • TurboMeeting.exe (PID: 7780 cmdline: TurboMeeting.exe --VSEDetect MD5: D973EE70262ADF0A3D8AC412964517F9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeVirustotal: Detection: 8%Perma Link
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMDownloader.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMInstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Sss.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\PCStarter.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TMInstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMService.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMLauncher.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarterXP.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TMRemover.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\InstallService.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarter.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMRemover.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TMLauncher.exeJump to behavior

Compliance

barindex
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMDownloader.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMInstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Sss.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\PCStarter.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TMInstaller.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMService.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMLauncher.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarterXP.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TMRemover.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\InstallService.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarter.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMRemover.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeEXE: C:\Users\user\AppData\Roaming\TurboMeeting\TMLauncher.exeJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TurboMeetingJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user~1\AppData\Local\Temp\TMSetup.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user~1\AppData\Local\Temp\TMInstaller.txtJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\setup_status.txtJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 8.18.62.6:443 -> 192.168.2.7:49706 version: TLS 1.2
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\RHUB2\PCSetup\Release.V2017\PCSetup.pdb source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000000.1308753930.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\TMResource\Release.V2017\TMResource.pdb source: TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\PCInstaller\Release.V2017\PCInstaller.pdb source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000000.1422829262.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\PCUninstaller\Release.V2017\PCUninstaller.pdb@ source: TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\MyHookDll\Release.V2017\MyHookDll.pdb source: TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\dev\work\rhub\Code\SendSAS\release\SendSAS.pdb source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\vistafunc\Release.V2017\vistafunc.pdb source: TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000002.3778188999.000000006EC3D000.00000002.00000001.01000000.0000000A.sdmp, TurboMeeting.exe, 00000008.00000002.1527616968.000000006EC3D000.00000002.00000001.01000000.0000000A.sdmp, TurboMeeting.exe, 0000000B.00000002.1574382545.000000006EC3D000.00000002.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\RHUB2\Code\PCUninstaller\Release.V2017\PCUninstaller.pdb source: TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\TMService\Release.V2017\TMService.pdb source: TMLauncher.exe, 00000004.00000003.1471373053.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\TMService\Release.V2017\TMService.pdbM source: TMLauncher.exe, 00000004.00000003.1471373053.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\PCGUI5\Release.V2017\TurboMeeting.pdb source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmp
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E14130 FindFirstFileW,RemoveDirectoryW,SetFileAttributesW,_strstr,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,FormatMessageW,WSAGetLastError,0_2_00E14130
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E63648 FindFirstFileExW,0_2_00E63648
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E338A9 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,0_2_00E338A9
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB4100 FindFirstFileW,RemoveDirectoryW,SetFileAttributesW,_strstr,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,FormatMessageW,WSAGetLastError,4_2_00CB4100
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB1F00 GetFileAttributesW,CreateDirectoryW,WSAGetLastError,FindFirstFileW,GetLastError,FormatMessageW,FindNextFileW,SetFileAttributesW,CopyFileW,GetLastError,FormatMessageW,FindNextFileW,FindClose,4_2_00CB1F00
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CC9155 SetLastError,FindFirstFileW,GetLastError,4_2_00CC9155
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CC929D GetModuleHandleW,GetProcAddress,FindFirstFileW,4_2_00CC929D
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CD9D08 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,4_2_00CD9D08
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CFDEE5 FindFirstFileExW,4_2_00CFDEE5
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC354E6 FindFirstFileExW,6_2_6EC354E6
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeetingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\Roaming\TurboMeetingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xmlJump to behavior

Networking

barindex
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeRegistry value created: NULL ServiceJump to behavior
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E72440 InternetSetOptionA,InternetSetOptionA,InternetOpenA,InternetSetOptionA,WSAGetLastError,InternetSetOptionA,WSAGetLastError,InternetSetOptionA,WSAGetLastError,InternetConnectA,WSAGetLastError,HttpOpenRequestA,WSAGetLastError,InternetReadFile,InternetQueryOptionA,InternetSetOptionA,HttpSendRequestA,InternetReadFile,HttpSendRequestA,WSAGetLastError,HttpQueryInfoA,WSAGetLastError,InternetReadFile,GetDesktopWindow,InternetErrorDlg,WSAGetLastError,InternetReadFile,WSAGetLastError,InternetReadFileExA,WSAGetLastError,_strstr,WSAGetLastError,0_2_00E72440
Source: global trafficHTTP traffic detected: GET /as/wapi/get_client_size?client_type=0&xml_format=Y&client=pc&myrand11262017=fsOpyNl7RRDmyVQ8cYMYTocPl4347283&rdm=1713420883 HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: support.lockwoodbroadcast.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /as/wapi/get_client?client_type=0&client=pc&myrand11262017=1s4z4AVItfvg3fyyYjjDdD6L2c347284&rdm=1713420884 HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: support.lockwoodbroadcast.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: support.lockwoodbroadcast.com
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000000.1308753930.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000000.1422829262.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://%s%shttp://%shttps://%s%shttps://%shttp://%s:%d%shttp://%s:%drhubcom.comgomeetnow.com.turbome
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://%s%shttps://%s%shttp://%s:%d%shttp://%s:%drhubcom.comgomeetnow.com.turbomeet.comgosupportnow.
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://%s/forumpost.php?euid=%s&cuid=%s&first_name=%s&last_name=%s&from_server_ip=%s&timer_id=%s
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://%s/forumpost.php?euid=%s&cuid=%s&first_name=%s&last_name=%s&from_server_ip=%s&timer_id=%sPMai
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://%s:%d/MeetingRegistration/user/update-meeting-info.php?sp=%s
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://%s:%d/MeetingRegistration/user/update-meeting-info.php?sp=%ssURL
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawtePCA.crl0
Source: TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://https://https://%shttp://%sPCGUI.CInviteAttendee_::OnInitDialog.JoinMessage2PCGUI.CInviteAtte
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
Source: TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
Source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://th.symcb.com/th.crl0
Source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://th.symcb.com/th.crt0
Source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://th.symcd.com0&
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://tools.ietf.org/html/draft-ietf-avtext-framemarking-07
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01
Source: TurboMeeting.exe, 0000000B.00000002.1573799950.000000001089C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rhubcom.
Source: TurboMeeting.exe, 0000000B.00000002.1573799950.0000000010859000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rhubcom.com
Source: TurboMeeting.exe, 00000006.00000000.1496181175.0000000001A8A000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1525335027.0000000001A8A000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1555133297.0000000001A8A000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.rhubcom.com.T
Source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.rhubcom.com0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000000.1422829262.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.rhubcom.comRHUB
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time
Source: TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/color-space
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00http://www.webrtc.org/experi
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/playout-delay
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-content-type
Source: TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-timing
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://compose.mail.yahoo.com/?To=&Subj=
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
Source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://mail.google.com/mail/u/0/?view=cm&fs=1&tf=1&to&su=
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://mail.google.com/mail/u/0/?view=cm&fs=1&tf=1&to&su=https://compose.mail.yahoo.com/?To=&Subj=(
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0C
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://streams.videolan.org/upload/
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476645003.00000000004E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.lockwoodbroadcast.com/
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1477353524.00000000044D0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476116809.0000000000522000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476116809.000000000052B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476684834.0000000000522000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.lockwoodbroadcast.com/as/wapi/get_client?client_type=0&client=pc&myrand11262017=1s4z
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476645003.0000000000513000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.lockwoodbroadcast.com/as/wapi/get_client_size?client_type=0&xml_format=Y&client=pc&m
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://www.google.com/calendar/render?action=TEMPLATE&text=
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 8.18.62.6:443 -> 192.168.2.7:49706 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E218C5 GetKeyState,GetKeyState,GetKeyState,SendMessageW,0_2_00E218C5
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CD03AF GetKeyState,GetKeyState,GetKeyState,SendMessageW,4_2_00CD03AF

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: /as/wapi/login?XMLHTTPRequest=Y&Email=%s&Password=%s&RememberMe=%s&Version=%s&pass_through=%s&employee_uid=%s&run_service=%s&os_version=%d&os_description=%s&encrypted=Y
Source: TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: /as/wapi/login?XMLHTTPRequest=Y&Email=%s&Password=%s&RememberMe=%s&Version=%s&pass_through=%s&employee_uid=%s&run_service=%s&os_version=%d&os_description=%s&encrypted=Y
Source: TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: /as/wapi/login?XMLHTTPRequest=Y&Email=%s&Password=%s&RememberMe=%s&Version=%s&pass_through=%s&employee_uid=%s&run_service=%s&os_version=%d&os_description=%s&encrypted=Y
Source: TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: /as/wapi/login?XMLHTTPRequest=Y&Email=%s&Password=%s&RememberMe=%s&Version=%s&pass_through=%s&employee_uid=%s&run_service=%s&os_version=%d&os_description=%s&encrypted=Y
Source: TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: /as/wapi/login?XMLHTTPRequest=Y&Email=%s&Password=%s&RememberMe=%s&Version=%s&pass_through=%s&employee_uid=%s&run_service=%s&os_version=%d&os_description=%s&encrypted=Y
Source: TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: /as/wapi/login?XMLHTTPRequest=Y&Email=%s&Password=%s&RememberMe=%s&Version=%s&pass_through=%s&employee_uid=%s&run_service=%s&os_version=%d&os_description=%s&encrypted=Y
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CA5C10 GetActiveWindow,MessageBoxW,Sleep,OpenSCManagerW,OpenServiceW,ControlService,Sleep,DeleteService,Sleep,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,WSAGetLastError,CloseServiceHandle,CloseServiceHandle,WSAGetLastError,4_2_00CA5C10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4CDF60_2_00E4CDF6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E70F200_2_00E70F20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E480990_2_00E48099
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E483430_2_00E48343
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E703300_2_00E70330
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E105F00_2_00E105F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E706200_2_00E70620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4860A0_2_00E4860A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E488C50_2_00E488C5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E3C8D50_2_00E3C8D5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E6A8B60_2_00E6A8B6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E6A9DF0_2_00E6A9DF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E70AE00_2_00E70AE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E06C900_2_00E06C90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E68E8F0_2_00E68E8F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E10FD00_2_00E10FD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4D0260_2_00E4D026
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E6D0100_2_00E6D010
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4D2560_2_00E4D256
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4D4C00_2_00E4D4C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E374630_2_00E37463
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E716600_2_00E71660
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E6D7B00_2_00E6D7B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E478D00_2_00E478D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E5182F0_2_00E5182F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E679B90_2_00E679B9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E5BA030_2_00E5BA03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E51B860_2_00E51B86
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E53B800_2_00E53B80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E6FC100_2_00E6FC10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E47D270_2_00E47D27
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E1BF400_2_00E1BF40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E45F4A0_2_00E45F4A
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE71E44_2_00CE71E4
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CF60D84_2_00CF60D8
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE21304_2_00CE2130
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D022694_2_00D02269
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CA83504_2_00CA8350
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE23774_2_00CE2377
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE03304_2_00CE0330
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CC64404_2_00CC6440
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D085804_2_00D08580
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE26E94_2_00CE26E9
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CA66604_2_00CA6660
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB08E54_2_00CB08E5
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D0A9E04_2_00D0A9E0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE29934_2_00CE2993
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB2CC04_2_00CB2CC0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE2C5A4_2_00CE2C5A
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE2F154_2_00CE2F15
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CAD0704_2_00CAD070
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D0B1004_2_00D0B100
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB12574_2_00CB1257
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB122C4_2_00CB122C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CED3C04_2_00CED3C0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D0B3F04_2_00D0B3F0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB14D04_2_00CB14D0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D054F44_2_00D054F4
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CEB45F4_2_00CEB45F
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE74164_2_00CE7416
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE76484_2_00CE7648
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D056144_2_00D05614
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D0B8B04_2_00D0B8B0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE78A54_2_00CE78A5
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D03BBF4_2_00D03BBF
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00D07DE04_2_00D07DE0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CFFFCC4_2_00CFFFCC
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC3B4B16_2_6EC3B4B1
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: String function: 00CDEBDC appears 84 times
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: String function: 00CA6620 appears 74 times
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: String function: 00CA6260 appears 34 times
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: String function: 00CAF930 appears 325 times
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: String function: 00CDECC0 appears 68 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: String function: 00E07CD0 appears 68 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: String function: 00E01D51 appears 33 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: String function: 00E441EB appears 34 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: String function: 00E44180 appears 115 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: String function: 00E44880 appears 67 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: String function: 00E0EEE0 appears 246 times
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000000.1308827291.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMeetingStarter.exe@ vs SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMeetingStarter.exe@ vs SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus32.rans.winEXE@9/98@2/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E14130 FindFirstFileW,RemoveDirectoryW,SetFileAttributesW,_strstr,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,FormatMessageW,WSAGetLastError,0_2_00E14130
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E14F80 GetLastError,CreateToolhelp32Snapshot,GetLastError,Process32FirstW,CloseHandle,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,ImpersonateSelf,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,OpenProcess,_strstr,TerminateProcess,CloseHandle,GetLastError,GetLastError,Process32NextW,CloseHandle,0_2_00E14F80
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB5020 GetLastError,CreateToolhelp32Snapshot,GetLastError,Process32FirstW,CloseHandle,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,ImpersonateSelf,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,OpenProcess,_strstr,TerminateProcess,FindCloseChangeNotification,GetLastError,GetLastError,Process32NextW,FindCloseChangeNotification,4_2_00CB5020
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E14F80 GetLastError,CreateToolhelp32Snapshot,GetLastError,Process32FirstW,CloseHandle,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,ImpersonateSelf,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,OpenProcess,_strstr,TerminateProcess,CloseHandle,GetLastError,GetLastError,Process32NextW,CloseHandle,0_2_00E14F80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E2E860 CoInitialize,GetProcAddress,GetProcAddress,GetProcAddress,CoCreateInstance,0_2_00E2E860
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E2B751 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,__EH_prolog3_catch,FindResourceW,LoadResource,LockResource,GetDesktopWindow,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,FreeResource,0_2_00E2B751
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeetingJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeMutant created: \Sessions\1\BaseNamedObjects\TMCacheFileMutex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user~1\AppData\Local\Temp\TMSetup.txtJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeVirustotal: Detection: 8%
Source: TMLauncher.exeString found in binary or memory: --installprinter
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe "C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe"
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe "C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe" --program C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\rsp1024hcmd.txt
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe TurboMeeting.exe --MagDetect
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe TurboMeeting.exe --VSEDetect
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe "C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe "C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe" --program C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\rsp1024hcmd.txtJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe TurboMeeting.exe --MagDetectJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe TurboMeeting.exe --VSEDetectJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: vdmdbg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: vistafunc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dlnashext.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wpdshext.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: asycfilt.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: vdmdbg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: vistafunc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: vdmdbg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: vistafunc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: magnification.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: TurboMeeting.lnk.6.drLNK file: ..\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
Source: TurboMeeting Start Meeting.lnk.6.drLNK file: ..\..\..\..\..\TurboMeeting\TurboMeeting\TurboMeeting.exe
Source: TurboMeeting Uninstall.lnk.6.drLNK file: ..\..\..\..\..\TurboMeeting\TMRemover.exe
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile opened: C:\Users\user\Desktop\starter.cfgJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeAutomated click: Continue
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TurboMeetingJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\RHUB2\PCSetup\Release.V2017\PCSetup.pdb source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000000.1308753930.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\TMResource\Release.V2017\TMResource.pdb source: TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\PCInstaller\Release.V2017\PCInstaller.pdb source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000000.1422829262.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\PCUninstaller\Release.V2017\PCUninstaller.pdb@ source: TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\MyHookDll\Release.V2017\MyHookDll.pdb source: TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\dev\work\rhub\Code\SendSAS\release\SendSAS.pdb source: TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\vistafunc\Release.V2017\vistafunc.pdb source: TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000002.3778188999.000000006EC3D000.00000002.00000001.01000000.0000000A.sdmp, TurboMeeting.exe, 00000008.00000002.1527616968.000000006EC3D000.00000002.00000001.01000000.0000000A.sdmp, TurboMeeting.exe, 0000000B.00000002.1574382545.000000006EC3D000.00000002.00000001.01000000.0000000A.sdmp
Source: Binary string: C:\RHUB2\Code\PCUninstaller\Release.V2017\PCUninstaller.pdb source: TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\TMService\Release.V2017\TMService.pdb source: TMLauncher.exe, 00000004.00000003.1471373053.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\TMService\Release.V2017\TMService.pdbM source: TMLauncher.exe, 00000004.00000003.1471373053.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\RHUB2\Code\PCGUI5\Release.V2017\TurboMeeting.pdb source: TurboMeeting.exe, 00000006.00000002.3776134929.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.0000000001889000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001889000.00000002.00000001.01000000.00000009.sdmp
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: real checksum: 0xca6f3 should be: 0xcb5fb
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeStatic PE information: section name: _RDATA
Source: dbghelp.dll.0.drStatic PE information: section name: .didat
Source: InstallService.exe.0.drStatic PE information: section name: _RDATA
Source: PCStarter.exe.0.drStatic PE information: section name: _RDATA
Source: PCStarterXP.exe.0.drStatic PE information: section name: _RDATA
Source: TMDownloader.exe.0.drStatic PE information: section name: _RDATA
Source: TMInstaller.exe.0.drStatic PE information: section name: _RDATA
Source: TMRemover.exe.0.drStatic PE information: section name: _RDATA
Source: TMService.exe.0.drStatic PE information: section name: _RDATA
Source: TurboMeeting.dll.0.drStatic PE information: section name: .HookSha
Source: TurboMeeting.exe.0.drStatic PE information: section name: .rodata
Source: TurboMeeting.exe.0.drStatic PE information: section name: _RDATA
Source: TMLauncher.exe.0.drStatic PE information: section name: _RDATA
Source: TMRemover.exe.4.drStatic PE information: section name: _RDATA
Source: TMInstaller.exe.4.drStatic PE information: section name: _RDATA
Source: TMLauncher.exe.4.drStatic PE information: section name: _RDATA
Source: dbghelp.dll.4.drStatic PE information: section name: .didat
Source: InstallService.exe.4.drStatic PE information: section name: _RDATA
Source: PCStarter.exe.4.drStatic PE information: section name: _RDATA
Source: PCStarterXP.exe.4.drStatic PE information: section name: _RDATA
Source: TMDownloader.exe.4.drStatic PE information: section name: _RDATA
Source: TMInstaller.exe0.4.drStatic PE information: section name: _RDATA
Source: TMLauncher.exe0.4.drStatic PE information: section name: _RDATA
Source: TMRemover.exe0.4.drStatic PE information: section name: _RDATA
Source: TMService.exe.4.drStatic PE information: section name: _RDATA
Source: TurboMeeting.dll.4.drStatic PE information: section name: .HookSha
Source: TurboMeeting.exe.4.drStatic PE information: section name: .rodata
Source: TurboMeeting.exe.4.drStatic PE information: section name: _RDATA
Source: PCStarter.exe0.4.drStatic PE information: section name: _RDATA
Source: TM1713420902.dll.6.drStatic PE information: section name: .HookSha
Source: TM1713420903.dll.8.drStatic PE information: section name: .HookSha
Source: TM1713420905.dll.11.drStatic PE information: section name: .HookSha
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E44149 push ecx; ret 0_2_00E4415C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E448C6 push ecx; ret 0_2_00E448D9
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC0FE pushad ; ret 4_2_00CBC0FF
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE0AB pushad ; ret 4_2_00CBE0AC
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC0A6 pushad ; ret 4_2_00CBC0A7
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC04E pushad ; ret 4_2_00CBC04F
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE041 push dword ptr [ebx+60858D01h]; ret 4_2_00CBE054
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE15B pushad ; ret 4_2_00CBE15C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC156 pushad ; ret 4_2_00CBC157
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE103 pushad ; ret 4_2_00CBE104
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC2D6 pushad ; ret 4_2_00CBC2D7
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE2BB pushad ; ret 4_2_00CBE2BC
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE263 pushad ; ret 4_2_00CBE264
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE20B pushad ; ret 4_2_00CBE20C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC216 pushad ; ret 4_2_00CBC217
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC3EB pushad ; ret 4_2_00CBC3EC
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE3B3 push dword ptr [ebx+60858D01h]; ret 4_2_00CBE3C4
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE310 pushad ; ret 4_2_00CBE31A
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC32E pushad ; ret 4_2_00CBC32F
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC4F3 pushad ; ret 4_2_00CBC4F4
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC49B pushad ; ret 4_2_00CBC49C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC443 pushad ; ret 4_2_00CBC444
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE463 push dword ptr [ebx+60858D01h]; ret 4_2_00CBE474
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBE414 push dword ptr [ebx+60858D01h]; ret 4_2_00CBE41C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC5FB pushad ; ret 4_2_00CBC5FC
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC5A3 pushad ; ret 4_2_00CBC5A4
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC54B pushad ; ret 4_2_00CBC54C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC6AB pushad ; ret 4_2_00CBC6AC
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC653 pushad ; ret 4_2_00CBC654
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC7FB push dword ptr [ebx+60858D01h]; ret 4_2_00CBC80C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CBC7B3 pushad ; ret 4_2_00CBC7B4
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMDownloader.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMResource.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMRemover.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Sss.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMService.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMLauncher.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\jsproxy.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\jsproxy.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420902.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\vistafunc.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\InstallService.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMService.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarter.exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420903.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMRemover.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\dbghelp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMInstaller.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMDownloader.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\dbghelp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TMInstaller.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\PCStarter.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\Sss.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMInstaller.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\vistafunc.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarterXP.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarter.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMResource.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TMRemover.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\InstallService.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarterXP.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TMLauncher.exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420905.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeFile created: C:\Users\user~1\AppData\Local\Temp\TMSetup.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile created: C:\Users\user~1\AppData\Local\Temp\TMInstaller.txtJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\setup_status.txtJump to behavior

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeWindow found: window name: ProgmanJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeWindow found: window name: ProgmanJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TurboMeetingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TurboMeeting\TurboMeeting Start Meeting.lnkJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TurboMeeting\TurboMeeting Uninstall.lnkJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeFile deleted: c:\users\user\desktop\securiteinfo.com.trojan.siggen21.62491.4036.26173.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E22DF3 IsIconic,0_2_00E22DF3
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CD1882 IsIconic,4_2_00CD1882
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E45F4A GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E45F4A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMDownloader.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMResource.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMRemover.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Sss.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMService.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\jsproxy.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\jsproxy.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420902.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\InstallService.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarter.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMService.exeJump to dropped file
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420903.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMRemover.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\dbghelp.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMDownloader.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\dbghelp.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\PCStarter.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\Sss.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\PCStarterXP.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarter.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TMResource.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TMRemover.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\InstallService.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarterXP.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.dllJump to dropped file
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420905.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E14130 FindFirstFileW,RemoveDirectoryW,SetFileAttributesW,_strstr,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,FormatMessageW,WSAGetLastError,0_2_00E14130
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E63648 FindFirstFileExW,0_2_00E63648
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E338A9 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,0_2_00E338A9
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB4100 FindFirstFileW,RemoveDirectoryW,SetFileAttributesW,_strstr,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,FormatMessageW,WSAGetLastError,4_2_00CB4100
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CB1F00 GetFileAttributesW,CreateDirectoryW,WSAGetLastError,FindFirstFileW,GetLastError,FormatMessageW,FindNextFileW,SetFileAttributesW,CopyFileW,GetLastError,FormatMessageW,FindNextFileW,FindClose,4_2_00CB1F00
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CC9155 SetLastError,FindFirstFileW,GetLastError,4_2_00CC9155
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CC929D GetModuleHandleW,GetProcAddress,FindFirstFileW,4_2_00CC929D
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CD9D08 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,4_2_00CD9D08
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CFDEE5 FindFirstFileExW,4_2_00CFDEE5
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC354E6 FindFirstFileExW,6_2_6EC354E6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E59389 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,0_2_00E59389
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeetingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\Roaming\TurboMeetingJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeFile opened: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xmlJump to behavior
Source: TurboMeeting.exe, 00000006.00000002.3776866345.0000000002263000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA*k(
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476116809.000000000052B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476403815.00000000004BA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476524588.00000000004BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`mS%SystemRoot%\system32\mswsock.dllC
Source: TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: VMware Screen Codec / VMware Video
Source: TurboMeeting.exe, 00000008.00000003.1522178362.0000000000688000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1521892122.000000000067D000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 0000000B.00000002.1555648025.0000000002267000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E18060 GetModuleFileNameW,lstrcpyW,lstrcpyW,lstrcpyW,lstrcpyW,CreateFileW,OutputDebugStringW,SetFilePointer,CloseHandle,lstrcpyW,CreateFileW,CloseHandle,IsDebuggerPresent,0_2_00E18060
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E1D692 OutputDebugStringA,GetLastError,0_2_00E1D692
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E59389 VirtualProtect ?,-00000001,00000104,?,?,?,0000001C0_2_00E59389
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E5FD22 mov eax, dword ptr fs:[00000030h]0_2_00E5FD22
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4FDB8 mov eax, dword ptr fs:[00000030h]0_2_00E4FDB8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E5FD67 mov eax, dword ptr fs:[00000030h]0_2_00E5FD67
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CEE5E5 mov eax, dword ptr fs:[00000030h]4_2_00CEE5E5
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CFAF97 mov eax, dword ptr fs:[00000030h]4_2_00CFAF97
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC33C4D mov eax, dword ptr fs:[00000030h]6_2_6EC33C4D
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC34DFD mov eax, dword ptr fs:[00000030h]6_2_6EC34DFD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E633F8 GetProcessHeap,0_2_00E633F8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E0E5A0 SetUnhandledExceptionFilter,SetThreadPriority,WSAGetLastError,SetEvent,SetEvent,SetEvent,0_2_00E0E5A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E01596 SetUnhandledExceptionFilter,#17,_wprintf,GetClassInfoW,WSAStartup,GetModuleFileNameW,_strlen,_strlen,GetModuleFileNameW,PathStripPathW,_strstr,_strstr,_strlen,LoadImageW,SendMessageW,PostMessageW,0_2_00E01596
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E4A64E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E4A64E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E44B9F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E44B9F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E44D32 SetUnhandledExceptionFilter,0_2_00E44D32
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E43F3A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00E43F3A
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CA1C30 SetUnhandledExceptionFilter,#17,_strstr,_strstr,4_2_00CA1C30
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CDE3BD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00CDE3BD
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CE4A2E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00CE4A2E
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CDEFB3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00CDEFB3
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CDF146 SetUnhandledExceptionFilter,4_2_00CDF146
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC34E2E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_6EC34E2E
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC32093 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_6EC32093
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeCode function: 6_2_6EC31D02 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_6EC31D02
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E082A0 GetTempPathW,Sleep,CopyFileW,ShellExecuteExW,GetLastError,GetFileAttributesW,0_2_00E082A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E13D20 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetTokenInformation,GetLastError,GetLastError,GlobalAlloc,GetTokenInformation,GetLastError,AllocateAndInitializeSid,GetLastError,EqualSid,FreeSid,GlobalFree,0_2_00E13D20
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GShell_TrayWndkernel32.dllDbIU@0{@P
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndkernel32.dllsClientName = %s, sDesktopDirectory = %s, sStartMenuDirectory = %s, sCurrentDirectory = %sc:\rhub2\code\pcutility\pcutility.cppPCUtility:RemoveLink()%s\%s.lnkRemove sLink: %sStart Session%s.lnkStart MeetingRemove start menu directory: %sSoftware\Microsoft\Windows\CurrentVersion\Uninstallfailed to remove registry, sKey = %s, error %d, %sPCUtility::RemoveLink()DeleteRegistryKey(%s)c:\ProgramData\Microsoft\Windows\Start Menu\Programs\%swSoftware\ClassesURL:%s StarterURL ProtocolsKey = %s, sURL = %s, sStarterFile = %s, sClientName = %sPCUtility:RegisterStarter()%s\shell\open\command"%s" %%1sCommandKey = %sSoftware\Microsoft\Internet Explorer\ProtocolExecute0WarnOnOpenRHUBMXmeetingvector<T> too longlist<T> too longMore than log instance, reported from MyLog::Initialize()Server.\RunServerLog%s%s.txt%s%s.bak%s%s.bak.bak%sServerMemoryLog.txt%sServerMemoryLog.bakrsp1024h%s.bak%s.bak.bak%sClientMemoryLog.txt%sClientMemoryLog.bakwfailed to create log file %s in MyLog::GetWorkingDirectory(), %dException happens in MyLog::Initialize()%d-%02d-%02d %02d:%02d:%02dafailed to create log file %s in MyLog::GetWorkingDirectory()%d
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000000.1308753930.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWndkernel32.dllDb
Source: TMLauncher.exeBinary or memory string: Progman
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: ?sBuffer is NULL = %s, iWidth = %d, iHeight = %dc:\rhub2\gui5\virtualgui\pcimage.cppPCImage::ImageBufferToPNGimage.GetLastError() = %sProgmanMS-SDIaMS-SDIbWindows.UI.Core.CoreWindow>>>>> New call c:\rhub2\gui5\virtualgui\pcapplicationsharingmonitor.cppPCApplicationSharingMonitor::GetApplicationList!!! ERROR: GetMonitorByHandle() failed for m_vWindowHandle = %dPCApplicationSharingMonitor::ChangeSharingApplicationc:\rhub2\gui5\virtualgui\guivideo.cppenter: m_iCurrentWebCamStatus = %d, iControlCode = %dGUIVideo::StopWebCamStopWebCam, iControlCode == PRESENTER_ALL_STOP || iControlCode == VIEWER_ALL_STOPGetWebCamNamesStopWebCamGUIVideo::WebCamStatusCallbackGUIVideo::WebCamStatusCallback.WebcamFailedToStartGUIVideo::WebCamStatusCallback.WebcamRefusedToStart1GUIVideo::WebCamStatusCallback.WebcamRefusedToStart2GUIVideo::WebCamStatusCallback.WebcamRefusedToStart3GUIVideo::WebCamStatusCallback.WebcamRefusedToStart4m_bWebcamStartedByUser = %sGUIVideo::SetWebcamStartedByUserm_bWebcamPreviewStartedByUser = %s
Source: SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: invalid headerno new downloadhProcessSnap == INVALID_HANDLE_VALUE: %d, %s!Process32First(): %d, %ssProcessName = %sUtility::TerminateProcessByNameImpersonateSelf(SecurityImpersonation) failed: %d, %sOpenThreadToken() failed: %d, %sSeDebugPrivilegeCRITICAL ISSUE: there is a dead loop. One TurboMeeting.exe cannot be removed!.exesCommandLine = %s, sWorkingDirectory = %sUtility::StartProcessUTF8ToUTF16 is OKsucceeded.iErrorCode = %d, Error = %ssCommandLine = %sopenShellExecute(): iHinstance = %d, iErrorCode = %d, Error = %s, sExecutable = %s, sParameter = %s%s\*...Utility::RemoveAllFileEnd of RemoveAllFile: path = %s, %s, error code: %d, error: %s-sCurrentFilePath = %sSYSTEMbSystemUser = true, sUserApplicationDirectory = %s\..\..\..user application directory does not existbSystemUser = false, sUserApplicationDirectory = %sfrom CSIDL_COMMON_DOCUMENTS, sUserApplicationDirectory = %ssStartMenuDirectory = %ssCurrentDirectory = %ssCurrentFile = %ssUserApplicationDirectory = %ssTempDirectory = %ssDesktopDirectory = %sbUserAppDirAccessable = truebUserAppDirAccessable = falsebSystemUser = truebSystemUser = falseProgmanSHELLDLL_DefViewSysListView32sClientName: %s,
Source: TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: </__OUTLOOK_INTEGRATION__><__OUTLOOK_INTEGRATION__>outlook plugin was installed.c:\rhub2\pcgui5\pcgui\mainfrm.cppMainFrame::OnUpdateSoftwarePREVIOUS_ENTRY_POINT_JOINimage\ApplicationIcon.icoTurboMeetingMainWindowClassenter.MainFrame::OnClose()Error = %dToolbarWindow32TrayNotifyWndPCGUI.CSelectMeetingType::HostMeeting.SystemTrayIconTurboMeetingShell_TrayWnd</__ExitDueToNoConnection__><__ExitDueToNoConnection__></__Message__><__Message__></__PollingResponse__><__PollingResponse__>Received Polling response Error while parsing the string UserId = %d, %sMainWindow::OnRespondPolling()</__PollingId__><__PollingId__>Received Polling response Error while parsing the string No Poll Id UserId = %d, %sReceived Polling response from user But We do not have polling Id %dReceived Polling response UserId = %d, %s</__Choice0__><__Choice0__></__Choice1__><__Choice1__></__Choice2__><__Choice2__></__Choice3__><__Choice3__></__Choice4__><__Choice4__></__PollingQuestion__><__PollingQuestion__>Error while parsing the Polling Question %sMainWindow::OnShowRequestPolling()Error while parsing the Polling id %s</__IsSingleResponse__><__IsSingleResponse__></__Question__><__Question__></__PollingResult__><__PollingResult__>Error while parsing the Polling results From User %d : %sMainWindow::OnShowPublishPolling()Error while parsing the Polling Id. No PollingId is present: From User %d : %s</__TotalResponse__><__TotalResponse__></__ResponseChoice0__><__ResponseChoice0__></__ResponseChoice1__><__ResponseChoice1__></__ResponseChoice2__><__ResponseChoice2__></__ResponseChoice3__><__ResponseChoice3__></__ResponseChoice4__><__ResponseChoice4__>PCGUI.MainWindow::MainWindow.ExitPCGUI.IDR_TRAY_MENU.ID_OPENPCGUI.IDD_ACTIVEGIALOG.IDC_STATIC_ACTIVE_LIST_HEADINGPCGUI.CScreenShare::UpdateAttendeeList.HostPCGUI.PLoginDialog::OnInitDialog.JoinPCGUI.MainWindow::MainWindow.AboutPCGUI.BUTTON.REMOVEOpenATTENDEE_CONTROL_DIALOG User Type: %d, iChangedUserType = %dMainFrame::UpdateGUIOnUserTypeHOST_CONTROL_DIALOG User Type: %dMainFrame::UpdateGUIOnUserType.HOST_BECOME_VIEWERMainFrame::UpdateGUIOnUserType.HOST_BECOME_PRESENTERATTENDEE_CONTROL_DIALOG User Type: %dMainFrame::UpdateGUIOnUserType.ATTENDEE_BECOME_VIEWERMainFrame::UpdateGUIOnUserType.ATTENDEE_BECOME_PRESENTERMainFrame::UpdateGUIOnUserType.ATTENDEE_BECOME_HOSTMainFrame::UpdateGUIOnUserType.HOST_BECOME_ATTENDEEPCGUI.PhysicalGUI::ProcessMessage.WantControllerPermissionPCGUI.PhysicalGUI::ProcessMessage.RequestControllerPCGUI.PhysicalGUI::ProcessMessage.WantPresenterPermissionPCGUI.PhysicalGUI::ProcessMessage.RequestPresenteriCameraDisplayFormat = %d, iUserType = %d m_bVideoDetached = %d, m_bNoWebcamAvailable = %dMainFrame::OnUpdateWindowPositionTurboMeeting.exeCMD_BYPASS_PRESENCE: sCommand = %sMainFrame::ExecuteCommand()Failed CMD_BYPASS_PRESENCE. sCommand = %sPCGUI.IDD_ASSIGN_PRESENTER_DIALOG.WindowTextPCApplicationSharingMonitor::GetApplicationList.StayWithHDPCGUI.PControlPanelWnd::CreateButtonControls.BecomePresenterPCGUI.PSliderDialo
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E44DDF cpuid 0_2_00E44DDF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoEx,GetLocaleInfoW,0_2_00E2F81B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00E66014
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetLocaleInfoW,0_2_00E66264
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00E6638D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetLocaleInfoW,0_2_00E66494
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00E66567
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: EnumSystemLocalesW,0_2_00E5D13C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: GetLocaleInfoW,0_2_00E5D78F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00E65C29
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: EnumSystemLocalesW,0_2_00E65EEC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: EnumSystemLocalesW,0_2_00E65EA1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: EnumSystemLocalesW,0_2_00E65F87
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoEx,GetLocaleInfoW,4_2_00CD5FAF
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_00D0051B
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: EnumSystemLocalesW,4_2_00D007BD
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: EnumSystemLocalesW,4_2_00D008A3
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: EnumSystemLocalesW,4_2_00D00808
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_00D0092E
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetLocaleInfoW,4_2_00D00B81
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_00D00CA7
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetLocaleInfoW,4_2_00D00DAD
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00D00E7C
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: EnumSystemLocalesW,4_2_00CF7731
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: GetLocaleInfoW,4_2_00CF7C53
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMSetup.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\tm_starter_dir\rsp1024hcmd.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeQueries volume information: C:\Users\user\AppData\Local\Temp\TMInstaller.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\rsp1024hcmd.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\rsp1024h.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MagDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Configure.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\Cache.xml VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SVEDetector.txt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E12320 GetSystemTime,0_2_00E12320
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E13110 GetModuleFileNameW,GetLongPathNameW,GetUserNameW,SHGetFolderPathW,_strstr,_strstr,SHGetFolderPathW,SHGetFolderPathW,GetTempPathW,GetLongPathNameW,SHGetSpecialFolderPathW,SHGetFolderPathW,GetLongPathNameW,GetLongPathNameW,SHGetFolderPathW,GetLongPathNameW,0_2_00E13110
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E62425 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00E62425
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exeCode function: 0_2_00E172E0 GetVersionExW,GetVersionExW,GetVersionExW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,0_2_00E172E0
Source: C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exeCode function: 4_2_00CA1840 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,4_2_00CA1840
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
1
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Service Execution
1
DLL Search Order Hijacking
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol1
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt11
Windows Service
1
DLL Search Order Hijacking
2
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
DLL Side-Loading
NTDS34
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
Windows Service
1
DLL Search Order Hijacking
LSA Secrets131
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Process Injection
1
File Deletion
Cached Domain Credentials3
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
Registry Run Keys / Startup Folder
1
Masquerading
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427767 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 18/04/2024 Architecture: WINDOWS Score: 32 49 support.lockwoodbroadcast.com 2->49 57 Multi AV Scanner detection for submitted file 2->57 9 SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe 57 2->9         started        signatures3 process4 dnsIp5 51 support.lockwoodbroadcast.com 8.18.62.6, 443, 49706, 49707 GMCRUS United States 9->51 33 C:\Users\user\AppData\...\TMLauncher.exe, PE32 9->33 dropped 35 C:\Users\user\AppData\Local\...\vistafunc.dll, PE32 9->35 dropped 37 C:\Users\user\AppData\Local\...\jsproxy.dll, PE32 9->37 dropped 39 12 other files (none is malicious) 9->39 dropped 13 TMLauncher.exe 5 50 9->13         started        file6 process7 file8 41 C:\Users\user\AppData\...\TurboMeeting.exe, PE32 13->41 dropped 43 C:\Users\user\AppData\...\vistafunc.dll, PE32 13->43 dropped 45 C:\Users\user\AppData\Roaming\...\jsproxy.dll, PE32 13->45 dropped 47 16 other files (none is malicious) 13->47 dropped 61 Deletes itself after installation 13->61 63 Enables network access during safeboot for specific services 13->63 65 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 13->65 17 TurboMeeting.exe 9 12 13->17         started        signatures9 process10 file11 27 C:\Users\user\AppData\...\TM1713420902.dll, PE32 17->27 dropped 53 Found string related to ransomware 17->53 55 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 17->55 21 TurboMeeting.exe 4 17->21         started        25 TurboMeeting.exe 4 17->25         started        signatures12 process13 file14 29 C:\Users\user\AppData\...\TM1713420903.dll, PE32 21->29 dropped 59 Found string related to ransomware 21->59 31 C:\Users\user\AppData\...\TM1713420905.dll, PE32 25->31 dropped signatures15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe5%ReversingLabs
SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe8%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\tm_starter_dir\InstallService.exe4%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\InstallService.exe2%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarter.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarter.exe3%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarterXP.exe3%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\PCStarterXP.exe3%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\Sss.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\Sss.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMDownloader.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMDownloader.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMInstaller.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMInstaller.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMRemover.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMRemover.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMResource.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMResource.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMService.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMService.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\TurboMeeting.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\dbghelp.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\dbghelp.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\jsproxy.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\jsproxy.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\tm_starter_dir\vistafunc.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\tm_starter_dir\vistafunc.dll0%VirustotalBrowse
C:\Users\user\AppData\Roaming\TurboMeeting\PCStarter.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\TurboMeeting\PCStarter.exe3%VirustotalBrowse
C:\Users\user\AppData\Roaming\TurboMeeting\TMInstaller.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\TurboMeeting\TMInstaller.exe0%VirustotalBrowse
C:\Users\user\AppData\Roaming\TurboMeeting\TMLauncher.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\TurboMeeting\TMLauncher.exe0%VirustotalBrowse
C:\Users\user\AppData\Roaming\TurboMeeting\TMRemover.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\TurboMeeting\TMRemover.exe0%VirustotalBrowse
C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420902.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420902.dll0%VirustotalBrowse
C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420903.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\HookDLL\TM1713420903.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.sectigo.com00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
https://sectigo.com/CPS0C0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
support.lockwoodbroadcast.com
8.18.62.6
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://support.lockwoodbroadcast.com/as/wapi/get_client_size?client_type=0&xml_format=Y&client=pc&myrand11262017=fsOpyNl7RRDmyVQ8cYMYTocPl4347283&rdm=1713420883false
      high
      https://support.lockwoodbroadcast.com/as/wapi/get_client?client_type=0&client=pc&myrand11262017=1s4z4AVItfvg3fyyYjjDdD6L2c347284&rdm=1713420884false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.rhubcom.comRHUBSecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000000.1422829262.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
          unknown
          http://%s:%d/MeetingRegistration/user/update-meeting-info.php?sp=%sTurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
            low
            http://ocsp.sectigo.com0SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://support.lockwoodbroadcast.com/as/wapi/get_client_size?client_type=0&xml_format=Y&client=pc&mSecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476645003.0000000000513000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://support.lockwoodbroadcast.com/as/wapi/get_client?client_type=0&client=pc&myrand11262017=1s4zSecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1477353524.00000000044D0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476116809.0000000000522000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476116809.000000000052B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476684834.0000000000522000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.rhubcom.com.TTurboMeeting.exe, 00000006.00000000.1496181175.0000000001A8A000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1525335027.0000000001A8A000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1555133297.0000000001A8A000.00000002.00000001.01000000.00000009.sdmpfalse
                  unknown
                  http://ocsp.thawte.com0TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sSecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://mail.google.com/mail/u/0/?view=cm&fs=1&tf=1&to&su=https://compose.mail.yahoo.com/?To=&Subj=(TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                    high
                    http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpfalse
                      high
                      http://%s/forumpost.php?euid=%s&cuid=%s&first_name=%s&last_name=%s&from_server_ip=%s&timer_id=%sPMaiTurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                        low
                        http://%s%shttp://%shttps://%s%shttps://%shttp://%s:%d%shttp://%s:%drhubcom.comgomeetnow.com.turbomeSecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1309749293.00000000022EF000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000000.1308753930.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmp, TMLauncher.exe, 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000000.1422829262.0000000000D10000.00000002.00000001.01000000.00000008.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1469995904.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpfalse
                          low
                          https://www.google.com/calendar/render?action=TEMPLATE&text=TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                            high
                            http://%s%shttps://%s%shttp://%s:%d%shttp://%s:%drhubcom.comgomeetnow.com.turbomeet.comgosupportnow.TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                              low
                              https://support.lockwoodbroadcast.com/SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000002.1476645003.00000000004E2000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://tools.ietf.org/html/draft-ietf-avtext-framemarking-07TurboMeeting.exe, 00000006.00000000.1494408085.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.0000000001802000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.0000000001802000.00000002.00000001.01000000.00000009.sdmpfalse
                                  high
                                  http://%s/forumpost.php?euid=%s&cuid=%s&first_name=%s&last_name=%s&from_server_ip=%s&timer_id=%sTurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                                    low
                                    http://%s:%d/MeetingRegistration/user/update-meeting-info.php?sp=%ssURLTurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                                      low
                                      http://crl.thawte.com/ThawteTimestampingCA.crl0TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://streams.videolan.org/upload/TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                                          high
                                          http://crl.thawte.com/ThawtePCA.crl0TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.rhubcom.TurboMeeting.exe, 0000000B.00000002.1573799950.000000001089C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://www.rhubcom.comTurboMeeting.exe, 0000000B.00000002.1573799950.0000000010859000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.rhubcom.com0TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://sectigo.com/CPS0CSecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe, 00000000.00000003.1476083142.00000000044F0000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1491770470.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471090996.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471056851.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000002.1500863372.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1456768403.0000000000F99000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471246256.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1470318717.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1475416215.0000000000F7F000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471373053.0000000000F8A000.00000004.00000020.00020000.00000000.sdmp, TMLauncher.exe, 00000004.00000003.1471840687.0000000002EC0000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000006.00000003.1499922106.00000000022EC000.00000004.00000020.00020000.00000000.sdmp, TurboMeeting.exe, 00000008.00000003.1507007095.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://compose.mail.yahoo.com/?To=&Subj=TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                                                    high
                                                    http://https://https://%shttp://%sPCGUI.CInviteAttendee_::OnInitDialog.JoinMessage2PCGUI.CInviteAtteTurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                                                      low
                                                      https://mail.google.com/mail/u/0/?view=cm&fs=1&tf=1&to&su=TurboMeeting.exe, 00000006.00000000.1494408085.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000006.00000002.3776134929.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000002.1524665016.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 00000008.00000000.1504992526.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000000.1530054819.00000000016C2000.00000002.00000001.01000000.00000009.sdmp, TurboMeeting.exe, 0000000B.00000002.1554384401.00000000016C2000.00000002.00000001.01000000.00000009.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        8.18.62.6
                                                        support.lockwoodbroadcast.comUnited States
                                                        32662GMCRUSfalse
                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                        Analysis ID:1427767
                                                        Start date and time:2024-04-18 06:24:11 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 11m 35s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:16
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Sample name:SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        Detection:SUS
                                                        Classification:sus32.rans.winEXE@9/98@2/1
                                                        EGA Information:
                                                        • Successful, ratio: 66.7%
                                                        HCA Information:
                                                        • Successful, ratio: 98%
                                                        • Number of executed functions: 121
                                                        • Number of non-executed functions: 232
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                        • Execution Graph export aborted for target TurboMeeting.exe, PID 7452 because there are no executed function
                                                        • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        TimeTypeDescription
                                                        08:15:40API Interceptor13628329x Sleep call for process: TurboMeeting.exe modified
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        GMCRUShttp://earnandexcel.comGet hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        http://bckonline.com/2018/12/21/orlando-brown-tells-dr-phil-that-he-has-four-kids-and-the-2-year-old-is-still-in-the-belly-video/Get hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        https://earnandexcel.com/blog/how-to-expand-columns-in-excel-multiple-tricks-to-resize-columns-rows/Get hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        http://winning.com.de/4LcLKX1386KvIx6mvpavrrenj4MMBOXAWOTDNDYZC32415IMVO1140976R30Get hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        http://evvitteponn.info/Get hashmaliciousHTMLPhisherBrowse
                                                        • 8.18.47.7
                                                        http://zarabidarix.xyz/4kKUDf2271ibnX494fplpivknze26JVIISAKNWCQFBYE13955JAYA338314o10Get hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        https://xsetlp3sattty7yhmls.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                        • 8.18.47.7
                                                        https://attwebupdate.w3spaces.com/Get hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        https://www.bsnews.it/2015/01/23/le-citta-piu-brutte-d-italia-brescia-al-nono-posto-in-classificaGet hashmaliciousUnknownBrowse
                                                        • 8.18.47.7
                                                        https://ioa.pages.dev/account/js-reporting/?crumb=uZ4.07kERLI&message=javascript_not_enabled&ref=%2Faccount%2Fchallenge%2FpasswordIP:Get hashmaliciousHTMLPhisherBrowse
                                                        • 8.18.47.7
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        37f463bf4616ecd445d4a1937da06e19u2.batGet hashmaliciousBazar Loader, QbotBrowse
                                                        • 8.18.62.6
                                                        SecuriteInfo.com.Trojan.PWS.RedLineNET.9.27772.28937.exeGet hashmaliciousPhonk Miner, PureLog Stealer, VidarBrowse
                                                        • 8.18.62.6
                                                        file.exeGet hashmaliciousVidarBrowse
                                                        • 8.18.62.6
                                                        FACTURA2402616 - BP.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                        • 8.18.62.6
                                                        #U03a3#U03a5#U039c#U0392#U039f#U039b#U0391#U0399#U039f DEV8759-pdf.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                                        • 8.18.62.6
                                                        #U03a3#U03a5#U039c#U0392#U039f#U039b#U0391#U0399#U039f DEV8759-pdf.exeGet hashmaliciousGuLoaderBrowse
                                                        • 8.18.62.6
                                                        file.exeGet hashmaliciousVidarBrowse
                                                        • 8.18.62.6
                                                        S#U00d6ZLE#U015eME DEV8759 - pdf.exeGet hashmaliciousGuLoaderBrowse
                                                        • 8.18.62.6
                                                        CONTRACTUL DEV8759-pdf.exeGet hashmaliciousGuLoaderBrowse
                                                        • 8.18.62.6
                                                        1704202412475.EXE.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 8.18.62.6
                                                        No context
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:ASCII text, with very long lines (320), with CRLF, CR line terminators
                                                        Category:modified
                                                        Size (bytes):6985
                                                        Entropy (8bit):5.269451008958541
                                                        Encrypted:false
                                                        SSDEEP:192:83hauK3jd1jWTuv3D9m51I3Y3ahyrMOM3f:d9jXJDgrMT
                                                        MD5:DE0E9877AD98BB909A1BEA6B793E8085
                                                        SHA1:65CB35A68E64B365D93849F1A4EA49DC74B1DBC4
                                                        SHA-256:4DD69D08E3E95E9A2B492CA57695537BA31B563E61E2F2718967A6F9D15E88EE
                                                        SHA-512:3142F8FF343334BB58C162C3C2626B2D5D7DBBDB6D55681D41ACAD9D687C95361FCD763CB6062FBAE5B6B07A6C4492A27E90049CDA524A37106D263DFEB579DA
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:2024-04-18 08:15:02..Function: ClientInterface::Initialize..Line: 748..Message: Log is initialized: OS = Windows Windows 10, MU: 3072, m_iTimeZoneOffSet: 1, #CPU: 4, 64Bit: Y....2024-04-18 08:15:03..Function: ClientInterface::Initialize..Line: 769..Message: sSystemData = ..Computer: 358075..Computer IP: 192.168.2.7..OS: Windows 10 Professional (Build 9200)..IE: 9..IE Minor: 0..IE Build: 9....2024-04-18 08:15:03..Function: Client::Client..Line: 153..Message: m_sCurrentDirectory = C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting..m_sTempDirectory=C:\Users\user\AppData\Local\Temp\....2024-04-18 08:15:03..Function: Client::Client..Line: 212..Message: m_sClientVersion = 3.0.639....2024-04-18 08:15:03..Function: ClientInterface::Initialize..Line: 837..Message: g_uIdentity.m_sClientName = TurboMeeting....2024-04-18 08:15:03..Function: MyConfigure::DoInitialize..Line: 1942..Message: bNeedToBuildConfgureFileFromScratch = N....2024-04-18 08:15:03..Function: ClientInterface::Ini
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):10921003
                                                        Entropy (8bit):7.998395236086056
                                                        Encrypted:true
                                                        SSDEEP:196608:+8Qn9/JQ7jUMZDdu97ySHxCIS5E0UxK8EVQOSF0AIKTNhLa0uHumzHRi:dQ9R6PZDiyuCx2089EImKXN9mzxi
                                                        MD5:9BA492917815BBBFED9D8E6A0F77481B
                                                        SHA1:FD7827C336E58352F93B541F747F1681E5A761DF
                                                        SHA-256:3245EEC094B82600E78767AA0AE848596F77CFDF1B544590396B3CDDD370AD22
                                                        SHA-512:F3D0921E31669CAB1153D7DEB14C9E2A5776CAD47367AA29B03425E85B29BE1838A288CF664C92502A041901CB23282FDCAAB7DC511CE06B807C50A7E2ABE568
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:....ClientDatabase.......x..Xak.@..?.]....t........V.P....Z.....0.M..?8..7.......%M.\.&U.*......s.{.=/\......e....B.....*.<. .?.D.dB...#..}....I..}..&....%b.-..i...%G....7 _].`K.2.......z......p...c.......(..2.T...$C.!.Vt..c../.MU.WTT..n........kP.n`@...R..'...j.......R.K.i...0.`d..i.&..21.)_.K....?oN..0.2".n....F.....u....fi.B4eh[..b...c.a.....4..E1.tkm.-.:.}N..Lc:..X..eu....F.RK.R.e..,.mCs....2j....Q..N....F..BshdH.v.,..1.y...|.$C...(.,...Y4...[....`Wz..%.A.E.P.W5O.n.Tk}.nu.=.F.Q{H.Q##.d..c......_.>g.i....X.lfW..+.v....Q..J..|E%.j.0#.{{....e.5..D.k.St..K..d...D.$+-m.|/.)5.=g...N%.??.sp.&x.sp....?,..H_..~..]K........N._.N..G.;.'...,+.....}/.#B.....q}[L2.F.R............I.........#.PT....dbghelp.dll..u....x........{..e.F.;.AQ....QP.^.D. .d.]`q...E.j.z.........^..k.........Q...o2..3.3....>..yo......)999.$3c..DD....m..1......."!*w..R<.au....>in].j.Z8gQ.|..j.....Zu...j..u......5.}**J{.1.?..g}...'.]f;.....K.~]j......$..l.....A:.+H.C......x.y5.
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:ASCII text, with very long lines (320), with CRLF, CR line terminators
                                                        Category:modified
                                                        Size (bytes):7407
                                                        Entropy (8bit):5.273339854691407
                                                        Encrypted:false
                                                        SSDEEP:192:HtXaSQ3xT1/WBMvtx9k5fItyUGXyZnSRyH:ADxhNvNZn7
                                                        MD5:16523C11ED63772458D93F26A7B5E431
                                                        SHA1:76C6966E61F749144F5EAA35EE0C31708EDFD4ED
                                                        SHA-256:2FC44F3A9248FAEE527D3C5440CFAE5FB053D2A79A25664F5CC6E14CDD59034C
                                                        SHA-512:F80B1EA0834ACED4C990DDE071CA8C68C2D3F692790DFBD0C948A7FBB0038289088CE8E4E52B86E79964FA88034D9E47AB7D60FD1AE997B0AD900D69B87B7D1D
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:2024-04-18 08:15:05..Function: ClientInterface::Initialize..Line: 748..Message: Log is initialized: OS = Windows Windows 10, MU: 3072, m_iTimeZoneOffSet: 1, #CPU: 4, 64Bit: Y....2024-04-18 08:15:05..Function: ClientInterface::Initialize..Line: 769..Message: sSystemData = ..Computer: 358075..Computer IP: 192.168.2.7..OS: Windows 10 Professional (Build 9200)..IE: 9..IE Minor: 0..IE Build: 9....2024-04-18 08:15:05..Function: Client::Client..Line: 153..Message: m_sCurrentDirectory = C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting..m_sTempDirectory=C:\Users\user\AppData\Local\Temp\....2024-04-18 08:15:05..Function: Client::Client..Line: 212..Message: m_sClientVersion = 3.0.639....2024-04-18 08:15:05..Function: ClientInterface::Initialize..Line: 837..Message: g_uIdentity.m_sClientName = TurboMeeting....2024-04-18 08:15:05..Function: MyConfigure::DoInitialize..Line: 1942..Message: bNeedToBuildConfgureFileFromScratch = N....2024-04-18 08:15:05..Function: ClientInterface::Ini
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:ASCII text, with CRLF, CR line terminators
                                                        Category:modified
                                                        Size (bytes):10550
                                                        Entropy (8bit):5.302174498209266
                                                        Encrypted:false
                                                        SSDEEP:192:5coGqgT0/LzUTGeSd67kGfHLro9xA4LisS12ytFzuBS26L19bjXO:SFUEKeggSbJyLzzzO
                                                        MD5:5C6296E5BE4F76BCFE6EA1996AA9E7A0
                                                        SHA1:4D6ADBE26783828A97616B3B0C78B5A0647228A1
                                                        SHA-256:29C251040483EB6AC6EA593B416A24A1FF0C53788ABE3DCD8F6CCE948CABCCB1
                                                        SHA-512:A46CF61692AE1E684A0A0E5B51632E9AB156786CDCEECDA4CA63DB1F5A77DF190E6E4D41171AEF625E2A3BEB68906058394B2C81DAE3399A1ACA6147B16CF215
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:2024-04-18 06:25:31..Function: Utility::Initialize()..Line: 244..Message: AfxGetApp()->m_lpCmdLine = ..sCurrentDirectory = ....2024-04-18 06:25:31..Function: PCInstaller:Initialize()..Line: 286..Message: m_iInstallType = INSTALL_TYPE_INSTALL....2024-04-18 06:25:31..Function: Utility::GetUserDirectory()..Line: 304..Message: m_uIdentity.m_sClientName = ....2024-04-18 06:25:31..Function: Utility::GetUserDirectory()..Line: 4045..Message: sCurrentFilePath = C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe....2024-04-18 06:25:31..Function: Utility::GetUserDirectory()..Line: 4099..Message: bSystemUser = false, sUserApplicationDirectory = C:\Users\user\AppData\Roaming....2024-04-18 06:25:31..Function: Utility::GetUserDirectory()..Line: 4174..Message: sStartMenuDirectory = C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TurboMeeting....2024-04-18 06:25:31..Function: Utility::GetUserDirectory()..Line: 4176..Message: sCurrentDirectory = C:\Users\fr
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):10999
                                                        Entropy (8bit):5.354822431521058
                                                        Encrypted:false
                                                        SSDEEP:192:61r10a1GITgCmFajw9ldycOX04oiwgwApdFwh/LYsICTBqX:ZYy3rC
                                                        MD5:14F345AD20B4141780311E2C6A2B463A
                                                        SHA1:825F9A9ED40A0F3AB3881CE1341828D8F5D7CB5C
                                                        SHA-256:191D90DBAD3E31A8527CD59801DA0CAC5BF2EE59548FD1AAFD3BBB337925AFA8
                                                        SHA-512:3FF227BD1E5A822B1949D63C8D38497A0A6CE074092BB0BBA0106C5FA9F34F63E2F814BFF155A27339D29510F67D149E5F50E676722A8E58B4C26ADBFED57A04
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:2024-04-18 08:14:43..Function: PCSetupApp::InitInstance()..Line: 143..Message: m_lpCmdLine = ....2024-04-18 08:14:43..Function: PCSetupApp::InitInstance()..Line: 159..Message: sCurrentFilePath = C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe....2024-04-18 08:14:43..Function: PCSetupApp::InitInstance()..Line: 181..Message: Valid sSetting....2024-04-18 08:14:43..Function: Utility::GetUserDirectory()..Line: 4045..Message: sCurrentFilePath = C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe....2024-04-18 08:14:43..Function: Utility::GetUserDirectory()..Line: 4099..Message: bSystemUser = false, sUserApplicationDirectory = C:\Users\user\AppData\Roaming....2024-04-18 08:14:43..Function: Utility::GetUserDirectory()..Line: 4174..Message: sStartMenuDirectory = C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TurboMeeting....2024-04-18 08:14:43..Function: Utility::GetUserDirectory()..Line: 4176..Message:
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:ASCII text, with very long lines (459), with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):15164
                                                        Entropy (8bit):5.342006981812532
                                                        Encrypted:false
                                                        SSDEEP:192:8OkaPD3UI1GaXvOK9P50IO52iUk/Rb8XrUmbl9lGQiO9k9H/eC2aCkWID:LTUm/zylklnG7Su8ID
                                                        MD5:DB805C29A0454736F6717658BBC8F2EE
                                                        SHA1:1A193DEBDD5C88E873D9C6BF4F0A19F413FBF42B
                                                        SHA-256:8A8B02474BD0A33922C424A3DE7A05F3F3339C78155056D17D1A6233828E2FBB
                                                        SHA-512:F30AF0533F5885FC4C79396A9BE926097D437C8BC089EF61E63C814A4EE83F518C5D8E8EBD1BC1A6B34E98CCA5FD17849A485D83BA3359666DD6884B8EFA3946
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:2024-04-18 08:15:02..Function: ClientInterface::Initialize..Line: 748..Message: Log is initialized: OS = Windows Windows 10, MU: 3072, m_iTimeZoneOffSet: 1, #CPU: 4, 64Bit: Y....2024-04-18 08:15:02..Function: ClientInterface::Initialize..Line: 769..Message: sSystemData = ..Computer: 358075..Computer IP: 192.168.2.7..OS: Windows 10 Professional (Build 9200)..IE: 9..IE Minor: 0..IE Build: 9....2024-04-18 08:15:02..Function: Client::Client..Line: 153..Message: m_sCurrentDirectory = C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting..m_sTempDirectory=C:\Users\user\AppData\Local\Temp\....2024-04-18 08:15:02..Function: Client::Client..Line: 212..Message: m_sClientVersion = 3.0.639....2024-04-18 08:15:02..Function: ClientInterface::Initialize..Line: 837..Message: g_uIdentity.m_sClientName = TurboMeeting....2024-04-18 08:15:02..Function: MyConfigure::DoInitialize..Line: 1942..Message: bNeedToBuildConfgureFileFromScratch = Y....2024-04-18 08:15:02..Function: MyConfigure::DoIniti
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9216
                                                        Entropy (8bit):2.198346257931369
                                                        Encrypted:false
                                                        SSDEEP:24:F+vdfet1NDbTBR2cXovYePne99KLzaRYJLHYLTYLSC3vDCeKLvd/9ziqeKLjpztl:ydfK2NY2IkfmrCp8YI3
                                                        MD5:180D45BE65098DA1E2D0F72795581C5D
                                                        SHA1:B4B90F594BF1B1A0603D28A6342CC2052BB010C8
                                                        SHA-256:C8A22EE90C0E0DB5877FD047EA957452D827A077C5A823C2FF6A0A3E6D421A52
                                                        SHA-512:F65A2667A5DBAEE134C7B744E60B9A442A72AE6EAD97501180DA0E1B058FE5F33864D9B91DAF2057C205DB46276AD4B15D8F8D4AF131C0C9B1A2EB5A90E32B01
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:GEX}`q4r.....T44.....@ .........................................................................9......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):233720
                                                        Entropy (8bit):6.298697976196144
                                                        Encrypted:false
                                                        SSDEEP:6144:KSJ0P6jSLEpJ1RZlR4lGitKd50fAOhso6iZGD:66jSLoJp4lGi4jID6iZA
                                                        MD5:CA2C90A15E0B8701A71B28E875865F35
                                                        SHA1:319C1961F05D1D6C31984D141B91B870DC0B1EFA
                                                        SHA-256:7AEECEDC2D37BD3AD549851121CCFED9B9D62285DB474735998C8EA741DCA867
                                                        SHA-512:AC3CB38535A0D48B5EA14EC89868FDF9B5EEA0BBC51ED11D59FF83FC43A5286AA67E7F5896434200CB0C615270DC6A1BA4F901C0CFF6A79FA6A8B9D913872F31
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 4%
                                                        • Antivirus: Virustotal, Detection: 2%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........k.~8.~8.~8..}9.~8..{9p.~8..z9.~8..}9.~8..{9.~8..z9.~8...8.~8..8u.~8_.{9..~8_.8.~8_.|9.~8Rich.~8........................PE..L.....1`.............................E............@.................................5.....@.................................D...x....................Z...6......@...0...T...............................@............................................text............................... ..`.rdata..............................@..@.data............b..................@..._RDATA.. ....p......................@..@.rsrc................8..............@..@.reloc..@........ ...:..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):786984
                                                        Entropy (8bit):6.461738695456927
                                                        Encrypted:false
                                                        SSDEEP:12288:8Np51L0Z775xs2qnf8PtVXJSLKlK4pKJe5d0nocsxa3k48118t/HY4EErtkTd2hM:6JL0Z/mnet60yocssl8gY4hkTd2hCM+
                                                        MD5:C28568A1EB37159185590BCCF20F9866
                                                        SHA1:DFE01651DA872470E686C2BE78400C80C98FA450
                                                        SHA-256:ED500E8A0B1260F47EF142B06CF08AF8719D003F227C5EF48DD0166C6456D941
                                                        SHA-512:476324F2E9BA91053145A77D36D26020318EE12F336D056861D9556E989771D134FF65BFA18F5090419DA131B082A711635C0E37592551AF25E0BD0575C14F9C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 3%, Browse
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......I.A.../.../..././.,..././.*.././.+.../....../....../....../._.+.../._.,.../.<..)./._.*.../...+.../....../......./...*.../....../......./...-.../.Rich../.........PE..L.....{_.................z..........3;............@......................................@.....................................@....P..0...............(....@......[..T....................\......H\..@...............`............................text...!x.......z.................. ..`.rdata...s.......t...~..............@..@.data...0,..........................@..._RDATA.. ....@.......t..............@..@.rsrc...0....P.......~..............@..@.reloc......@.......b..............@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):785584
                                                        Entropy (8bit):6.4611685242844645
                                                        Encrypted:false
                                                        SSDEEP:12288:YNp51L0Z775xs2qnf8PtVXJSLKlK4pKJe5d0nocsxa3k48118t/HY4EErtkTd2hf:eJL0Z/mnet60yocssl8gY4hkTd2hCMl
                                                        MD5:8CE1DC1E87F955F2529CA7A796AD8820
                                                        SHA1:9A51C28787D5AD0363DC33FCBCEDD3995F855482
                                                        SHA-256:27773D79B0AE6A473909434BF72642C2098B649F4033139BC06C274ADA88E3BE
                                                        SHA-512:D40A82436183802F31E492D2C14CA4B3559EDC24975DD937BBF6A7588F6595C24DD67B417CD109AAEED49DFBA6319AA575047386BC08A859D5DBE8FD7DF75941
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                        • Antivirus: Virustotal, Detection: 3%, Browse
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......I.A.../.../..././.,..././.*.././.+.../....../....../....../._.+.../._.,.../.<..)./._.*.../...+.../....../......./...*.../....../......./...-.../.Rich../.........PE..L.....{_.................z..........3;............@.................................n.....@.....................................@....P..0....................@......[..T....................\......H\..@...............`............................text...!x.......z.................. ..`.rdata...s.......t...~..............@..@.data...0,..........................@..._RDATA.. ....@.......t..............@..@.rsrc...0....P.......~..............@..@.reloc......@.......b..............@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):89192
                                                        Entropy (8bit):6.575566498006661
                                                        Encrypted:false
                                                        SSDEEP:1536:3D+xbSVMbhA4oCpgk5czAwxNmO5fkHy3hG:3DavbjslxNmO5fE
                                                        MD5:E0861D6F2836555E2C1E5F223234A9F1
                                                        SHA1:C2F9C1B8EB85722B5EF83E080C78D5E378CB5210
                                                        SHA-256:84F0B260E146D07F0BE5A0C61CABCAEFE5288850A707F073B5EBC8FAAEC408C5
                                                        SHA-512:04F7D3943E49A54D45ABE55EE93DE1772A5C1183A994DB521A9234C0B21D0211CADDB2968B2B3C4E922E50DB328CC4402043FF30B3E9CE5A69A18F6B31347C46
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o.d.+...+...+....4w.;....4d......4g.O....4q.&...+...Z....4x.(....4p.*....4r.*...Rich+...........................PE..L...@s.O.....................P......o.............@..........................0.......f............................................... ..............0'..85..............................................@............................................text............................... ..`.rdata..v,.......0..................@..@.data...|,..........................@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):380152
                                                        Entropy (8bit):6.523803406973679
                                                        Encrypted:false
                                                        SSDEEP:6144:2D5CTBgdxPf1wwbe0HZKfjhsjYwAwzxOl4GYlOhwK09Y+066zNvGC5GJAOktkTBZ:2MTBgdxXKwq0HZKfjhQYwz2iY+azNeCw
                                                        MD5:BA7323CFA2E6B7A11E61E5C8621141CF
                                                        SHA1:BB49041C3257CE0A159C3AA49D0FCFF093A24921
                                                        SHA-256:0C4F996D1AA194951D756DE74514F7A1D03F68270E33F3C7E7B5DCF262885166
                                                        SHA-512:19ABBD2F944BDCFB1770B31537206AD3610BCFE566CA25E23E172C14F17575E04A13C10CD08B8FB202515D43237504A341046E9EB7D34410B07F370DE282BE9A
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............iI..iI..iI..jH..iI..lHS.iI..mH..iI.-.I..iI..jH..iI..lH..iI..mH..iI0.mH..iI..hIL.iI...I..iI0.lH..iI0.I..iI0.kH..iIRich..iI........PE..L.....Z`..........................................@..........................`...........@.................................D........ ...................6...0.../......T...............................@...............8............................text............................... ..`.rdata..pV.......X..................@..@.data............h..................@..._RDATA.. ............Z..............@..@.rsrc........ .......d..............@..@.reloc.../...0...0...f..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):688888
                                                        Entropy (8bit):6.576995195781194
                                                        Encrypted:false
                                                        SSDEEP:12288:UUYb14nVcVw3h4sj2w2QE2uSBlK4bLgyQVW8Xgp1IW6ce+dFqtkTHz+Lqh/:UYnVcV9Y2wFBJF8Xgpm+e+dwkTTJh/
                                                        MD5:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        SHA1:5229D88A9E650430719DC5317F8F7601117EF637
                                                        SHA-256:11B64793473C88AA0EF2F9BDE703E9494495029D416E76D954FD3F044EF8FC10
                                                        SHA-512:7D898F74D292C23D8F38A29C2C3D8C2E8F6D610C2CCA5B89B5273222A6E31DB078C266A25C4072533DB4F907BA4F3FC700E020A4E7EBD4FBB4D4EA13D0FAA0A3
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........[^...^...^...J...N...J.......J...H......._...W.L._.......}.......B...o.5.N..........W.K.T.......W...^......W.[.........O.....7._......._...Rich^...........PE..L.....Z`.....................Z......x.............@..........................p......}.....@..................................N..,....................L...6.......l......T...............................@............................................text...3........................... ..`.rdata..8o.......p..................@..@.data....n...p...|...V..............@..._RDATA.. ...........................@..@.rsrc...............................@..@.reloc...l.......n..................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):688888
                                                        Entropy (8bit):6.576995195781194
                                                        Encrypted:false
                                                        SSDEEP:12288:UUYb14nVcVw3h4sj2w2QE2uSBlK4bLgyQVW8Xgp1IW6ce+dFqtkTHz+Lqh/:UYnVcV9Y2wFBJF8Xgpm+e+dwkTTJh/
                                                        MD5:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        SHA1:5229D88A9E650430719DC5317F8F7601117EF637
                                                        SHA-256:11B64793473C88AA0EF2F9BDE703E9494495029D416E76D954FD3F044EF8FC10
                                                        SHA-512:7D898F74D292C23D8F38A29C2C3D8C2E8F6D610C2CCA5B89B5273222A6E31DB078C266A25C4072533DB4F907BA4F3FC700E020A4E7EBD4FBB4D4EA13D0FAA0A3
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........[^...^...^...J...N...J.......J...H......._...W.L._.......}.......B...o.5.N..........W.K.T.......W...^......W.[.........O.....7._......._...Rich^...........PE..L.....Z`.....................Z......x.............@..........................p......}.....@..................................N..,....................L...6.......l......T...............................@............................................text...3........................... ..`.rdata..8o.......p..................@..@.data....n...p...|...V..............@..._RDATA.. ...........................@..@.rsrc...............................@..@.reloc...l.......n..................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):228600
                                                        Entropy (8bit):6.309001563878647
                                                        Encrypted:false
                                                        SSDEEP:6144:MQyEgGJDxpO0ZTXmcANoEEZwBXcAOBXCs9:MQiGJDxpO0ZTXrWcPCm
                                                        MD5:F7A57D58DE9E992509F28477D85EA442
                                                        SHA1:48747FE9CA9D804110462FBEBCC13F4519230443
                                                        SHA-256:B660B3F98E2C45770AF8421E75D7CF7AF71BD7AF8A30EFD4091E75F4D664B2B3
                                                        SHA-512:C12118B16E606CAC969B30462EB0AF501AC7E53A1DFC6BC0635AE3E6C62AA659085DCF19E499F874141CCEBC15245246BCBFA7BA15ECDF5148884A6599B737C8
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........*.E~D.E~D.E~D.Q.G.J~D.Q.A.~D.Q.@.S~D...G._~D...A.~~D...@.g~D.E~E..~D.L...J~D...A.M~D.....D~D.E~..D~D...F.D~D.RichE~D.........................PE..L.....Z`.............................E............@.......................................@.....................................d....`..p............F...6...p..,...@...T...............................@............................................text............................... ..`.rdata..d...........................@..@.data....y.......d..................@..._RDATA.. ....P......................@..@.rsrc...p....`......."..............@..@.reloc..,....p.......(..............@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):99064
                                                        Entropy (8bit):6.4536950605419445
                                                        Encrypted:false
                                                        SSDEEP:1536:6SlMHB4rjEkU0TzZsURSuu8rsWlcdbbr4ndQeR4Xj3h8bS:6xerjU0TzZQlfbAJDbS
                                                        MD5:DD12C30E38FD57D25CD75B07E679330B
                                                        SHA1:00C725161356A75121A393F8615641DA10EDA4C6
                                                        SHA-256:0C168E4E9AEA222BBCB4EEC3E61FA72B528F7276492FA4BACAE029241B3808EB
                                                        SHA-512:8555D52DEA80903B5333E94697A0A26DBC0A0FAEF5E833C030C1D45D4BD300219193D7124A4B7E8B8E9FEFDC862B1B8433610AC703149ADD39BFBC0B49264160
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w%...K...K...K..}H...K..}N.n.K..}O...K..~N...K..~O...K..~H...K..n...K...J...K.C.N...K.C.K...K.C.....K......K.C.I...K.Rich..K.........PE..L.....Z`...........!.................................................................W....@.................................0...<....@..h'...........L...6...p..........T...........................8...@............................................text...7........................... ..`.rdata..~X.......Z..................@..@.data........ ......................@....rsrc...h'...@...(..................@..@.reloc.......p.......>..............@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):365304
                                                        Entropy (8bit):6.394569981481964
                                                        Encrypted:false
                                                        SSDEEP:6144:L15MyaGTrkrrNsg2OVHdlpIuGeqjPINDerbQ9mErScI0ILd+AOIkTBXvXvi:LjMyaGTrbgJVHdlpIuPqjeDHQd+WkTZK
                                                        MD5:26AC20E2F474AC15E0785770931001C3
                                                        SHA1:2BB6CC026B7766D2BACF71E257836771DD8EA462
                                                        SHA-256:2A8A64EBBFBFFDA40DB3EB7F6DD9EFAB0143818637914B6246FBA81D938FA897
                                                        SHA-512:C8669A17D1F4CE7C49325905FC3632FAA420835C775196B6346252BD3F354B86E96EEECCFD1D654F278111F72F61E038D45944BBE8AF75715C650039434644CF
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n..@...@...@...Td..O...Td......Td..V....a.A....g..Z....g..b....g..~....f..F...@.......Iw5.U....f..K....fY.A....f..A...Rich@...........................PE..L...d.Z`.................B...................`....@..........................0......9.....@.................................@........................\...6..............T...............................@............`..........@....................text....A.......B.................. ..`.rdata..<S...`...T...F..............@..@.data...............................@..._RDATA.. ............ ..............@..@.rsrc................*..............@..@.reloc...........0...,..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):113400
                                                        Entropy (8bit):6.717039641153143
                                                        Encrypted:false
                                                        SSDEEP:1536:rBZE+BiaIZbzwd3xHqouKOvjFC5siqiF2Cml9wsW5cdYP0ipZnlBpV2q73hG8:rfPBevwdBHqouK2OF2fxYPhpZnlBpVQ8
                                                        MD5:DFC9A458625B2095D18A17FF37EEDE74
                                                        SHA1:7B397E54EB28167DBA481B0AE6A64D8B72A24DCA
                                                        SHA-256:AE13B7B55095775805A2A2D0AB8DD224678B1F08556252431107A9F3AA3A0FF3
                                                        SHA-512:6B027EA5AE8BF21ACEC150D9B56C9FA8579E2F3BF357F17BF3ED08E9D2C37C3D194FDB4207A04D9B3E2FE700A6660AD28B9655E40764A78951EC312878660C92
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........M..AM..AM..A.,>AG..A.,<A;..A.,=AU..A...@Q..A...@B..A...@_..AD.\AH..AM..A,..A...@O..A...@L..A..0AL..A...@L..ARichM..A................PE..L.....Z`...........!......................................................................@.........................`u......Hv..<........................6......,....m..T............................n..@...............<............................text...+........................... ..`.rdata..`m.......n..................@..@.data................f..............@....HookSha.............n..............@....rsrc................p..............@..@.reloc..,............r..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):18097912
                                                        Entropy (8bit):6.861983414670908
                                                        Encrypted:false
                                                        SSDEEP:393216:vpxpeembSbs3WKtQ3qitDvUgGxbt9pJFFZm/C:YembH5tMqpgGxbt9pB
                                                        MD5:D973EE70262ADF0A3D8AC412964517F9
                                                        SHA1:5EFF4B9800B66D63213162E7BB009928F86DDBFD
                                                        SHA-256:BD69CC4974617A01D2759AAB58CDDE4AF9199B8102E325178C2AE043E6783E28
                                                        SHA-512:931152E6FE92E58F22EAB65CC693C69736238333078BFEDD294E2D7A547EA6A0179281DB37395C52558A09DEFE48E35AB927539D2A425D0B2587B15FACB271C7
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$..........W......................7..........]S/................................W...T.......`.......................l..............{......k.......&.....f.........C.....f.......f.......f...............f.......Rich....................PE..L.....Z`.....................xk.....l.X...... ....@...........................*..........@.................................<.............&..............6...p".4H.. ...T...................t.......8I..@............ ..h...P...`....................text............................. ..`.rodata.@.......................... ..`.rdata..d.$.. ....$.................@..@.data....U...@......................@..._RDATA..............................@..@.rsrc.....&.......&.................@..@.reloc..4H...p"..J..................@..B................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1229112
                                                        Entropy (8bit):6.534748097696273
                                                        Encrypted:false
                                                        SSDEEP:24576:Z5iAmT4V1XZv3lY0XdaqaYxzxYjievUibP4:t6sc2zxYWLh
                                                        MD5:CC17AE159E28D331B7EC39A4F34527F2
                                                        SHA1:68BACD3808895DB9987F11B63C857E288E022C17
                                                        SHA-256:4BBAE6B52A99355E7C695D901151513235E5B0BF01FF8D5345580D6529763B78
                                                        SHA-512:A5BC90DACD81C278ED4BB3BF862AF1406B4C704845C3F5BE7F0927D4350DA790B7A9FD98E774DEAF5A5004251C45C558EEDE1F797B842E305FBFB6CE8D4A9DE5
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................7.f....7.g....6.d..........6.b....6.f....6.g...6.c....6.z....".....6.`....6.e....Rich...........................PE..L...?.JT...........!.....d...........c.......................................@.......S....@A........................pZ..s....B..P....p..................85......h....<...............................J..@............@.......Z..@....................text....c.......d.................. ..`.data............H...h..............@....idata..f....@......................@..@.didat.......`......................@....rsrc........p......................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):98734
                                                        Entropy (8bit):6.213205562122042
                                                        Encrypted:false
                                                        SSDEEP:1536:+JVl8XN4NaW1f4RbY9xf72f6bycIuf/hkBzmoRrHv7jF35Pm:WNaAf2JueR5O
                                                        MD5:E19C646DDC1E5B7AF92280538A863E04
                                                        SHA1:4C87C7FB61DBC211C80A44928E6D121E55BDC929
                                                        SHA-256:4E51C94EED094DC6A0D895366750C80B71F5270A3FC96DD9B8047A85C87D40A7
                                                        SHA-512:CB3D2CB4921EDDC12C49248C54712E503D304F4830DD528F66F45FE986F2C08A49F7C1FF244E470875843DCD99AC0D8B2D1393BF1AA8636435E96171F61401F3
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..PCGUI.PBindToWiFiCameraDialog::OnInitDialog.BindToWiFiCamera...APP...WiFi.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step1.1.............WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step2.2.......WiFi........WiFi...SBC_xxx.........11118888.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step3.3..........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.StartToBind........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.WiFiCameraBindFailedMessage..APP.......................WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Chang
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):98737
                                                        Entropy (8bit):6.215204537239651
                                                        Encrypted:false
                                                        SSDEEP:1536:2UTro5Z6TEq4scziYJT5zObw/+6BflWS+zgqmIWbdKh7lBn1Mzhq/z:2/OEZNiQJ//YSQBWEB1MNyz
                                                        MD5:B34E838E74870B3094DA1DB18FEC92EA
                                                        SHA1:4414DC5F71FACCED09700C12769E61674574ACC7
                                                        SHA-256:3C34B2B116B9017826EB48CF6A6F44EC134FC36F07AD9171B233AC2DC0BFDF34
                                                        SHA-512:F2B81CB346AC3E5296B497FF2E86FC2A12B0875DA8FABA4F6488DAE7AE8720FD86BC50B4DA00E6B17ADF05385A7546E420CAE662A843870B68DB8F7649CA1AC4
                                                        Malicious:false
                                                        Preview:.ItemID.Item.File..PCGUI.PBindToWiFiCameraDialog::OnInitDialog.BindToWiFiCamera...APP...WiFi.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step1.1.............WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step2.2.......WiFi........WiFi...SBC_xxx.........11118888.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step3.3..........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.StartToBind........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.WiFiCameraBindFailedMessage..APP.......................WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Ch
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (548), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):100703
                                                        Entropy (8bit):5.124902678296755
                                                        Encrypted:false
                                                        SSDEEP:1536:+Wb9wI5cfMI/1caAp3PNlYJbNW4fryglWFTNNP1cAZJeYt:+AXBfNNLpt
                                                        MD5:FFC94815BCC52593E591F1DB945DA142
                                                        SHA1:09FD651AD0316F616374809EE23548ACAAB8E0E6
                                                        SHA-256:85A9060D5370A433A147483EA8CD5129D6B77D3FC6C85861BE43E51C83FBB082
                                                        SHA-512:1CC917DE72F7900BAA6E56CF7984EDCC0A9122B77C7C9FC05507D86F87A82827EAED9B58385075CBA9EB6C9E18E7CF44F5339F6F616BD0985F607EF80FB4E7BB
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Scherm delen stoppen...IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.U deelt het scherm...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Maak verbinding met een Bluetooth-apparaat en probeer het opnieuw...UserObject.*.new_meeting_flooded.Er worden te veel nieuwe vergaderingen gemaakt. Gebruik geplande permanente vergaderingen om nieuwe vergaderings-ID's te verminderen....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Sta kijkers toe om te vragen om hun bureaublad te presenteren...GUI::EmailInvitation.OneTapDial.Met ..n tik op de knop...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Je verbinding met de sessie is niet stabiel. Kies een ander netwerk (bijv. Bekabelde verbinding), mobiel apparaat of computer. Doe dan opnieuw mee aan de sessie....MyLogSink::OnLogMessage.StopPhoneCall.De audio-apparaten worden
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (549), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):100929
                                                        Entropy (8bit):5.147580502649148
                                                        Encrypted:false
                                                        SSDEEP:1536:ia4RZIsFlmecKeJYPXI6QhI4LIskWWP1A8/qLb21sakNAEsKq:idpl+KWUUK1KAEsKq
                                                        MD5:822E31DFDFCB95A50B6D28DF87608CD6
                                                        SHA1:9C811ADE35B8F0B7C4B6F69861755539499F10F4
                                                        SHA-256:4A1F173B90493324698E29F089D829D0F6FAAAA728405EBFF602D86D72B77BA6
                                                        SHA-512:A37824FEEC7C3CA968E2DE2C36D213E662C1063D624534E1C420E8F3AD03C0285B6674858C8D6E5C0B7F6D74515F9E21FD01BBCC1E67BFD843F200C568FBCA4E
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..PCGUI.PBindToWiFiCameraDialog::OnInitDialog.BindMessage.Steps to bind this App to a WiFi camera...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.ChangeMessage.You can change the binding by the steps below...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.RemoveBinding.Remove binding...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.ChangeBinding.Change binding...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.WiFiCameraBindFailedMessage.The App failed to bind to the camera. Check if this mobile device has connected with the camera.s WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.StartToBind.Start to bind...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step3.3. Click the binding button...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step2.2. Go to your mobile WiFi settings. Select the camera's WiFi name "SBC_xxx" and input password "11118888"....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step1.1. Power on the camera and start the camera's WiFi....PCGUI.PBindToWiFiCameraDialog::On
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (640), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):110287
                                                        Entropy (8bit):5.212768658752966
                                                        Encrypted:false
                                                        SSDEEP:3072:B91DfrgmvCPrPalKTebn+Hphc2C0OK5nOL4:B91DfrgmvCzPalKTebnkPc2C0OK5nO0
                                                        MD5:9F9EFFC7E14CFEF695D97BA63D261341
                                                        SHA1:15B649B698ACD53963E3442348EBC729A04B857C
                                                        SHA-256:6F773A3B38D8CE1F077A53655F221559BF36F0A2E5611723167028DE759FB45A
                                                        SHA-512:96193D061C8C92AED1124CF4577A1242A5B0ED4A45176CDBB22486277FC1B9E88896A825C5135C05014ECDF0A1659ECAB079E877F3C9B003CC8588793810FD41
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Arr.ter le partage d'.cran...IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Vous partagez l'.cran...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Veuillez vous connecter . un appareil Bluetooth et r.essayer...UserObject.*.new_meeting_flooded.Trop de nouvelles r.unions sont cr..es. Veuillez utiliser les r.unions permanentes planifi.es pour r.duire les nouveaux ID de r.union....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Autoriser les spectateurs . demander . pr.senter leur bureau...GUI::EmailInvitation.OneTapDial.Une touche de num.rotation...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Votre connexion . la session n'est pas stable. Veuillez choisir un autre r.seau (par exemple, une connexion filaire), un appareil mobile ou un ordinateur. Rejoignez ensuite la session....MyLogSink::OnLog
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (554), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):106207
                                                        Entropy (8bit):5.183805880890507
                                                        Encrypted:false
                                                        SSDEEP:1536:aJjLa8C/+uYoh4kVzmosbCsYJYT8T1BN4UO4m5Bz2JvIxh7tGTvpc:wINVP+OJWhM6
                                                        MD5:9AD8EDBE48A03EA9F026A63D1950F59C
                                                        SHA1:D4CFB9555DDA08DC2582B18C54CED31282F7602E
                                                        SHA-256:326816125FA54D4A09723807EF47884241B3513E8A52F42CAD66AC177E040A6D
                                                        SHA-512:E358C2B7A9827D14A8DED104F79A613C765042A016073FE166E40BBD0500EC0D129169180FA3F3745635378DBF4F9E7903F812B2EE9C8A713A9EBAF3F9211CFE
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Beenden Sie die Bildschirmfreigabe...IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Sie teilen den Bildschirm...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Stellen Sie eine Verbindung zu einem Bluetooth-Ger.t her und versuchen Sie es erneut...UserObject.*.new_meeting_flooded.Es werden zu viele neue Besprechungen erstellt. Verwenden Sie geplante permanente Besprechungen, um neue Besprechungs-IDs zu reduzieren....PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Su conexi.n a la sesi.n no es estable. Elija una red diferente (p. Ej., Conexi.n por cable), dispositivo m.vil o computadora. Luego vuelve a la sesi.n....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Erm.glichen Sie den Zuschauern, die Pr.sentation ihres Desktops anzufordern...GUI::EmailInvitation.OneTapDial.Ein Fingertipp...MyLogSink::OnLogMe
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (545), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):106960
                                                        Entropy (8bit):5.094814632767334
                                                        Encrypted:false
                                                        SSDEEP:1536:xyuuPyyX/7kfVZNyPBqYV7jRRHXkRX4lKSFHEkYcvdRKU33LQ:JY/gNyPBqMdvdsUHLQ
                                                        MD5:555BA58246B88D60247B6C9D6FA9106F
                                                        SHA1:B040E9A84618FBD0340755C500F92CE9E692A0A8
                                                        SHA-256:FC60DF878A62C597BF669F24178E1AEB73D619F15385CAC798A654120141012C
                                                        SHA-512:921AA1946E07ECBEDD00A0AD2D58442820C17FE310FE1F6D0CA6F464A773F7EA6EFF64E315D319E79F9644ADAC66B65D6F02A147A941A5F1F9C05580C7034C21
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Stai condividendo lo schermo...IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Ferma la condivisione dello schermo...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Connettiti a un dispositivo Bluetooth e riprova...UserObject.*.new_meeting_flooded.Sono state create troppe nuove riunioni. Utilizzare riunioni permanenti programmate per ridurre i nuovi ID riunione....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Consenti agli utenti di richiedere di presentare il proprio desktop...GUI::EmailInvitation.OneTapDial.Quadrante con un tocco...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.La tua connessione alla sessione non . stabile. Scegli una rete diversa (ad es. Connessione cablata), dispositivo mobile o computer. Quindi riconnettiti alla sessione....MyLogSink::OnLogMessage.StopPhoneCall.I dispositivi audio veng
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (317), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):115144
                                                        Entropy (8bit):6.00340553785929
                                                        Encrypted:false
                                                        SSDEEP:1536:YzqVDx79PZLoxGAr36wb2cY/1w2E4i91sG9z1aknzGBp:Y7w6RNc
                                                        MD5:F8FA38EBCA233B3B805311979EC31646
                                                        SHA1:850778B2F3949D28C858534720E4CD1E154786F9
                                                        SHA-256:E45D81061CF6ED74405D4EBF3BC530489F6A780B84DF510894F8B0A8D4D8A89E
                                                        SHA-512:C72C9A783E34DB019FD4FBB251018B215D2157FDDC70D273E76C3E5B59AA836097ED22CC341093BECCE8C367B89F03503F636D93070AC4C2988A738E6D5C5917
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader..............IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing...........IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Bluetooth..........................UserObject.*.new_meeting_flooded.................. .....ID.................................PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent............................GUI::EmailInvitation.OneTapDial.............PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.................... ...................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (371), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):111713
                                                        Entropy (8bit):5.192325235869865
                                                        Encrypted:false
                                                        SSDEEP:1536:bW+KreYBSzy/PYiMinpCLmQnPHYKhGcVQwfujuAbjyftfJBiW/nv2hY3:a+KyzoP3MiuHPEna0m
                                                        MD5:6A3E7509311BE81CC2FFCAD1B697F3BD
                                                        SHA1:E24348698A2F8E316D017A47903683B08B7EC9CB
                                                        SHA-256:5A92A07D17108EA6D852108731A2F7CB92F610AD485505D7F8F02BAFF5F5184F
                                                        SHA-512:8ACD6DDD22FC65E7745691E27CA811885C7F9C760191BEBCC9108269745B5A284FF5D6B884E3E45C662FE2D9392EF2A6AD46DE4A73E28C70409CC58FB45539E1
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Voc. est. compartilhando a tela...IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Interromper o compartilhamento de tela...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Conecte-se a um dispositivo Bluetooth e tente novamente...UserObject.*.new_meeting_flooded.Muitas reuni.es novas s.o criadas. Use reuni.es permanentes agendadas para reduzir os novos IDs de reuni.o....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Permitir que os espectadores solicitem a apresenta..o de sua .rea de trabalho...GUI::EmailInvitation.OneTapDial.Marca..o com um toque...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Sua conex.o com a sess.o n.o . est.vel. Escolha uma rede diferente (por exemplo, conex.o com fio), dispositivo m.vel ou computador. Em seguida, volte . sess.o....MyLogSink::OnLogMessage.StopPhoneCall
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (616), with CRLF, CR line terminators
                                                        Category:dropped
                                                        Size (bytes):106752
                                                        Entropy (8bit):5.170056613944853
                                                        Encrypted:false
                                                        SSDEEP:1536:Q7fLnQkna9+AEKjKsbC85Yzg13U6J+Jtr2FphWz9Brw5Mv:QLa4HkdwDw5Mv
                                                        MD5:59F4A43B89E599128DA95F68C6C93C5E
                                                        SHA1:5DE54065488D0417EC2C655F156FC6EDC173ECB4
                                                        SHA-256:B27C22AC64E6D231AE4C17CB93E0A889D376F24EA44864AC15349C7F70C94910
                                                        SHA-512:A016029C5A9288755C96793FDBECFC2663FFC3B6C3E6DB28B9A786D52458D8B9B4500FB923D1D58CA282EC92D1430DC550D368D664E8EE3F7BACABFBE4434D5A
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Est.s compartiendo pantalla...IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Dejar de compartir pantalla...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Bluetooth..........................UserObject.*.new_meeting_flooded.Se crean demasiadas reuniones nuevas. Utilice las reuniones permanentes programadas para reducir las nuevas identificaciones de reuni.n....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Permitir que los espectadores soliciten presentar su escritorio...GUI::EmailInvitation.OneTapDial.Dial de un toque...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Su conexi.n a la sesi.n no es estable. Elija una red diferente (p. Ej., Conexi.n por cable), dispositivo m.vil o computadora. Luego vuelve a la sesi.n....MyLogSink::OnLogMessage.StopPhoneCall.La
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (555), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):68108
                                                        Entropy (8bit):5.415653899818446
                                                        Encrypted:false
                                                        SSDEEP:1536:yNpOdmNoOlqF6sVw9uue4XE/ZIwSzpx06:CpOdmNY6v8uE/SwS166
                                                        MD5:01E157ED08E05ED80052AD8DF404B530
                                                        SHA1:FD6229C6410350C30D5B7907DB42C521FC3EDB62
                                                        SHA-256:295A963CCE972904ACF33153C7CAF731027A36B5B8F5249EAAFC5B5D03012D67
                                                        SHA-512:1EEE1112B12FB3FEAC86F9555AF20AB1A16EBF0FDDE09004D4A294603B4BC9A15105B6453BB31B2741998BA781527B339F5174D04B7FA3792172035C20582F0A
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..EmailInvitation::CreateEmailMessage.TipsWireless..PUCU : Ekran tazelemesinin yava.lamas.n.n ve kesilmelerin .nlenmesi i.in telsiz ba.lant.lardan ka..n.n....EmailInvitation::CreateEmailMessage.TipsHeadset.Mikrofon ve hoperl.r.n.z. kullanmak i.in kulakl.k gereklidir (VoIP)....EmailInvitation::CreateEmailMessage.OptionalNumbers..ste.e Ba.l. Numaralar...PCGUI.PAttendeeListDialog::OnRightClickAttendeeList.MoveToTheTop..ste git...PCGUI.PAttendeeListDialog::OnRightClickAttendeeList.ShowInShortList.K.sa Listede G.sterim...PCGUI.PAttendeeListDialog::OnRightClickAttendeeList.ChatTo.Sohbet mesaj. g.nderimi...PCGUI.PAttendeeListDialog::OnInitDialog.ParticipantList.Kat.l.mc. Listesi...PCGUI.PHostMeetingDialog::DisplayAlertMessage.WebinarAlertMessage.Kat.l.mc.lar VoIP kullanamazlar....PCGUI.PAttendeeControlDialog::OnInitDialog.RaiseHand.S.z alma iste.i...PCGUI.PAttendeeControlDialog::OnInitDialog.LowerHand.S.z alma iptali...PCGUI.PHostControlDialo
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:MS Windows icon resource - 6 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):22486
                                                        Entropy (8bit):3.442256410134587
                                                        Encrypted:false
                                                        SSDEEP:384:AD/IIsIIED9mDKzj8gmUf+SJHgIIsIIzCvA2TDv:oIIsIIJgmUf+ugIIsIIzCvlTDv
                                                        MD5:883746CDA8ECF40EF07D2F26A687E550
                                                        SHA1:88D8D8D7676AE4890C06ACED19212122BE59F44E
                                                        SHA-256:4435E5C62BE3B529D5E2100B5F1F57EDCC2BE82281601313BC8594E52C445D66
                                                        SHA-512:A8CA2E91AAC490EAEEEEEEAF21F9DE64FC1E24A5D690790BEC09E694A3738F12FB4FCADEA799FC54F9D4B766A5C951873F39BB4875E5D58B75243B4E2833F018
                                                        Malicious:false
                                                        Preview:......00..........f... ......................h.......00.... ..%...... .... ......B........ .h...nS..(...0...`.......................................'Z..&W..,f..+c..(]..ff..ff3.fff.ff..ff..f...f.3.f.f.f...f...f...f...f.3.f..f...f...f...f.3.f...f................3...............33...f..3.......f...f3..3f..f...f...3....3...f...................3.f.f..................3...f...................3...f..........3...33..3f..3...3...3...f...f3..ff..f...f...f......3..f................3...f..................3...f...............3...f......3...33..3f..3...3...3...f...f3..ff..f...f...f........3...f...................3...f..............3...f.........ff..f.f.f....ff..f....f.!...___.www.....................................................................................xTk..F..p)..'Z..'Z..'Z..'Z..'Z..'Z..'Z..'Z..'Z..........................................................................xTk..F...(......................................................................'Z..'Z..'Z..'Z..'Z..'Z..'Z..'Z
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):15086
                                                        Entropy (8bit):5.268540394824082
                                                        Encrypted:false
                                                        SSDEEP:192:jG8oSNa2uVZZXk6w+tldx2+E5K7sWpK0nqNeSMAo80TxzHOOTvVmASzc:jGSNHuVZjN7a5KIWGo80BBvVlD
                                                        MD5:F366C80B222E8E83D5EC6D90959C2C45
                                                        SHA1:CBEFD8DC9C8E342C6165D0F9C1FCFB177D2E01BE
                                                        SHA-256:8CD38C8E1A62198BEA0BCC85C0B339A835E460ED08A8D8C98BE524B528F07531
                                                        SHA-512:DB1C073C9A7837D8D3D1E3F654C8C95060971130CDD527CDD1365CDFE48CC2BED963FB0D574A4705BA92E2E70102F73795ADF97EDF9EDAAB3EEEFAA03D3E8517
                                                        Malicious:false
                                                        Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%...............................................................................t.......n.%.s...t...r...r...r...r...r...r...r...r...t...s...p.(.....t.......................................................................................................................s.......p.U.r...n...k...n...o...p...p...p...p...o...n...k...n...s...p.Z.....v...............................................................................................................q.......o.@.r...m...1.....................................3..m...s...o.F.....q.......................................................................................................m...........s...m...A..................................................F..m...s...R.......n...........................................................................o...s...v...t...r...p...p.......p.(.r...r.............U..Q..F..C..C..E..O..T.............s...r...r.,..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PNG image data, 64 x 64, 8-bit/color RGB, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):1867
                                                        Entropy (8bit):7.3280619152848905
                                                        Encrypted:false
                                                        SSDEEP:48:0wqQNn2xUJ3fw0ww2sq4fl7OYo8QUDTNVS4XrAK9:kY2L0J2l49yx8FDTJT
                                                        MD5:2CFEED234A8558FAFA50655ACB115FD8
                                                        SHA1:2FFB1A9FE6536723E96AE500554D3ABEED2147FC
                                                        SHA-256:615861E3BE02B7EBCF9378BBFEEFE969B503A11C738DFBD9A6514029205646F9
                                                        SHA-512:DA7E66A2DA8EB2363583A9C055B590385412BB924FC0D0D28D8CBFDE9567DD0AB98019F1EC752B16F590764C1D287AEB583B90458820A3D6A75C43E59C7B6583
                                                        Malicious:false
                                                        Preview:.PNG........IHDR...@...@.....%......tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:B17AB45350AD11E5B1EDE5C7D0C88953" xmpMM:DocumentID="xmp.did:B17AB45450AD11E5B1EDE5C7D0C88953"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B17AB45150AD11E5B1EDE5C7D0C88953" stRef:documentID="xmp.did:B17AB45250AD11E5B1EDE5C7D0C88953"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......IDATx..[O.@..[Z.P...(r.K@.$....#b..xb F..".x.D.:.r..t..0&....C.u.........eS~.~.~.LJ..K.Ng4........n......T*
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):2927
                                                        Entropy (8bit):7.901864294096541
                                                        Encrypted:false
                                                        SSDEEP:48:z/AblbrVP517clW9u74PZi5QTsp+9MbP6f8/2X5vZHUcYFye:z/A5bxj7cQ9u7yZ8QTP9KT2XHdYFye
                                                        MD5:6E8F635F6528CC0433861A8DFB0C2D30
                                                        SHA1:E85EC2E9154D1B12835E0590ED00C22A49E3A6DB
                                                        SHA-256:A8CC2B4C182384537CAD5E091DFF777F6806E77EED0E5800B96C573E4FBC1A00
                                                        SHA-512:12F54F49FDDF6857A840608ED070822C7491D6C15B56F6F5A024C27A28264ED1525FAB4D57F9716D49C284BBF24A677A46F8F084BFBBF485D0F62D11B5CBC725
                                                        Malicious:false
                                                        Preview:.PNG........IHDR...8...8.......;....6IDATx...S.w.....d..k....KQL...n..2..../....51.A.a....1....<y...L.E..W.=....w..W..Dd._$..$.DF%...1.K.y9I..[.xzaK..:.1..X".G$.[../...:l..?..V......K.T.v7...O.T8.8.Z...5Y.....V$..+.|4.P.........@...HR!....+.AS.xZ.9r.... ......#...73M....6...P3U.K.....[q....0.......f.j>Y. b....n...T..=...(b.......M.wf.v.q.py@0.....eb.$S..D.9Ys...i.}...K9...i..=u.R..$=..S..B...'Ss..r...~3.QIf.....M5..l.p:.....r.Yz.B..........{....S..F>..c9..L....7.....r.;....b(..d~I.^....U[..}R..H]S.x.[.>..5.f....k...^9...}^~yU..q..F$._.y..S1L;..i(.c..H...R....ni.? M.}...%.Mm.9R...o../.@.T{}.._...R.Q|XU....3.9.y.q.KC.....T.Z$.}@j.....Y..@.B..{.X.......&.j........,=_WSE.;o...D...x&$..?.0...n.O5...B..`|.wk.....#..Mj.7G...+4.v*. G....{.~....$G...D.....+{.......m]2xs...vE..r#.=........i. .J..k@..L...FM...=....2.tF.............).....+.........[S/M..r..y.M....R...o...)I..2=....^M..-..*.Dk.MN..........q.P<!.......\....V.A..@.......0S.....D....}.....%+.
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):15086
                                                        Entropy (8bit):3.7348281735284137
                                                        Encrypted:false
                                                        SSDEEP:96:jvVmqKjOvFd0+uYDkY4RkQWyt9aKdk/o3H4VGr1fSLzeIBvCWV2auhbfgX:j9mqdT0HVt9aKdDSLl6kBbX
                                                        MD5:E7D9E81AFA9CB104E0FE70EE9DABCB6B
                                                        SHA1:FA2D7DF277CD730BAD0786F5BA92D3E5D777403B
                                                        SHA-256:A04E701256B583F226CE290D979B19D51A6EA4C5A94341E4E35DB1CA94DDC6E8
                                                        SHA-512:1FDE7F4C1387FBE304ACBD1EA2479A89306AC90BDF72C6C5AB88B92C44183DFBF7F01729B23C112D77AB7378D4FB007EB2343B50974436C84D69E51C11656A72
                                                        Malicious:false
                                                        Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PC bitmap, Windows 3.x format, 1 x 98 x 24, image size 394, resolution 2834 x 2834 px/m, cbSize 448, bits offset 54
                                                        Category:dropped
                                                        Size (bytes):448
                                                        Entropy (8bit):4.671818727412439
                                                        Encrypted:false
                                                        SSDEEP:6:7AldcJ6RqNJp743UTxdhTbVld5RH2IQhTnTfJrf9K9LPpPip2DGZOGGu9uDUEnQi:7ASgyH2TnTfVwHZXGGuYgQQI5VSQtL
                                                        MD5:A8A6EF427C5C0EDE5C70AF58AA5680DE
                                                        SHA1:127365EAF32CEE2BA7A958E766FDCCAD0E3C50C6
                                                        SHA-256:1D3F66E964CD9BFF854A550D5ACBB55B2C2027C05CEB7A9396A691B1C9D8C6C2
                                                        SHA-512:C2EC78255EC33AF2AE799972AA275C8FA3378D56092B480C4F39105CB5978983C16B97C33E94CCB5D76886340EEA116B08C207A1D593945B7F600ED7C8751E41
                                                        Malicious:false
                                                        Preview:BM........6...(.......b.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PNG image data, 266 x 9, 8-bit/color RGBA, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):715
                                                        Entropy (8bit):7.529061088532927
                                                        Encrypted:false
                                                        SSDEEP:12:6v/7dZXLr+yakAkKVlTMtHQOXSL8OW8Nv9XBnzvN3RH/F4ibFLRrcawCajNuk9:gZ3hankqlg1SLR9DnzN3B/FXbFhcawC8
                                                        MD5:B7CCD0351EB77445E7323F2BB74788FD
                                                        SHA1:E0525DA70A851E6DC72D57DD9064F16B949C2A26
                                                        SHA-256:8BAA0FEAF55D59C0929419101BDAB9EA326348F13DE8B68EDFB710076F0C3F78
                                                        SHA-512:34015ECA33A939E74481334A55DB4731D2777B4975E4BCDD648A8DF1CEA80E2C65E93047A5D9C22C681D1CA417CCED190C65E58E8099B740CA669DC9BF829579
                                                        Malicious:false
                                                        Preview:.PNG........IHDR..............(b.....gAMA....7.......tEXtSoftware.Adobe ImageReadyq.e<...]IDATx..mo. .......q.T....$i.HS.`l........-.n.}...{.:.>".q...&.i".y}[...y..?&.&..b-.;.x.6....hp.}.v..N..:........+.>...h3........."V......W9.q)..gC1G.w..?+....h....0*@QBW....w?.5...y..$.{...s`.."z.+.N.E...3..'.3....q}.....@...D...J*>.l"...U<.9....(.."+T+..-..l.m..f...4^....:..K.=....0.......U.+....}d0a.)."E...{&L&.x....Ag...2....+.j.Eo..T....Z{..j.eW.....qa.#....t.X.L..e.*;]../...:BA|..N....@,.X..u|^..t..p.`..@%.Q.....N.....8.W..H@a..y...Q)..Kf..!...:.K......{`...O-.;. +B;./[..g8.....n....w..x.6<A.;b.r.........d?.a7._..W..pA...~..=a...].uw!....y...b.|..|.b..M..?..{.=u..0..nD.........IEND.B`.
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PNG image data, 260 x 1, 8-bit/color RGB, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):132
                                                        Entropy (8bit):5.413824965565243
                                                        Encrypted:false
                                                        SSDEEP:3:yionv//thPkYtS1clSl0tRthwkBDsTBZtzdatFcEoXa/ljp:6v/lhPkYtS1Rl0znDspzWTAa/Vp
                                                        MD5:4CE28B32C7836663CE74B29F11D176A7
                                                        SHA1:608EBF86C32394E609ACB091E5FEFCB0AF4B9D39
                                                        SHA-256:4199A78439525D778CF91FA5DEFE0C68320B3E51B3EB9C7672939DD4B2F33E50
                                                        SHA-512:E5DF9C12F74A92898A78702935C454CA0314997D7BA36B89126BBF177FD652B5DFECFE8C3687A117D60810FCDB0BCC91ABCDEF7F19B6C4FFB8725F793CC1BD02
                                                        Malicious:false
                                                        Preview:.PNG........IHDR...............GZ....gAMA....7.......tEXtSoftware.Adobe ImageReadyq.e<....IDATx.b.w...(...... ...!..S.L.....IEND.B`.
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PNG image data, 274 x 312, 8-bit/color RGBA, interlaced
                                                        Category:dropped
                                                        Size (bytes):15525
                                                        Entropy (8bit):7.955817620038244
                                                        Encrypted:false
                                                        SSDEEP:384:md1Xn6jtWIg9t84o4cSmkLjWKmVQWMVwIp8VNP+6YLET2:m3XnLIYt84/KaiRQsImP+gT2
                                                        MD5:C939AF5F23D396F55808E95668C73C18
                                                        SHA1:3E8767C4FCB16767E6E04A34A9B81B74C061E411
                                                        SHA-256:B128C15EA8BB492570E441F2BD3F81D1A481C75997AE107A1D9E830C98067FD9
                                                        SHA-512:BE5D99BEDEB70C53B127BCED885C704C1E7E42634B64A5DE9E4B9138CB91C14C5D774CE27742118E6549D7F562AD5DAFD1395AB02BFB7E04B431F18FDCE16B7C
                                                        Malicious:false
                                                        Preview:.PNG........IHDR.......8.......L.....tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:B337DD93A04411E3A7E0B3415030DDAB" xmpMM:DocumentID="xmp.did:B337DD94A04411E3A7E0B3415030DDAB"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B337DD91A04411E3A7E0B3415030DDAB" stRef:documentID="xmp.did:B337DD92A04411E3A7E0B3415030DDAB"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>{.....9.IDATx.b...?..p..Y.......@..@&....@9h.bv(.L.ALTp.2..H.P.P;d..S.4...a.li....1.8.L.5..Zp5..=. ..x...@n....D.t..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):15086
                                                        Entropy (8bit):3.908826625397295
                                                        Encrypted:false
                                                        SSDEEP:96:jxp0LXMk1/Au7paUVdD+we1RoeeBniFQ+0TxKtp4+3r/+4sR1sXsXsrEI8kT:jLu8cN5dDxerMQEGp4+3q4sHsXsXsrB
                                                        MD5:E20ADBD0C131A94E99FDE12E0C60D247
                                                        SHA1:EE5EB66E8945EC49A178D739834D448350C1080D
                                                        SHA-256:9473FE1FE2D941DB548F70E716DD8ED841DBAC60C02C71A5CE6BA760872DC69A
                                                        SHA-512:E204339033903140FF0765F38F35DAEFD15C4D336D2C2595A04A481E9104CFC96892FCF9621EA4745E5DDB0F57D9A5641422EFF6C03324842ADAC91A61BEB5E4
                                                        Malicious:false
                                                        Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%...............................C...=...V6&.gG^.oR..qT..pT..qT..pT..pT..qT..qT..pT..qT..qT..qT..pT..qT..pT..qT..qT..qT..pT..qT..qT..qT..pT..qT..qT..qT..qT..qT..pT..pT..pT..pT..qT..pQ..kKk.\96.L)..V0...................y..V...[6..rT.....................................................................................................................................................|a..[;3d....Q2.........Y5..^<*..k....................................................................................................................................................................cDN...hH..eF..W6...h............................................................................................................................................................................`<6.[7..`B..jJn............................................................zZ..T,..U,..U,..U,..U,..U,..U,..U,..U,..U,..U,..T+..e@...............
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):25904
                                                        Entropy (8bit):6.967116392745186
                                                        Encrypted:false
                                                        SSDEEP:384:0XganKwtsIS1KgKy/FEvUzoGJk0cOrQDEUcWTyl5nYPLOdGfZiTUdGfZL8JN77hp:0XgQtd6KgKCU3O7uiTHA3hDl
                                                        MD5:7BCD58DF45A40F865E8DBBCB5B2EF6D1
                                                        SHA1:6B8C19C6521CE5E4C8C81F5A59552F3714B15E17
                                                        SHA-256:F8CDAC83B1512B6BCFABC616F3865BF11C049E59E4A2C8B5D5D4F031332D83D8
                                                        SHA-512:DEAA3F5CA55D53EB398328F6910E86AB4E95A5E8B37FD67EE6FBD21C1CA8E747D09544D7A54A01815864C2CEBD376AA5ED34313C21B7235D31450F996C84CA39
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}.....X...X...X9?.X...X.>.X...X.?.X...X...X...X.?.X...Xt?.X...X9?.X...X...X...X.?.X...XRich...X........PE..L....*n=...........!.....&...................@....oq.........................p......@................................2......./.......P...............0..05...`..p....................................................................................text....$.......&.................. ..`.data........@......................@....rsrc........P.......*..............@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1909
                                                        Entropy (8bit):5.116245132023822
                                                        Encrypted:false
                                                        SSDEEP:48:0TK1j1rAalFwzKLdErOCZm9I+BOaknxNVbZKcKWUaP1aPyfl:qK1j1rAalFwzKL6OyYceyd
                                                        MD5:64EE134763F8A59FA41575B54B4C9799
                                                        SHA1:3047D89F40E4B5BD14A300BA0C8E11A9DF403EA3
                                                        SHA-256:6CA7946C4805C3705E6D588455D21131376E94960EDED7FDBBD5DACEB48A916B
                                                        SHA-512:E2438809048CC375554292A693C50D5CCED59B5BCC555996454233DCD0CC16CAD48C43889697C289A8CBEB0A324DD587B8AE5921A6F149091C93236A99BDB392
                                                        Malicious:false
                                                        Preview:<__SetupDirectory__>C:\Users\user\AppData\Local\Temp\tm_starter_dir</__SetupDirectory__>..<__SetupFile__>C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe</__SetupFile__>..<__SetupFileName__>SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe</__SetupFileName__>..<__SetupConfigureFile__>C:\Users\user\Desktop\starter.cfg</__SetupConfigureFile__>..<__AccountServerIP__>support.lockwoodbroadcast.com</__AccountServerIP__>..<__AccountServerPort__>443</__AccountServerPort__>..<__MeetingPassword__></__MeetingPassword__>..<__MeetingId__></__MeetingId__>..<__Role__>attendee</__Role__>..<__Version__>3.0.639</__Version__>..<__Publisher__>RHUB Communications, Inc.</__Publisher__>..<__AboutURL__>http://www.rhubcom.com</__AboutURL__>..<__AttendeeName__></__AttendeeName__>..<__AttendeeEmail__></__AttendeeEmail__>..<__Email__></__Email__>..<__UserPassword__></__UserPassword__>..<__PassThrough__></__PassThrough__>..<__ClientName__>TurboMeeting</__ClientName__>.
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):21
                                                        Entropy (8bit):3.1182751607709753
                                                        Encrypted:false
                                                        SSDEEP:3:MFW54fQn:MM4fQ
                                                        MD5:8797773BBB9B3585F186FC2684A48F6C
                                                        SHA1:460A68B60688E4AC8A169B5A972E5A0120A977BC
                                                        SHA-256:18805AD87BD499C00BC4B72EC6B52E9EC1B9087760E1741EA73CD53A92CC839C
                                                        SHA-512:A4F8DA05BE6F56A1A8347C58A439638967C0129B21884B5C7C624059C690FED7CD131FB1988C524F8D209C407725E223B388E984506A27803DC0F2CC24FB1D50
                                                        Malicious:false
                                                        Preview:3.0.639..8.0.2..35232
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):91384
                                                        Entropy (8bit):6.590287891967479
                                                        Encrypted:false
                                                        SSDEEP:1536:vtJnUFQOmsbk04O5pVMlhIcfRuu9HsWScdlk6hEKLnm7A3h8P:UKsbL5pVMlmWJlDTLnyP
                                                        MD5:D9F52809F0A87FA85638E08187040545
                                                        SHA1:7A4BAF2DCBA8193AE9209BFF85AF56B18DF9344A
                                                        SHA-256:867B919D932C496BE91FDB3FC0AC489FDFFAE9371463BFC24C844FC7CF63A9E4
                                                        SHA-512:8617F7B992F824294D1B840AA0D04B6C040E3C756907729740CCF56E709CF1509E7A8F79B06901FE944D5DBB5C9EDCF1BFA4C1F166607CD2392EF8B6C81D14C7
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........N..c ..c ..c ...#..c ...%.Rc ...$..c ...$..c ...#..c ...%..c .....c ..c!..c ...%..c ... ..c .....c ..."..c .Rich.c .................PE..L.....Z`...........!.........................................................p......@&....@..........................".......#..P....P...................6...`..H.......T...............................@...............,...d"..@....................text...W........................... ..`.rdata...Z.......\..................@..@.data........0......................@....rsrc........P......................@..@.reloc..H....`......................@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Apr 18 03:25:36 2024, mtime=Thu Apr 18 05:15:10 2024, atime=Thu Apr 18 03:25:31 2024, length=18097912, window=hide
                                                        Category:dropped
                                                        Size (bytes):2265
                                                        Entropy (8bit):3.7196011299919634
                                                        Encrypted:false
                                                        SSDEEP:24:8JK229iPLshl0UdPKwg0ALAgNp9MMgpoLMLIESoLMxLkW9AMyycMxLAIJcJtm:8JK22sTszyD30psfkWTrlJcJt
                                                        MD5:93C828CFE3022147DF78D7DCBB08F3FC
                                                        SHA1:0C6371F339BA3C080D235B98D753B2A22D51B1D8
                                                        SHA-256:75DBB468124AB1612FA26966B40B6E03DD250719BED8F2F5DC54AE575408FAA0
                                                        SHA-512:A68B24B2A8C92878809E8F0F966854F8B3C1A1D2DF09D162D2F1E32476A9191B382FA6D0B881EAF05DF0A8D9B78C41F47962CEBA27D8D852FB50F6A62BC7BE0D
                                                        Malicious:false
                                                        Preview:L..................F.@.. ....T(vH.....Z.W...$..rH....&......................F.:..DG..Yr?.D..U..k0.&...&......Qg.*_...h..hH....6J.W.......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=.X.1..........................3*N.A.p.p.D.a.t.a...B.V.1......X2#..Roaming.@......EW.=.X.1..............................R.o.a.m.i.n.g.....b.1......X.1..TURBOM~1..J......X2#.X.1..........................O:..T.u.r.b.o.M.e.e.t.i.n.g.....b.1......X.1..TURBOM~1..J......X2#.X.1...........................8 .T.u.r.b.o.M.e.e.t.i.n.g.....n.2..&...X0# .TURBOM~1.EXE..R......X3#.X.1...........................br.T.u.r.b.o.M.e.e.t.i.n.g...e.x.e.......|...............-.......{............[.......C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe....T.u.r.b.o.M.e.e.t.i.n.g. .-. .S.t.a.r.t. .M.e.e.t.i.n.g.9.....\.....\.....\.....\.....\.T.u.r.b.o.M.e.e.t.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g...e.x.e.<.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                                        Category:dropped
                                                        Size (bytes):2160
                                                        Entropy (8bit):2.721062987486075
                                                        Encrypted:false
                                                        SSDEEP:24:8FrxWL+u+hsBsoLMAQnoLMCwLkW9A/RyeMCwLA2Fdqy:8x8Mq2lLkWVACUy
                                                        MD5:A61F0A659081E43BFB0550779F1E7535
                                                        SHA1:C2ACB1AE16315B5C82510CD6647D9BEB57B896A0
                                                        SHA-256:418976BAFE56B0069FE6F77D2B110DACE7F5090DCF2152A441E74C909CFF9C53
                                                        SHA-512:E57ACA66AE53714D1F8411BAB7EBA269B92E4F9157DD54CCFBD407C247FD3D0268F6484B168964F19FA32E4F6DFAB52A931F61B713B5F84090C23E0CAE122A1F
                                                        Malicious:false
                                                        Preview:L..................F.@......................................................U....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....f.1...........TurboMeeting..J............................................T.u.r.b.o.M.e.e.t.i.n.g.....h.2...........TMRemover.exe.L............................................T.M.R.e.m.o.v.e.r...e.x.e.........T.u.r.b.o.M.e.e.t.i.n.g. .-. .U.n.i.n.s.t.a.l.l.).....\.....\.....\.....\.....\.T.u.r.b.o.M.e.e.t.i.n.g.\.T.M.R.e.m.o.v.e.r...e.x.e.?.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g.\.......-.-.c.l.i.e.n.t._.n.a.m.e. .T.u.r.b.o.M.e.e.t.i.n.g.Y.C.:.\.U
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):786984
                                                        Entropy (8bit):6.461738695456927
                                                        Encrypted:false
                                                        SSDEEP:12288:8Np51L0Z775xs2qnf8PtVXJSLKlK4pKJe5d0nocsxa3k48118t/HY4EErtkTd2hM:6JL0Z/mnet60yocssl8gY4hkTd2hCM+
                                                        MD5:C28568A1EB37159185590BCCF20F9866
                                                        SHA1:DFE01651DA872470E686C2BE78400C80C98FA450
                                                        SHA-256:ED500E8A0B1260F47EF142B06CF08AF8719D003F227C5EF48DD0166C6456D941
                                                        SHA-512:476324F2E9BA91053145A77D36D26020318EE12F336D056861D9556E989771D134FF65BFA18F5090419DA131B082A711635C0E37592551AF25E0BD0575C14F9C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 3%, Browse
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......I.A.../.../..././.,..././.*.././.+.../....../....../....../._.+.../._.,.../.<..)./._.*.../...+.../....../......./...*.../....../......./...-.../.Rich../.........PE..L.....{_.................z..........3;............@......................................@.....................................@....P..0...............(....@......[..T....................\......H\..@...............`............................text...!x.......z.................. ..`.rdata...s.......t...~..............@..@.data...0,..........................@..._RDATA.. ....@.......t..............@..@.rsrc...0....P.......~..............@..@.reloc......@.......b..............@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):688888
                                                        Entropy (8bit):6.576995195781194
                                                        Encrypted:false
                                                        SSDEEP:12288:UUYb14nVcVw3h4sj2w2QE2uSBlK4bLgyQVW8Xgp1IW6ce+dFqtkTHz+Lqh/:UYnVcV9Y2wFBJF8Xgpm+e+dwkTTJh/
                                                        MD5:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        SHA1:5229D88A9E650430719DC5317F8F7601117EF637
                                                        SHA-256:11B64793473C88AA0EF2F9BDE703E9494495029D416E76D954FD3F044EF8FC10
                                                        SHA-512:7D898F74D292C23D8F38A29C2C3D8C2E8F6D610C2CCA5B89B5273222A6E31DB078C266A25C4072533DB4F907BA4F3FC700E020A4E7EBD4FBB4D4EA13D0FAA0A3
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........[^...^...^...J...N...J.......J...H......._...W.L._.......}.......B...o.5.N..........W.K.T.......W...^......W.[.........O.....7._......._...Rich^...........PE..L.....Z`.....................Z......x.............@..........................p......}.....@..................................N..,....................L...6.......l......T...............................@............................................text...3........................... ..`.rdata..8o.......p..................@..@.data....n...p...|...V..............@..._RDATA.. ...........................@..@.rsrc...............................@..@.reloc...l.......n..................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):688888
                                                        Entropy (8bit):6.576995195781194
                                                        Encrypted:false
                                                        SSDEEP:12288:UUYb14nVcVw3h4sj2w2QE2uSBlK4bLgyQVW8Xgp1IW6ce+dFqtkTHz+Lqh/:UYnVcV9Y2wFBJF8Xgpm+e+dwkTTJh/
                                                        MD5:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        SHA1:5229D88A9E650430719DC5317F8F7601117EF637
                                                        SHA-256:11B64793473C88AA0EF2F9BDE703E9494495029D416E76D954FD3F044EF8FC10
                                                        SHA-512:7D898F74D292C23D8F38A29C2C3D8C2E8F6D610C2CCA5B89B5273222A6E31DB078C266A25C4072533DB4F907BA4F3FC700E020A4E7EBD4FBB4D4EA13D0FAA0A3
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........[^...^...^...J...N...J.......J...H......._...W.L._.......}.......B...o.5.N..........W.K.T.......W...^......W.[.........O.....7._......._...Rich^...........PE..L.....Z`.....................Z......x.............@..........................p......}.....@..................................N..,....................L...6.......l......T...............................@............................................text...3........................... ..`.rdata..8o.......p..................@..@.data....n...p...|...V..............@..._RDATA.. ...........................@..@.rsrc...............................@..@.reloc...l.......n..................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):228600
                                                        Entropy (8bit):6.309001563878647
                                                        Encrypted:false
                                                        SSDEEP:6144:MQyEgGJDxpO0ZTXmcANoEEZwBXcAOBXCs9:MQiGJDxpO0ZTXrWcPCm
                                                        MD5:F7A57D58DE9E992509F28477D85EA442
                                                        SHA1:48747FE9CA9D804110462FBEBCC13F4519230443
                                                        SHA-256:B660B3F98E2C45770AF8421E75D7CF7AF71BD7AF8A30EFD4091E75F4D664B2B3
                                                        SHA-512:C12118B16E606CAC969B30462EB0AF501AC7E53A1DFC6BC0635AE3E6C62AA659085DCF19E499F874141CCEBC15245246BCBFA7BA15ECDF5148884A6599B737C8
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........*.E~D.E~D.E~D.Q.G.J~D.Q.A.~D.Q.@.S~D...G._~D...A.~~D...@.g~D.E~E..~D.L...J~D...A.M~D.....D~D.E~..D~D...F.D~D.RichE~D.........................PE..L.....Z`.............................E............@.......................................@.....................................d....`..p............F...6...p..,...@...T...............................@............................................text............................... ..`.rdata..d...........................@..@.data....y.......d..................@..._RDATA.. ....P......................@..@.rsrc...p....`......."..............@..@.reloc..,....p.......(..............@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):11258
                                                        Entropy (8bit):4.633973127023923
                                                        Encrypted:false
                                                        SSDEEP:192:/PCYXUhWOpbWVwt98C1hnlndO9nQnUnzn3hsX6H5veh/oQxrB03uc2Ugt2hNa4ow:VkhWOpbW28C1AHkh5UH3aDv7Pl9hblen
                                                        MD5:4EA8515F972553020A96A0221CFEBFA9
                                                        SHA1:316B5BA513891CEA7D0A8848DCF30DDB852013C1
                                                        SHA-256:8CB592235E3BC0DF74F58F8E95177763BA866A8E1192F2E50D040E8D2E24D314
                                                        SHA-512:5666CFEA9185F33EEE523D27EBB6BE6E8ACB8B0FE620AEF9E70B903FD9E4C8EFD8E4AF97D15FCCCCCE37402569C5951F696C195EEE35E38E1CBA20BB4F5528BF
                                                        Malicious:false
                                                        Preview:<__CACHE__>..<__TRACE_LEVEL__>0</__TRACE_LEVEL__>..<__GUI_REMEMBER_PASSWORD__>true</__GUI_REMEMBER_PASSWORD__>..<__GUI_SERVER_ADDRESS__>support.lockwoodbroadcast.com</__GUI_SERVER_ADDRESS__>..<__GUI_EMAIL_ADDRESS__></__GUI_EMAIL_ADDRESS__>..<__GUI_PASSWORD__></__GUI_PASSWORD__>..<__GUI_NAME__></__GUI_NAME__>..<__GUI_IMAGE_QUALITY__>4</__GUI_IMAGE_QUALITY__>..<__GUI_UserPresetAutologin__>false</__GUI_UserPresetAutologin__>..<__GUI_MEETING_TYPE_SELECTION__>0</__GUI_MEETING_TYPE_SELECTION__>..<__GUI_ABOUT_URL__></__GUI_ABOUT_URL__>..<__PASSWORD_ASSISTANCE_URL__></__PASSWORD_ASSISTANCE_URL__>..<__DEPLOYED_FOR_PARTNER__>N</__DEPLOYED_FOR_PARTNER__>..<__DISABLE_POWERED_BY__>Y</__DISABLE_POWERED_BY__>..<__LOGIN_TITLE__>DataObject.ServiceCompany.login_title.Username</__LOGIN_TITLE__>..<__PROMOTION_URL__></__PROMOTION_URL__>..<__MEETING_PRIVILEGE__>65535</__MEETING_PRIVILEGE__>..<__ABOUT_URL__>http://www.rhubcom.com</__ABOUT_URL__>..<__PUBLISHER__>RHUB Communications, Inc.</__PUBLISHER__>..<__C
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9216
                                                        Entropy (8bit):2.198346257931369
                                                        Encrypted:false
                                                        SSDEEP:24:F+vdfet1NDbTBR2cXovYePne99KLzaRYJLHYLTYLSC3vDCeKLvd/9ziqeKLjpztl:ydfK2NY2IkfmrCp8YI3
                                                        MD5:180D45BE65098DA1E2D0F72795581C5D
                                                        SHA1:B4B90F594BF1B1A0603D28A6342CC2052BB010C8
                                                        SHA-256:C8A22EE90C0E0DB5877FD047EA957452D827A077C5A823C2FF6A0A3E6D421A52
                                                        SHA-512:F65A2667A5DBAEE134C7B744E60B9A442A72AE6EAD97501180DA0E1B058FE5F33864D9B91DAF2057C205DB46276AD4B15D8F8D4AF131C0C9B1A2EB5A90E32B01
                                                        Malicious:false
                                                        Preview:GEX}`q4r.....T44.....@ .........................................................................9......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):736
                                                        Entropy (8bit):4.513279028548777
                                                        Encrypted:false
                                                        SSDEEP:12:bytbNeFS9GgAGkv5kxv5Mh7oxunsifnrNodoh3Tx3BpxUBQrlmortZUgn:bC30xoqhu6VrUohlxDpb1n
                                                        MD5:123758BC7261FD214AD5E454A829656D
                                                        SHA1:9C661C902118488DFF2B5E29A5182CE63C8A3A77
                                                        SHA-256:3957EDDA90CDFE0FF751F563CBD3C864F3541A9D67E505108478904216577ABE
                                                        SHA-512:ABD8A13FBFDE33088C84399190BEA9BE73AF1AF1921A8A4111675FC1683E0D6BC20013D04EBA0899E68292B24D54BD2DEFA6457433681D98D39B4412F6DC5102
                                                        Malicious:false
                                                        Preview:<__Configure__>..<__CLIENT_NETWORK_DEVICE__>eth0</__CLIENT_NETWORK_DEVICE__>..<__CLIENT_WIRELESS_NETWORK_DEVICE__>wlan0</__CLIENT_WIRELESS_NETWORK_DEVICE__>..<__CLIENT_HARDWARE_MODEL__>X86_CLIENT</__CLIENT_HARDWARE_MODEL__>..<__CLIENT_PRODUCT_MEETNG_PRIVILIGE__>2147483647</__CLIENT_PRODUCT_MEETNG_PRIVILIGE__>..<__CLIENT_PRODUCT_TYPE__>0</__CLIENT_PRODUCT_TYPE__>..<__CLIENT_PLATFORM__></__CLIENT_PLATFORM__>..<__CLIENT_SERIAL_NUMBER__>0</__CLIENT_SERIAL_NUMBER__>..<__CLIENT_PRODUCT_MODEL__></__CLIENT_PRODUCT_MODEL__>..<__CLIENT_PRODUCT_RESOLUTION__>720</__CLIENT_PRODUCT_RESOLUTION__>..<__CLIENT_NAME__>TurboMeeting</__CLIENT_NAME__>..<__CLIENT_KEY__></__CLIENT_KEY__>..<__CLIENT_SUB_TYPE__>1</__CLIENT_SUB_TYPE__>..</__Configure__>
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):113400
                                                        Entropy (8bit):6.717039641153143
                                                        Encrypted:false
                                                        SSDEEP:1536:rBZE+BiaIZbzwd3xHqouKOvjFC5siqiF2Cml9wsW5cdYP0ipZnlBpV2q73hG8:rfPBevwdBHqouK2OF2fxYPhpZnlBpVQ8
                                                        MD5:DFC9A458625B2095D18A17FF37EEDE74
                                                        SHA1:7B397E54EB28167DBA481B0AE6A64D8B72A24DCA
                                                        SHA-256:AE13B7B55095775805A2A2D0AB8DD224678B1F08556252431107A9F3AA3A0FF3
                                                        SHA-512:6B027EA5AE8BF21ACEC150D9B56C9FA8579E2F3BF357F17BF3ED08E9D2C37C3D194FDB4207A04D9B3E2FE700A6660AD28B9655E40764A78951EC312878660C92
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........M..AM..AM..A.,>AG..A.,<A;..A.,=AU..A...@Q..A...@B..A...@_..AD.\AH..AM..A,..A...@O..A...@L..A..0AL..A...@L..ARichM..A................PE..L.....Z`...........!......................................................................@.........................`u......Hv..<........................6......,....m..T............................n..@...............<............................text...+........................... ..`.rdata..`m.......n..................@..@.data................f..............@....HookSha.............n..............@....rsrc................p..............@..@.reloc..,............r..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):113400
                                                        Entropy (8bit):6.717039641153143
                                                        Encrypted:false
                                                        SSDEEP:1536:rBZE+BiaIZbzwd3xHqouKOvjFC5siqiF2Cml9wsW5cdYP0ipZnlBpV2q73hG8:rfPBevwdBHqouK2OF2fxYPhpZnlBpVQ8
                                                        MD5:DFC9A458625B2095D18A17FF37EEDE74
                                                        SHA1:7B397E54EB28167DBA481B0AE6A64D8B72A24DCA
                                                        SHA-256:AE13B7B55095775805A2A2D0AB8DD224678B1F08556252431107A9F3AA3A0FF3
                                                        SHA-512:6B027EA5AE8BF21ACEC150D9B56C9FA8579E2F3BF357F17BF3ED08E9D2C37C3D194FDB4207A04D9B3E2FE700A6660AD28B9655E40764A78951EC312878660C92
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........M..AM..AM..A.,>AG..A.,<A;..A.,=AU..A...@Q..A...@B..A...@_..AD.\AH..AM..A,..A...@O..A...@L..A..0AL..A...@L..ARichM..A................PE..L.....Z`...........!......................................................................@.........................`u......Hv..<........................6......,....m..T............................n..@...............<............................text...+........................... ..`.rdata..`m.......n..................@..@.data................f..............@....HookSha.............n..............@....rsrc................p..............@..@.reloc..,............r..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):113400
                                                        Entropy (8bit):6.717039641153143
                                                        Encrypted:false
                                                        SSDEEP:1536:rBZE+BiaIZbzwd3xHqouKOvjFC5siqiF2Cml9wsW5cdYP0ipZnlBpV2q73hG8:rfPBevwdBHqouK2OF2fxYPhpZnlBpVQ8
                                                        MD5:DFC9A458625B2095D18A17FF37EEDE74
                                                        SHA1:7B397E54EB28167DBA481B0AE6A64D8B72A24DCA
                                                        SHA-256:AE13B7B55095775805A2A2D0AB8DD224678B1F08556252431107A9F3AA3A0FF3
                                                        SHA-512:6B027EA5AE8BF21ACEC150D9B56C9FA8579E2F3BF357F17BF3ED08E9D2C37C3D194FDB4207A04D9B3E2FE700A6660AD28B9655E40764A78951EC312878660C92
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........M..AM..AM..A.,>AG..A.,<A;..A.,=AU..A...@Q..A...@B..A...@_..AD.\AH..AM..A,..A...@O..A...@L..A..0AL..A...@L..ARichM..A................PE..L.....Z`...........!......................................................................@.........................`u......Hv..<........................6......,....m..T............................n..@...............<............................text...+........................... ..`.rdata..`m.......n..................@..@.data................f..............@....HookSha.............n..............@....rsrc................p..............@..@.reloc..,............r..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):233720
                                                        Entropy (8bit):6.298697976196144
                                                        Encrypted:false
                                                        SSDEEP:6144:KSJ0P6jSLEpJ1RZlR4lGitKd50fAOhso6iZGD:66jSLoJp4lGi4jID6iZA
                                                        MD5:CA2C90A15E0B8701A71B28E875865F35
                                                        SHA1:319C1961F05D1D6C31984D141B91B870DC0B1EFA
                                                        SHA-256:7AEECEDC2D37BD3AD549851121CCFED9B9D62285DB474735998C8EA741DCA867
                                                        SHA-512:AC3CB38535A0D48B5EA14EC89868FDF9B5EEA0BBC51ED11D59FF83FC43A5286AA67E7F5896434200CB0C615270DC6A1BA4F901C0CFF6A79FA6A8B9D913872F31
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........k.~8.~8.~8..}9.~8..{9p.~8..z9.~8..}9.~8..{9.~8..z9.~8...8.~8..8u.~8_.{9..~8_.8.~8_.|9.~8Rich.~8........................PE..L.....1`.............................E............@.................................5.....@.................................D...x....................Z...6......@...0...T...............................@............................................text............................... ..`.rdata..............................@..@.data............b..................@..._RDATA.. ....p......................@..@.rsrc................8..............@..@.reloc..@........ ...:..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):786984
                                                        Entropy (8bit):6.461738695456927
                                                        Encrypted:false
                                                        SSDEEP:12288:8Np51L0Z775xs2qnf8PtVXJSLKlK4pKJe5d0nocsxa3k48118t/HY4EErtkTd2hM:6JL0Z/mnet60yocssl8gY4hkTd2hCM+
                                                        MD5:C28568A1EB37159185590BCCF20F9866
                                                        SHA1:DFE01651DA872470E686C2BE78400C80C98FA450
                                                        SHA-256:ED500E8A0B1260F47EF142B06CF08AF8719D003F227C5EF48DD0166C6456D941
                                                        SHA-512:476324F2E9BA91053145A77D36D26020318EE12F336D056861D9556E989771D134FF65BFA18F5090419DA131B082A711635C0E37592551AF25E0BD0575C14F9C
                                                        Malicious:false
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......I.A.../.../..././.,..././.*.././.+.../....../....../....../._.+.../._.,.../.<..)./._.*.../...+.../....../......./...*.../....../......./...-.../.Rich../.........PE..L.....{_.................z..........3;............@......................................@.....................................@....P..0...............(....@......[..T....................\......H\..@...............`............................text...!x.......z.................. ..`.rdata...s.......t...~..............@..@.data...0,..........................@..._RDATA.. ....@.......t..............@..@.rsrc...0....P.......~..............@..@.reloc......@.......b..............@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):785584
                                                        Entropy (8bit):6.4611685242844645
                                                        Encrypted:false
                                                        SSDEEP:12288:YNp51L0Z775xs2qnf8PtVXJSLKlK4pKJe5d0nocsxa3k48118t/HY4EErtkTd2hf:eJL0Z/mnet60yocssl8gY4hkTd2hCMl
                                                        MD5:8CE1DC1E87F955F2529CA7A796AD8820
                                                        SHA1:9A51C28787D5AD0363DC33FCBCEDD3995F855482
                                                        SHA-256:27773D79B0AE6A473909434BF72642C2098B649F4033139BC06C274ADA88E3BE
                                                        SHA-512:D40A82436183802F31E492D2C14CA4B3559EDC24975DD937BBF6A7588F6595C24DD67B417CD109AAEED49DFBA6319AA575047386BC08A859D5DBE8FD7DF75941
                                                        Malicious:false
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......I.A.../.../..././.,..././.*.././.+.../....../....../....../._.+.../._.,.../.<..)./._.*.../...+.../....../......./...*.../....../......./...-.../.Rich../.........PE..L.....{_.................z..........3;............@.................................n.....@.....................................@....P..0....................@......[..T....................\......H\..@...............`............................text...!x.......z.................. ..`.rdata...s.......t...~..............@..@.data...0,..........................@..._RDATA.. ....@.......t..............@..@.rsrc...0....P.......~..............@..@.reloc......@.......b..............@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):89192
                                                        Entropy (8bit):6.575566498006661
                                                        Encrypted:false
                                                        SSDEEP:1536:3D+xbSVMbhA4oCpgk5czAwxNmO5fkHy3hG:3DavbjslxNmO5fE
                                                        MD5:E0861D6F2836555E2C1E5F223234A9F1
                                                        SHA1:C2F9C1B8EB85722B5EF83E080C78D5E378CB5210
                                                        SHA-256:84F0B260E146D07F0BE5A0C61CABCAEFE5288850A707F073B5EBC8FAAEC408C5
                                                        SHA-512:04F7D3943E49A54D45ABE55EE93DE1772A5C1183A994DB521A9234C0B21D0211CADDB2968B2B3C4E922E50DB328CC4402043FF30B3E9CE5A69A18F6B31347C46
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o.d.+...+...+....4w.;....4d......4g.O....4q.&...+...Z....4x.(....4p.*....4r.*...Rich+...........................PE..L...@s.O.....................P......o.............@..........................0.......f............................................... ..............0'..85..............................................@............................................text............................... ..`.rdata..v,.......0..................@..@.data...|,..........................@....rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):380152
                                                        Entropy (8bit):6.523803406973679
                                                        Encrypted:false
                                                        SSDEEP:6144:2D5CTBgdxPf1wwbe0HZKfjhsjYwAwzxOl4GYlOhwK09Y+066zNvGC5GJAOktkTBZ:2MTBgdxXKwq0HZKfjhQYwz2iY+azNeCw
                                                        MD5:BA7323CFA2E6B7A11E61E5C8621141CF
                                                        SHA1:BB49041C3257CE0A159C3AA49D0FCFF093A24921
                                                        SHA-256:0C4F996D1AA194951D756DE74514F7A1D03F68270E33F3C7E7B5DCF262885166
                                                        SHA-512:19ABBD2F944BDCFB1770B31537206AD3610BCFE566CA25E23E172C14F17575E04A13C10CD08B8FB202515D43237504A341046E9EB7D34410B07F370DE282BE9A
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............iI..iI..iI..jH..iI..lHS.iI..mH..iI.-.I..iI..jH..iI..lH..iI..mH..iI0.mH..iI..hIL.iI...I..iI0.lH..iI0.I..iI0.kH..iIRich..iI........PE..L.....Z`..........................................@..........................`...........@.................................D........ ...................6...0.../......T...............................@...............8............................text............................... ..`.rdata..pV.......X..................@..@.data............h..................@..._RDATA.. ............Z..............@..@.rsrc........ .......d..............@..@.reloc.../...0...0...f..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):688888
                                                        Entropy (8bit):6.576995195781194
                                                        Encrypted:false
                                                        SSDEEP:12288:UUYb14nVcVw3h4sj2w2QE2uSBlK4bLgyQVW8Xgp1IW6ce+dFqtkTHz+Lqh/:UYnVcV9Y2wFBJF8Xgpm+e+dwkTTJh/
                                                        MD5:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        SHA1:5229D88A9E650430719DC5317F8F7601117EF637
                                                        SHA-256:11B64793473C88AA0EF2F9BDE703E9494495029D416E76D954FD3F044EF8FC10
                                                        SHA-512:7D898F74D292C23D8F38A29C2C3D8C2E8F6D610C2CCA5B89B5273222A6E31DB078C266A25C4072533DB4F907BA4F3FC700E020A4E7EBD4FBB4D4EA13D0FAA0A3
                                                        Malicious:false
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........[^...^...^...J...N...J.......J...H......._...W.L._.......}.......B...o.5.N..........W.K.T.......W...^......W.[.........O.....7._......._...Rich^...........PE..L.....Z`.....................Z......x.............@..........................p......}.....@..................................N..,....................L...6.......l......T...............................@............................................text...3........................... ..`.rdata..8o.......p..................@..@.data....n...p...|...V..............@..._RDATA.. ...........................@..@.rsrc...............................@..@.reloc...l.......n..................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):688888
                                                        Entropy (8bit):6.576995195781194
                                                        Encrypted:false
                                                        SSDEEP:12288:UUYb14nVcVw3h4sj2w2QE2uSBlK4bLgyQVW8Xgp1IW6ce+dFqtkTHz+Lqh/:UYnVcV9Y2wFBJF8Xgpm+e+dwkTTJh/
                                                        MD5:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        SHA1:5229D88A9E650430719DC5317F8F7601117EF637
                                                        SHA-256:11B64793473C88AA0EF2F9BDE703E9494495029D416E76D954FD3F044EF8FC10
                                                        SHA-512:7D898F74D292C23D8F38A29C2C3D8C2E8F6D610C2CCA5B89B5273222A6E31DB078C266A25C4072533DB4F907BA4F3FC700E020A4E7EBD4FBB4D4EA13D0FAA0A3
                                                        Malicious:false
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........[^...^...^...J...N...J.......J...H......._...W.L._.......}.......B...o.5.N..........W.K.T.......W...^......W.[.........O.....7._......._...Rich^...........PE..L.....Z`.....................Z......x.............@..........................p......}.....@..................................N..,....................L...6.......l......T...............................@............................................text...3........................... ..`.rdata..8o.......p..................@..@.data....n...p...|...V..............@..._RDATA.. ...........................@..@.rsrc...............................@..@.reloc...l.......n..................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):228600
                                                        Entropy (8bit):6.309001563878647
                                                        Encrypted:false
                                                        SSDEEP:6144:MQyEgGJDxpO0ZTXmcANoEEZwBXcAOBXCs9:MQiGJDxpO0ZTXrWcPCm
                                                        MD5:F7A57D58DE9E992509F28477D85EA442
                                                        SHA1:48747FE9CA9D804110462FBEBCC13F4519230443
                                                        SHA-256:B660B3F98E2C45770AF8421E75D7CF7AF71BD7AF8A30EFD4091E75F4D664B2B3
                                                        SHA-512:C12118B16E606CAC969B30462EB0AF501AC7E53A1DFC6BC0635AE3E6C62AA659085DCF19E499F874141CCEBC15245246BCBFA7BA15ECDF5148884A6599B737C8
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........*.E~D.E~D.E~D.Q.G.J~D.Q.A.~D.Q.@.S~D...G._~D...A.~~D...@.g~D.E~E..~D.L...J~D...A.M~D.....D~D.E~..D~D...F.D~D.RichE~D.........................PE..L.....Z`.............................E............@.......................................@.....................................d....`..p............F...6...p..,...@...T...............................@............................................text............................... ..`.rdata..d...........................@..@.data....y.......d..................@..._RDATA.. ....P......................@..@.rsrc...p....`......."..............@..@.reloc..,....p.......(..............@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):99064
                                                        Entropy (8bit):6.4536950605419445
                                                        Encrypted:false
                                                        SSDEEP:1536:6SlMHB4rjEkU0TzZsURSuu8rsWlcdbbr4ndQeR4Xj3h8bS:6xerjU0TzZQlfbAJDbS
                                                        MD5:DD12C30E38FD57D25CD75B07E679330B
                                                        SHA1:00C725161356A75121A393F8615641DA10EDA4C6
                                                        SHA-256:0C168E4E9AEA222BBCB4EEC3E61FA72B528F7276492FA4BACAE029241B3808EB
                                                        SHA-512:8555D52DEA80903B5333E94697A0A26DBC0A0FAEF5E833C030C1D45D4BD300219193D7124A4B7E8B8E9FEFDC862B1B8433610AC703149ADD39BFBC0B49264160
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w%...K...K...K..}H...K..}N.n.K..}O...K..~N...K..~O...K..~H...K..n...K...J...K.C.N...K.C.K...K.C.....K......K.C.I...K.Rich..K.........PE..L.....Z`...........!.................................................................W....@.................................0...<....@..h'...........L...6...p..........T...........................8...@............................................text...7........................... ..`.rdata..~X.......Z..................@..@.data........ ......................@....rsrc...h'...@...(..................@..@.reloc.......p.......>..............@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):365304
                                                        Entropy (8bit):6.394569981481964
                                                        Encrypted:false
                                                        SSDEEP:6144:L15MyaGTrkrrNsg2OVHdlpIuGeqjPINDerbQ9mErScI0ILd+AOIkTBXvXvi:LjMyaGTrbgJVHdlpIuPqjeDHQd+WkTZK
                                                        MD5:26AC20E2F474AC15E0785770931001C3
                                                        SHA1:2BB6CC026B7766D2BACF71E257836771DD8EA462
                                                        SHA-256:2A8A64EBBFBFFDA40DB3EB7F6DD9EFAB0143818637914B6246FBA81D938FA897
                                                        SHA-512:C8669A17D1F4CE7C49325905FC3632FAA420835C775196B6346252BD3F354B86E96EEECCFD1D654F278111F72F61E038D45944BBE8AF75715C650039434644CF
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n..@...@...@...Td..O...Td......Td..V....a.A....g..Z....g..b....g..~....f..F...@.......Iw5.U....f..K....fY.A....f..A...Rich@...........................PE..L...d.Z`.................B...................`....@..........................0......9.....@.................................@........................\...6..............T...............................@............`..........@....................text....A.......B.................. ..`.rdata..<S...`...T...F..............@..@.data...............................@..._RDATA.. ............ ..............@..@.rsrc................*..............@..@.reloc...........0...,..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):113400
                                                        Entropy (8bit):6.717039641153143
                                                        Encrypted:false
                                                        SSDEEP:1536:rBZE+BiaIZbzwd3xHqouKOvjFC5siqiF2Cml9wsW5cdYP0ipZnlBpV2q73hG8:rfPBevwdBHqouK2OF2fxYPhpZnlBpVQ8
                                                        MD5:DFC9A458625B2095D18A17FF37EEDE74
                                                        SHA1:7B397E54EB28167DBA481B0AE6A64D8B72A24DCA
                                                        SHA-256:AE13B7B55095775805A2A2D0AB8DD224678B1F08556252431107A9F3AA3A0FF3
                                                        SHA-512:6B027EA5AE8BF21ACEC150D9B56C9FA8579E2F3BF357F17BF3ED08E9D2C37C3D194FDB4207A04D9B3E2FE700A6660AD28B9655E40764A78951EC312878660C92
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........M..AM..AM..A.,>AG..A.,<A;..A.,=AU..A...@Q..A...@B..A...@_..AD.\AH..AM..A,..A...@O..A...@L..A..0AL..A...@L..ARichM..A................PE..L.....Z`...........!......................................................................@.........................`u......Hv..<........................6......,....m..T............................n..@...............<............................text...+........................... ..`.rdata..`m.......n..................@..@.data................f..............@....HookSha.............n..............@....rsrc................p..............@..@.reloc..,............r..............@..B........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):18097912
                                                        Entropy (8bit):6.861983414670908
                                                        Encrypted:false
                                                        SSDEEP:393216:vpxpeembSbs3WKtQ3qitDvUgGxbt9pJFFZm/C:YembH5tMqpgGxbt9pB
                                                        MD5:D973EE70262ADF0A3D8AC412964517F9
                                                        SHA1:5EFF4B9800B66D63213162E7BB009928F86DDBFD
                                                        SHA-256:BD69CC4974617A01D2759AAB58CDDE4AF9199B8102E325178C2AE043E6783E28
                                                        SHA-512:931152E6FE92E58F22EAB65CC693C69736238333078BFEDD294E2D7A547EA6A0179281DB37395C52558A09DEFE48E35AB927539D2A425D0B2587B15FACB271C7
                                                        Malicious:true
                                                        Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$..........W......................7..........]S/................................W...T.......`.......................l..............{......k.......&.....f.........C.....f.......f.......f...............f.......Rich....................PE..L.....Z`.....................xk.....l.X...... ....@...........................*..........@.................................<.............&..............6...p".4H.. ...T...................t.......8I..@............ ..h...P...`....................text............................. ..`.rodata.@.......................... ..`.rdata..d.$.. ....$.................@..@.data....U...@......................@..._RDATA..............................@..@.rsrc.....&.......&.................@..@.reloc..4H...p"..J..................@..B................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):111
                                                        Entropy (8bit):3.8883890193690394
                                                        Encrypted:false
                                                        SSDEEP:3:oG22qM6sSkZ8g22qM6sSkxZ926kmm26XsriQgm6kmm26XsriM:XHSaHSQsU3g2U5
                                                        MD5:6A8CE1982E0DD43B41C7F1D67382AE9D
                                                        SHA1:9347BF3EB2A583C1FCAB57E2D4094F36E9BBB225
                                                        SHA-256:2CB2CE581DC4EC484E2F4A16C91B68E7C3D403999A33FC4B67B03D9D903CB0DD
                                                        SHA-512:FD4E7D713BE5101DD1A3C95565DD640252D90AD7D345CFF193D6E38C7ED236EA39A4CBB75BCE39B11E5E5B0FE368DF8772ED1D3895A8B49007C24710EEB18B9F
                                                        Malicious:false
                                                        Preview:<__ACCESSORY_INSTALLED__>N</__ACCESSORY_INSTALLED__>..<__SERVER_ACCESS_SETTING1__></__SERVER_ACCESS_SETTING1__>
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1229112
                                                        Entropy (8bit):6.534748097696273
                                                        Encrypted:false
                                                        SSDEEP:24576:Z5iAmT4V1XZv3lY0XdaqaYxzxYjievUibP4:t6sc2zxYWLh
                                                        MD5:CC17AE159E28D331B7EC39A4F34527F2
                                                        SHA1:68BACD3808895DB9987F11B63C857E288E022C17
                                                        SHA-256:4BBAE6B52A99355E7C695D901151513235E5B0BF01FF8D5345580D6529763B78
                                                        SHA-512:A5BC90DACD81C278ED4BB3BF862AF1406B4C704845C3F5BE7F0927D4350DA790B7A9FD98E774DEAF5A5004251C45C558EEDE1F797B842E305FBFB6CE8D4A9DE5
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................7.f....7.g....6.d..........6.b....6.f....6.g...6.c....6.z....".....6.`....6.e....Rich...........................PE..L...?.JT...........!.....d...........c.......................................@.......S....@A........................pZ..s....B..P....p..................85......h....<...............................J..@............@.......Z..@....................text....c.......d.................. ..`.data............H...h..............@....idata..f....@......................@..@.didat.......`......................@....rsrc........p......................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):98734
                                                        Entropy (8bit):6.213205562122042
                                                        Encrypted:false
                                                        SSDEEP:1536:+JVl8XN4NaW1f4RbY9xf72f6bycIuf/hkBzmoRrHv7jF35Pm:WNaAf2JueR5O
                                                        MD5:E19C646DDC1E5B7AF92280538A863E04
                                                        SHA1:4C87C7FB61DBC211C80A44928E6D121E55BDC929
                                                        SHA-256:4E51C94EED094DC6A0D895366750C80B71F5270A3FC96DD9B8047A85C87D40A7
                                                        SHA-512:CB3D2CB4921EDDC12C49248C54712E503D304F4830DD528F66F45FE986F2C08A49F7C1FF244E470875843DCD99AC0D8B2D1393BF1AA8636435E96171F61401F3
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..PCGUI.PBindToWiFiCameraDialog::OnInitDialog.BindToWiFiCamera...APP...WiFi.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step1.1.............WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step2.2.......WiFi........WiFi...SBC_xxx.........11118888.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step3.3..........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.StartToBind........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.WiFiCameraBindFailedMessage..APP.......................WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Chang
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):98737
                                                        Entropy (8bit):6.215204537239651
                                                        Encrypted:false
                                                        SSDEEP:1536:2UTro5Z6TEq4scziYJT5zObw/+6BflWS+zgqmIWbdKh7lBn1Mzhq/z:2/OEZNiQJ//YSQBWEB1MNyz
                                                        MD5:B34E838E74870B3094DA1DB18FEC92EA
                                                        SHA1:4414DC5F71FACCED09700C12769E61674574ACC7
                                                        SHA-256:3C34B2B116B9017826EB48CF6A6F44EC134FC36F07AD9171B233AC2DC0BFDF34
                                                        SHA-512:F2B81CB346AC3E5296B497FF2E86FC2A12B0875DA8FABA4F6488DAE7AE8720FD86BC50B4DA00E6B17ADF05385A7546E420CAE662A843870B68DB8F7649CA1AC4
                                                        Malicious:false
                                                        Preview:.ItemID.Item.File..PCGUI.PBindToWiFiCameraDialog::OnInitDialog.BindToWiFiCamera...APP...WiFi.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Message..APP......WiFi.....MAC...__WIFI_CAMERA_MAC_ADDRESS__....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step1.1.............WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step2.2.......WiFi........WiFi...SBC_xxx.........11118888.....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step3.3..........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.StartToBind........PCGUI.PBindToWiFiCameraDialog::OnInitDialog.WiFiCameraBindFailedMessage..APP.......................WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Ch
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (548), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):100703
                                                        Entropy (8bit):5.124902678296755
                                                        Encrypted:false
                                                        SSDEEP:1536:+Wb9wI5cfMI/1caAp3PNlYJbNW4fryglWFTNNP1cAZJeYt:+AXBfNNLpt
                                                        MD5:FFC94815BCC52593E591F1DB945DA142
                                                        SHA1:09FD651AD0316F616374809EE23548ACAAB8E0E6
                                                        SHA-256:85A9060D5370A433A147483EA8CD5129D6B77D3FC6C85861BE43E51C83FBB082
                                                        SHA-512:1CC917DE72F7900BAA6E56CF7984EDCC0A9122B77C7C9FC05507D86F87A82827EAED9B58385075CBA9EB6C9E18E7CF44F5339F6F616BD0985F607EF80FB4E7BB
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Scherm delen stoppen...IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.U deelt het scherm...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Maak verbinding met een Bluetooth-apparaat en probeer het opnieuw...UserObject.*.new_meeting_flooded.Er worden te veel nieuwe vergaderingen gemaakt. Gebruik geplande permanente vergaderingen om nieuwe vergaderings-ID's te verminderen....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Sta kijkers toe om te vragen om hun bureaublad te presenteren...GUI::EmailInvitation.OneTapDial.Met ..n tik op de knop...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Je verbinding met de sessie is niet stabiel. Kies een ander netwerk (bijv. Bekabelde verbinding), mobiel apparaat of computer. Doe dan opnieuw mee aan de sessie....MyLogSink::OnLogMessage.StopPhoneCall.De audio-apparaten worden
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (549), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):100929
                                                        Entropy (8bit):5.147580502649148
                                                        Encrypted:false
                                                        SSDEEP:1536:ia4RZIsFlmecKeJYPXI6QhI4LIskWWP1A8/qLb21sakNAEsKq:idpl+KWUUK1KAEsKq
                                                        MD5:822E31DFDFCB95A50B6D28DF87608CD6
                                                        SHA1:9C811ADE35B8F0B7C4B6F69861755539499F10F4
                                                        SHA-256:4A1F173B90493324698E29F089D829D0F6FAAAA728405EBFF602D86D72B77BA6
                                                        SHA-512:A37824FEEC7C3CA968E2DE2C36D213E662C1063D624534E1C420E8F3AD03C0285B6674858C8D6E5C0B7F6D74515F9E21FD01BBCC1E67BFD843F200C568FBCA4E
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..PCGUI.PBindToWiFiCameraDialog::OnInitDialog.BindMessage.Steps to bind this App to a WiFi camera...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.ChangeMessage.You can change the binding by the steps below...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.RemoveBinding.Remove binding...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.ChangeBinding.Change binding...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.WiFiCameraBindFailedMessage.The App failed to bind to the camera. Check if this mobile device has connected with the camera.s WiFi....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.StartToBind.Start to bind...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step3.3. Click the binding button...PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step2.2. Go to your mobile WiFi settings. Select the camera's WiFi name "SBC_xxx" and input password "11118888"....PCGUI.PBindToWiFiCameraDialog::OnInitDialog.Step1.1. Power on the camera and start the camera's WiFi....PCGUI.PBindToWiFiCameraDialog::On
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (640), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):110287
                                                        Entropy (8bit):5.212768658752966
                                                        Encrypted:false
                                                        SSDEEP:3072:B91DfrgmvCPrPalKTebn+Hphc2C0OK5nOL4:B91DfrgmvCzPalKTebnkPc2C0OK5nO0
                                                        MD5:9F9EFFC7E14CFEF695D97BA63D261341
                                                        SHA1:15B649B698ACD53963E3442348EBC729A04B857C
                                                        SHA-256:6F773A3B38D8CE1F077A53655F221559BF36F0A2E5611723167028DE759FB45A
                                                        SHA-512:96193D061C8C92AED1124CF4577A1242A5B0ED4A45176CDBB22486277FC1B9E88896A825C5135C05014ECDF0A1659ECAB079E877F3C9B003CC8588793810FD41
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Arr.ter le partage d'.cran...IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Vous partagez l'.cran...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Veuillez vous connecter . un appareil Bluetooth et r.essayer...UserObject.*.new_meeting_flooded.Trop de nouvelles r.unions sont cr..es. Veuillez utiliser les r.unions permanentes planifi.es pour r.duire les nouveaux ID de r.union....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Autoriser les spectateurs . demander . pr.senter leur bureau...GUI::EmailInvitation.OneTapDial.Une touche de num.rotation...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Votre connexion . la session n'est pas stable. Veuillez choisir un autre r.seau (par exemple, une connexion filaire), un appareil mobile ou un ordinateur. Rejoignez ensuite la session....MyLogSink::OnLog
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (554), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):106207
                                                        Entropy (8bit):5.183805880890507
                                                        Encrypted:false
                                                        SSDEEP:1536:aJjLa8C/+uYoh4kVzmosbCsYJYT8T1BN4UO4m5Bz2JvIxh7tGTvpc:wINVP+OJWhM6
                                                        MD5:9AD8EDBE48A03EA9F026A63D1950F59C
                                                        SHA1:D4CFB9555DDA08DC2582B18C54CED31282F7602E
                                                        SHA-256:326816125FA54D4A09723807EF47884241B3513E8A52F42CAD66AC177E040A6D
                                                        SHA-512:E358C2B7A9827D14A8DED104F79A613C765042A016073FE166E40BBD0500EC0D129169180FA3F3745635378DBF4F9E7903F812B2EE9C8A713A9EBAF3F9211CFE
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Beenden Sie die Bildschirmfreigabe...IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Sie teilen den Bildschirm...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Stellen Sie eine Verbindung zu einem Bluetooth-Ger.t her und versuchen Sie es erneut...UserObject.*.new_meeting_flooded.Es werden zu viele neue Besprechungen erstellt. Verwenden Sie geplante permanente Besprechungen, um neue Besprechungs-IDs zu reduzieren....PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Su conexi.n a la sesi.n no es estable. Elija una red diferente (p. Ej., Conexi.n por cable), dispositivo m.vil o computadora. Luego vuelve a la sesi.n....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Erm.glichen Sie den Zuschauern, die Pr.sentation ihres Desktops anzufordern...GUI::EmailInvitation.OneTapDial.Ein Fingertipp...MyLogSink::OnLogMe
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (545), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):106960
                                                        Entropy (8bit):5.094814632767334
                                                        Encrypted:false
                                                        SSDEEP:1536:xyuuPyyX/7kfVZNyPBqYV7jRRHXkRX4lKSFHEkYcvdRKU33LQ:JY/gNyPBqMdvdsUHLQ
                                                        MD5:555BA58246B88D60247B6C9D6FA9106F
                                                        SHA1:B040E9A84618FBD0340755C500F92CE9E692A0A8
                                                        SHA-256:FC60DF878A62C597BF669F24178E1AEB73D619F15385CAC798A654120141012C
                                                        SHA-512:921AA1946E07ECBEDD00A0AD2D58442820C17FE310FE1F6D0CA6F464A773F7EA6EFF64E315D319E79F9644ADAC66B65D6F02A147A941A5F1F9C05580C7034C21
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Stai condividendo lo schermo...IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Ferma la condivisione dello schermo...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Connettiti a un dispositivo Bluetooth e riprova...UserObject.*.new_meeting_flooded.Sono state create troppe nuove riunioni. Utilizzare riunioni permanenti programmate per ridurre i nuovi ID riunione....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Consenti agli utenti di richiedere di presentare il proprio desktop...GUI::EmailInvitation.OneTapDial.Quadrante con un tocco...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.La tua connessione alla sessione non . stabile. Scegli una rete diversa (ad es. Connessione cablata), dispositivo mobile o computer. Quindi riconnettiti alla sessione....MyLogSink::OnLogMessage.StopPhoneCall.I dispositivi audio veng
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (317), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):115144
                                                        Entropy (8bit):6.00340553785929
                                                        Encrypted:false
                                                        SSDEEP:1536:YzqVDx79PZLoxGAr36wb2cY/1w2E4i91sG9z1aknzGBp:Y7w6RNc
                                                        MD5:F8FA38EBCA233B3B805311979EC31646
                                                        SHA1:850778B2F3949D28C858534720E4CD1E154786F9
                                                        SHA-256:E45D81061CF6ED74405D4EBF3BC530489F6A780B84DF510894F8B0A8D4D8A89E
                                                        SHA-512:C72C9A783E34DB019FD4FBB251018B215D2157FDDC70D273E76C3E5B59AA836097ED22CC341093BECCE8C367B89F03503F636D93070AC4C2988A738E6D5C5917
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader..............IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing...........IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Bluetooth..........................UserObject.*.new_meeting_flooded.................. .....ID.................................PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent............................GUI::EmailInvitation.OneTapDial.............PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.................... ...................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (371), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):111713
                                                        Entropy (8bit):5.192325235869865
                                                        Encrypted:false
                                                        SSDEEP:1536:bW+KreYBSzy/PYiMinpCLmQnPHYKhGcVQwfujuAbjyftfJBiW/nv2hY3:a+KyzoP3MiuHPEna0m
                                                        MD5:6A3E7509311BE81CC2FFCAD1B697F3BD
                                                        SHA1:E24348698A2F8E316D017A47903683B08B7EC9CB
                                                        SHA-256:5A92A07D17108EA6D852108731A2F7CB92F610AD485505D7F8F02BAFF5F5184F
                                                        SHA-512:8ACD6DDD22FC65E7745691E27CA811885C7F9C760191BEBCC9108269745B5A284FF5D6B884E3E45C662FE2D9392EF2A6AD46DE4A73E28C70409CC58FB45539E1
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Voc. est. compartilhando a tela...IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Interromper o compartilhamento de tela...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Conecte-se a um dispositivo Bluetooth e tente novamente...UserObject.*.new_meeting_flooded.Muitas reuni.es novas s.o criadas. Use reuni.es permanentes agendadas para reduzir os novos IDs de reuni.o....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Permitir que os espectadores solicitem a apresenta..o de sua .rea de trabalho...GUI::EmailInvitation.OneTapDial.Marca..o com um toque...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Sua conex.o com a sess.o n.o . est.vel. Escolha uma rede diferente (por exemplo, conex.o com fio), dispositivo m.vel ou computador. Em seguida, volte . sess.o....MyLogSink::OnLogMessage.StopPhoneCall
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (616), with CRLF, CR line terminators
                                                        Category:dropped
                                                        Size (bytes):106752
                                                        Entropy (8bit):5.170056613944853
                                                        Encrypted:false
                                                        SSDEEP:1536:Q7fLnQkna9+AEKjKsbC85Yzg13U6J+Jtr2FphWz9Brw5Mv:QLa4HkdwDw5Mv
                                                        MD5:59F4A43B89E599128DA95F68C6C93C5E
                                                        SHA1:5DE54065488D0417EC2C655F156FC6EDC173ECB4
                                                        SHA-256:B27C22AC64E6D231AE4C17CB93E0A889D376F24EA44864AC15349C7F70C94910
                                                        SHA-512:A016029C5A9288755C96793FDBECFC2663FFC3B6C3E6DB28B9A786D52458D8B9B4500FB923D1D58CA282EC92D1430DC550D368D664E8EE3F7BACABFBE4434D5A
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..IOSGUI.SharingWindowController::CreateScreenStreamingView.ScreenSharingHeader.Est.s compartiendo pantalla...IOSGUI.SharingWindowController::CreateScreenStreamingView.StopScreenSharing.Dejar de compartir pantalla...IOSGUI.AppDelegate::UseBluetoothAudioDevice.BluetoothConnectionError.Bluetooth..........................UserObject.*.new_meeting_flooded.Se crean demasiadas reuniones nuevas. Utilice las reuniones permanentes programadas para reducir las nuevas identificaciones de reuni.n....PCGUI.PColorLevelSettingDialog::OnInitDialog.ViewerCanRequestToPresent.Permitir que los espectadores soliciten presentar su escritorio...GUI::EmailInvitation.OneTapDial.Dial de un toque...PCGUI.PhysicalGUI::StopReconnecting.StopReconnectMessage.Su conexi.n a la sesi.n no es estable. Elija una red diferente (p. Ej., Conexi.n por cable), dispositivo m.vil o computadora. Luego vuelve a la sesi.n....MyLogSink::OnLogMessage.StopPhoneCall.La
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:Unicode text, UTF-8 text, with very long lines (555), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):68108
                                                        Entropy (8bit):5.415653899818446
                                                        Encrypted:false
                                                        SSDEEP:1536:yNpOdmNoOlqF6sVw9uue4XE/ZIwSzpx06:CpOdmNY6v8uE/SwS166
                                                        MD5:01E157ED08E05ED80052AD8DF404B530
                                                        SHA1:FD6229C6410350C30D5B7907DB42C521FC3EDB62
                                                        SHA-256:295A963CCE972904ACF33153C7CAF731027A36B5B8F5249EAAFC5B5D03012D67
                                                        SHA-512:1EEE1112B12FB3FEAC86F9555AF20AB1A16EBF0FDDE09004D4A294603B4BC9A15105B6453BB31B2741998BA781527B339F5174D04B7FA3792172035C20582F0A
                                                        Malicious:false
                                                        Preview:ItemID.Item.File..EmailInvitation::CreateEmailMessage.TipsWireless..PUCU : Ekran tazelemesinin yava.lamas.n.n ve kesilmelerin .nlenmesi i.in telsiz ba.lant.lardan ka..n.n....EmailInvitation::CreateEmailMessage.TipsHeadset.Mikrofon ve hoperl.r.n.z. kullanmak i.in kulakl.k gereklidir (VoIP)....EmailInvitation::CreateEmailMessage.OptionalNumbers..ste.e Ba.l. Numaralar...PCGUI.PAttendeeListDialog::OnRightClickAttendeeList.MoveToTheTop..ste git...PCGUI.PAttendeeListDialog::OnRightClickAttendeeList.ShowInShortList.K.sa Listede G.sterim...PCGUI.PAttendeeListDialog::OnRightClickAttendeeList.ChatTo.Sohbet mesaj. g.nderimi...PCGUI.PAttendeeListDialog::OnInitDialog.ParticipantList.Kat.l.mc. Listesi...PCGUI.PHostMeetingDialog::DisplayAlertMessage.WebinarAlertMessage.Kat.l.mc.lar VoIP kullanamazlar....PCGUI.PAttendeeControlDialog::OnInitDialog.RaiseHand.S.z alma iste.i...PCGUI.PAttendeeControlDialog::OnInitDialog.LowerHand.S.z alma iptali...PCGUI.PHostControlDialo
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:MS Windows icon resource - 6 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):22486
                                                        Entropy (8bit):3.442256410134587
                                                        Encrypted:false
                                                        SSDEEP:384:AD/IIsIIED9mDKzj8gmUf+SJHgIIsIIzCvA2TDv:oIIsIIJgmUf+ugIIsIIzCvlTDv
                                                        MD5:883746CDA8ECF40EF07D2F26A687E550
                                                        SHA1:88D8D8D7676AE4890C06ACED19212122BE59F44E
                                                        SHA-256:4435E5C62BE3B529D5E2100B5F1F57EDCC2BE82281601313BC8594E52C445D66
                                                        SHA-512:A8CA2E91AAC490EAEEEEEEAF21F9DE64FC1E24A5D690790BEC09E694A3738F12FB4FCADEA799FC54F9D4B766A5C951873F39BB4875E5D58B75243B4E2833F018
                                                        Malicious:false
                                                        Preview:......00..........f... ......................h.......00.... ..%...... .... ......B........ .h...nS..(...0...`.......................................'Z..&W..,f..+c..(]..ff..ff3.fff.ff..ff..f...f.3.f.f.f...f...f...f...f.3.f..f...f...f...f.3.f...f................3...............33...f..3.......f...f3..3f..f...f...3....3...f...................3.f.f..................3...f...................3...f..........3...33..3f..3...3...3...f...f3..ff..f...f...f......3..f................3...f..................3...f...............3...f......3...33..3f..3...3...3...f...f3..ff..f...f...f........3...f...................3...f..............3...f.........ff..f.f.f....ff..f....f.!...___.www.....................................................................................xTk..F..p)..'Z..'Z..'Z..'Z..'Z..'Z..'Z..'Z..'Z..........................................................................xTk..F...(......................................................................'Z..'Z..'Z..'Z..'Z..'Z..'Z..'Z
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):15086
                                                        Entropy (8bit):5.268540394824082
                                                        Encrypted:false
                                                        SSDEEP:192:jG8oSNa2uVZZXk6w+tldx2+E5K7sWpK0nqNeSMAo80TxzHOOTvVmASzc:jGSNHuVZjN7a5KIWGo80BBvVlD
                                                        MD5:F366C80B222E8E83D5EC6D90959C2C45
                                                        SHA1:CBEFD8DC9C8E342C6165D0F9C1FCFB177D2E01BE
                                                        SHA-256:8CD38C8E1A62198BEA0BCC85C0B339A835E460ED08A8D8C98BE524B528F07531
                                                        SHA-512:DB1C073C9A7837D8D3D1E3F654C8C95060971130CDD527CDD1365CDFE48CC2BED963FB0D574A4705BA92E2E70102F73795ADF97EDF9EDAAB3EEEFAA03D3E8517
                                                        Malicious:false
                                                        Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%...............................................................................t.......n.%.s...t...r...r...r...r...r...r...r...r...t...s...p.(.....t.......................................................................................................................s.......p.U.r...n...k...n...o...p...p...p...p...o...n...k...n...s...p.Z.....v...............................................................................................................q.......o.@.r...m...1.....................................3..m...s...o.F.....q.......................................................................................................m...........s...m...A..................................................F..m...s...R.......n...........................................................................o...s...v...t...r...p...p.......p.(.r...r.............U..Q..F..C..C..E..O..T.............s...r...r.,..
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PNG image data, 64 x 64, 8-bit/color RGB, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):1867
                                                        Entropy (8bit):7.3280619152848905
                                                        Encrypted:false
                                                        SSDEEP:48:0wqQNn2xUJ3fw0ww2sq4fl7OYo8QUDTNVS4XrAK9:kY2L0J2l49yx8FDTJT
                                                        MD5:2CFEED234A8558FAFA50655ACB115FD8
                                                        SHA1:2FFB1A9FE6536723E96AE500554D3ABEED2147FC
                                                        SHA-256:615861E3BE02B7EBCF9378BBFEEFE969B503A11C738DFBD9A6514029205646F9
                                                        SHA-512:DA7E66A2DA8EB2363583A9C055B590385412BB924FC0D0D28D8CBFDE9567DD0AB98019F1EC752B16F590764C1D287AEB583B90458820A3D6A75C43E59C7B6583
                                                        Malicious:false
                                                        Preview:.PNG........IHDR...@...@.....%......tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:B17AB45350AD11E5B1EDE5C7D0C88953" xmpMM:DocumentID="xmp.did:B17AB45450AD11E5B1EDE5C7D0C88953"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B17AB45150AD11E5B1EDE5C7D0C88953" stRef:documentID="xmp.did:B17AB45250AD11E5B1EDE5C7D0C88953"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......IDATx..[O.@..[Z.P...(r.K@.$....#b..xb F..".x.D.:.r..t..0&....C.u.........eS~.~.~.LJ..K.Ng4........n......T*
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PNG image data, 56 x 56, 8-bit/color RGBA, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):2927
                                                        Entropy (8bit):7.901864294096541
                                                        Encrypted:false
                                                        SSDEEP:48:z/AblbrVP517clW9u74PZi5QTsp+9MbP6f8/2X5vZHUcYFye:z/A5bxj7cQ9u7yZ8QTP9KT2XHdYFye
                                                        MD5:6E8F635F6528CC0433861A8DFB0C2D30
                                                        SHA1:E85EC2E9154D1B12835E0590ED00C22A49E3A6DB
                                                        SHA-256:A8CC2B4C182384537CAD5E091DFF777F6806E77EED0E5800B96C573E4FBC1A00
                                                        SHA-512:12F54F49FDDF6857A840608ED070822C7491D6C15B56F6F5A024C27A28264ED1525FAB4D57F9716D49C284BBF24A677A46F8F084BFBBF485D0F62D11B5CBC725
                                                        Malicious:false
                                                        Preview:.PNG........IHDR...8...8.......;....6IDATx...S.w.....d..k....KQL...n..2..../....51.A.a....1....<y...L.E..W.=....w..W..Dd._$..$.DF%...1.K.y9I..[.xzaK..:.1..X".G$.[../...:l..?..V......K.T.v7...O.T8.8.Z...5Y.....V$..+.|4.P.........@...HR!....+.AS.xZ.9r.... ......#...73M....6...P3U.K.....[q....0.......f.j>Y. b....n...T..=...(b.......M.wf.v.q.py@0.....eb.$S..D.9Ys...i.}...K9...i..=u.R..$=..S..B...'Ss..r...~3.QIf.....M5..l.p:.....r.Yz.B..........{....S..F>..c9..L....7.....r.;....b(..d~I.^....U[..}R..H]S.x.[.>..5.f....k...^9...}^~yU..q..F$._.y..S1L;..i(.c..H...R....ni.? M.}...%.Mm.9R...o../.@.T{}.._...R.Q|XU....3.9.y.q.KC.....T.Z$.}@j.....Y..@.B..{.X.......&.j........,=_WSE.;o...D...x&$..?.0...n.O5...B..`|.wk.....#..Mj.7G...+4.v*. G....{.~....$G...D.....+{.......m]2xs...vE..r#.=........i. .J..k@..L...FM...=....2.tF.............).....+.........[S/M..r..y.M....R...o...)I..2=....^M..-..*.Dk.MN..........q.P<!.......\....V.A..@.......0S.....D....}.....%+.
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):15086
                                                        Entropy (8bit):3.7348281735284137
                                                        Encrypted:false
                                                        SSDEEP:96:jvVmqKjOvFd0+uYDkY4RkQWyt9aKdk/o3H4VGr1fSLzeIBvCWV2auhbfgX:j9mqdT0HVt9aKdDSLl6kBbX
                                                        MD5:E7D9E81AFA9CB104E0FE70EE9DABCB6B
                                                        SHA1:FA2D7DF277CD730BAD0786F5BA92D3E5D777403B
                                                        SHA-256:A04E701256B583F226CE290D979B19D51A6EA4C5A94341E4E35DB1CA94DDC6E8
                                                        SHA-512:1FDE7F4C1387FBE304ACBD1EA2479A89306AC90BDF72C6C5AB88B92C44183DFBF7F01729B23C112D77AB7378D4FB007EB2343B50974436C84D69E51C11656A72
                                                        Malicious:false
                                                        Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PC bitmap, Windows 3.x format, 1 x 98 x 24, image size 394, resolution 2834 x 2834 px/m, cbSize 448, bits offset 54
                                                        Category:dropped
                                                        Size (bytes):448
                                                        Entropy (8bit):4.671818727412439
                                                        Encrypted:false
                                                        SSDEEP:6:7AldcJ6RqNJp743UTxdhTbVld5RH2IQhTnTfJrf9K9LPpPip2DGZOGGu9uDUEnQi:7ASgyH2TnTfVwHZXGGuYgQQI5VSQtL
                                                        MD5:A8A6EF427C5C0EDE5C70AF58AA5680DE
                                                        SHA1:127365EAF32CEE2BA7A958E766FDCCAD0E3C50C6
                                                        SHA-256:1D3F66E964CD9BFF854A550D5ACBB55B2C2027C05CEB7A9396A691B1C9D8C6C2
                                                        SHA-512:C2EC78255EC33AF2AE799972AA275C8FA3378D56092B480C4F39105CB5978983C16B97C33E94CCB5D76886340EEA116B08C207A1D593945B7F600ED7C8751E41
                                                        Malicious:false
                                                        Preview:BM........6...(.......b.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PNG image data, 266 x 9, 8-bit/color RGBA, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):715
                                                        Entropy (8bit):7.529061088532927
                                                        Encrypted:false
                                                        SSDEEP:12:6v/7dZXLr+yakAkKVlTMtHQOXSL8OW8Nv9XBnzvN3RH/F4ibFLRrcawCajNuk9:gZ3hankqlg1SLR9DnzN3B/FXbFhcawC8
                                                        MD5:B7CCD0351EB77445E7323F2BB74788FD
                                                        SHA1:E0525DA70A851E6DC72D57DD9064F16B949C2A26
                                                        SHA-256:8BAA0FEAF55D59C0929419101BDAB9EA326348F13DE8B68EDFB710076F0C3F78
                                                        SHA-512:34015ECA33A939E74481334A55DB4731D2777B4975E4BCDD648A8DF1CEA80E2C65E93047A5D9C22C681D1CA417CCED190C65E58E8099B740CA669DC9BF829579
                                                        Malicious:false
                                                        Preview:.PNG........IHDR..............(b.....gAMA....7.......tEXtSoftware.Adobe ImageReadyq.e<...]IDATx..mo. .......q.T....$i.HS.`l........-.n.}...{.:.>".q...&.i".y}[...y..?&.&..b-.;.x.6....hp.}.v..N..:........+.>...h3........."V......W9.q)..gC1G.w..?+....h....0*@QBW....w?.5...y..$.{...s`.."z.+.N.E...3..'.3....q}.....@...D...J*>.l"...U<.9....(.."+T+..-..l.m..f...4^....:..K.=....0.......U.+....}d0a.)."E...{&L&.x....Ag...2....+.j.Eo..T....Z{..j.eW.....qa.#....t.X.L..e.*;]../...:BA|..N....@,.X..u|^..t..p.`..@%.Q.....N.....8.W..H@a..y...Q)..Kf..!...:.K......{`...O-.;. +B;./[..g8.....n....w..x.6<A.;b.r.........d?.a7._..W..pA...~..=a...].uw!....y...b.|..|.b..M..?..{.=u..0..nD.........IEND.B`.
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PNG image data, 260 x 1, 8-bit/color RGB, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):132
                                                        Entropy (8bit):5.413824965565243
                                                        Encrypted:false
                                                        SSDEEP:3:yionv//thPkYtS1clSl0tRthwkBDsTBZtzdatFcEoXa/ljp:6v/lhPkYtS1Rl0znDspzWTAa/Vp
                                                        MD5:4CE28B32C7836663CE74B29F11D176A7
                                                        SHA1:608EBF86C32394E609ACB091E5FEFCB0AF4B9D39
                                                        SHA-256:4199A78439525D778CF91FA5DEFE0C68320B3E51B3EB9C7672939DD4B2F33E50
                                                        SHA-512:E5DF9C12F74A92898A78702935C454CA0314997D7BA36B89126BBF177FD652B5DFECFE8C3687A117D60810FCDB0BCC91ABCDEF7F19B6C4FFB8725F793CC1BD02
                                                        Malicious:false
                                                        Preview:.PNG........IHDR...............GZ....gAMA....7.......tEXtSoftware.Adobe ImageReadyq.e<....IDATx.b.w...(...... ...!..S.L.....IEND.B`.
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PNG image data, 274 x 312, 8-bit/color RGBA, interlaced
                                                        Category:dropped
                                                        Size (bytes):15525
                                                        Entropy (8bit):7.955817620038244
                                                        Encrypted:false
                                                        SSDEEP:384:md1Xn6jtWIg9t84o4cSmkLjWKmVQWMVwIp8VNP+6YLET2:m3XnLIYt84/KaiRQsImP+gT2
                                                        MD5:C939AF5F23D396F55808E95668C73C18
                                                        SHA1:3E8767C4FCB16767E6E04A34A9B81B74C061E411
                                                        SHA-256:B128C15EA8BB492570E441F2BD3F81D1A481C75997AE107A1D9E830C98067FD9
                                                        SHA-512:BE5D99BEDEB70C53B127BCED885C704C1E7E42634B64A5DE9E4B9138CB91C14C5D774CE27742118E6549D7F562AD5DAFD1395AB02BFB7E04B431F18FDCE16B7C
                                                        Malicious:false
                                                        Preview:.PNG........IHDR.......8.......L.....tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:B337DD93A04411E3A7E0B3415030DDAB" xmpMM:DocumentID="xmp.did:B337DD94A04411E3A7E0B3415030DDAB"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B337DD91A04411E3A7E0B3415030DDAB" stRef:documentID="xmp.did:B337DD92A04411E3A7E0B3415030DDAB"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>{.....9.IDATx.b...?..p..Y.......@..@&....@9h.bv(.L.ALTp.2..H.P.P;d..S.4...a.li....1.8.L.5..Zp5..=. ..x...@n....D.t..
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):15086
                                                        Entropy (8bit):3.908826625397295
                                                        Encrypted:false
                                                        SSDEEP:96:jxp0LXMk1/Au7paUVdD+we1RoeeBniFQ+0TxKtp4+3r/+4sR1sXsXsrEI8kT:jLu8cN5dDxerMQEGp4+3q4sHsXsXsrB
                                                        MD5:E20ADBD0C131A94E99FDE12E0C60D247
                                                        SHA1:EE5EB66E8945EC49A178D739834D448350C1080D
                                                        SHA-256:9473FE1FE2D941DB548F70E716DD8ED841DBAC60C02C71A5CE6BA760872DC69A
                                                        SHA-512:E204339033903140FF0765F38F35DAEFD15C4D336D2C2595A04A481E9104CFC96892FCF9621EA4745E5DDB0F57D9A5641422EFF6C03324842ADAC91A61BEB5E4
                                                        Malicious:false
                                                        Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%...............................C...=...V6&.gG^.oR..qT..pT..qT..pT..pT..qT..qT..pT..qT..qT..qT..pT..qT..pT..qT..qT..qT..pT..qT..qT..qT..pT..qT..qT..qT..qT..qT..pT..pT..pT..pT..qT..pQ..kKk.\96.L)..V0...................y..V...[6..rT.....................................................................................................................................................|a..[;3d....Q2.........Y5..^<*..k....................................................................................................................................................................cDN...hH..eF..W6...h............................................................................................................................................................................`<6.[7..`B..jJn............................................................zZ..T,..U,..U,..U,..U,..U,..U,..U,..U,..U,..U,..T+..e@...............
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):25904
                                                        Entropy (8bit):6.967116392745186
                                                        Encrypted:false
                                                        SSDEEP:384:0XganKwtsIS1KgKy/FEvUzoGJk0cOrQDEUcWTyl5nYPLOdGfZiTUdGfZL8JN77hp:0XgQtd6KgKCU3O7uiTHA3hDl
                                                        MD5:7BCD58DF45A40F865E8DBBCB5B2EF6D1
                                                        SHA1:6B8C19C6521CE5E4C8C81F5A59552F3714B15E17
                                                        SHA-256:F8CDAC83B1512B6BCFABC616F3865BF11C049E59E4A2C8B5D5D4F031332D83D8
                                                        SHA-512:DEAA3F5CA55D53EB398328F6910E86AB4E95A5E8B37FD67EE6FBD21C1CA8E747D09544D7A54A01815864C2CEBD376AA5ED34313C21B7235D31450F996C84CA39
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}.....X...X...X9?.X...X.>.X...X.?.X...X...X...X.?.X...Xt?.X...X9?.X...X...X...X.?.X...XRich...X........PE..L....*n=...........!.....&...................@....oq.........................p......@................................2......./.......P...............0..05...`..p....................................................................................text....$.......&.................. ..`.data........@......................@....rsrc........P.......*..............@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1909
                                                        Entropy (8bit):5.116245132023822
                                                        Encrypted:false
                                                        SSDEEP:48:0TK1j1rAalFwzKLdErOCZm9I+BOaknxNVbZKcKWUaP1aPyfl:qK1j1rAalFwzKL6OyYceyd
                                                        MD5:64EE134763F8A59FA41575B54B4C9799
                                                        SHA1:3047D89F40E4B5BD14A300BA0C8E11A9DF403EA3
                                                        SHA-256:6CA7946C4805C3705E6D588455D21131376E94960EDED7FDBBD5DACEB48A916B
                                                        SHA-512:E2438809048CC375554292A693C50D5CCED59B5BCC555996454233DCD0CC16CAD48C43889697C289A8CBEB0A324DD587B8AE5921A6F149091C93236A99BDB392
                                                        Malicious:false
                                                        Preview:<__SetupDirectory__>C:\Users\user\AppData\Local\Temp\tm_starter_dir</__SetupDirectory__>..<__SetupFile__>C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe</__SetupFile__>..<__SetupFileName__>SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe</__SetupFileName__>..<__SetupConfigureFile__>C:\Users\user\Desktop\starter.cfg</__SetupConfigureFile__>..<__AccountServerIP__>support.lockwoodbroadcast.com</__AccountServerIP__>..<__AccountServerPort__>443</__AccountServerPort__>..<__MeetingPassword__></__MeetingPassword__>..<__MeetingId__></__MeetingId__>..<__Role__>attendee</__Role__>..<__Version__>3.0.639</__Version__>..<__Publisher__>RHUB Communications, Inc.</__Publisher__>..<__AboutURL__>http://www.rhubcom.com</__AboutURL__>..<__AttendeeName__></__AttendeeName__>..<__AttendeeEmail__></__AttendeeEmail__>..<__Email__></__Email__>..<__UserPassword__></__UserPassword__>..<__PassThrough__></__PassThrough__>..<__ClientName__>TurboMeeting</__ClientName__>.
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):54
                                                        Entropy (8bit):4.0232250020833416
                                                        Encrypted:false
                                                        SSDEEP:3:qDlmBBvcylmBBvb:1Gb
                                                        MD5:B906A32DDF38251C7EBEAC7D2D70884E
                                                        SHA1:525C320D456A4B4F000D8BA2E20F400E708EAD7E
                                                        SHA-256:615720C8D5AFE51DB35F015B86E68340E73A9E93C6E74A6E5CF23E1081FDA896
                                                        SHA-512:1A835B7F6AE282C81E6B0C4576CAD0558B90FF3A488BA74C70C74BE7D365B99F1B063167319630F96E7BBAEED4EDD4591861B735EA8243A4689FD83DAA478064
                                                        Malicious:false
                                                        Preview:<__ClientCalledToLaunch__>N</__ClientCalledToLaunch__>
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):21
                                                        Entropy (8bit):3.1182751607709753
                                                        Encrypted:false
                                                        SSDEEP:3:MFW54fQn:MM4fQ
                                                        MD5:8797773BBB9B3585F186FC2684A48F6C
                                                        SHA1:460A68B60688E4AC8A169B5A972E5A0120A977BC
                                                        SHA-256:18805AD87BD499C00BC4B72EC6B52E9EC1B9087760E1741EA73CD53A92CC839C
                                                        SHA-512:A4F8DA05BE6F56A1A8347C58A439638967C0129B21884B5C7C624059C690FED7CD131FB1988C524F8D209C407725E223B388E984506A27803DC0F2CC24FB1D50
                                                        Malicious:false
                                                        Preview:3.0.639..8.0.2..35232
                                                        Process:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):91384
                                                        Entropy (8bit):6.590287891967479
                                                        Encrypted:false
                                                        SSDEEP:1536:vtJnUFQOmsbk04O5pVMlhIcfRuu9HsWScdlk6hEKLnm7A3h8P:UKsbL5pVMlmWJlDTLnyP
                                                        MD5:D9F52809F0A87FA85638E08187040545
                                                        SHA1:7A4BAF2DCBA8193AE9209BFF85AF56B18DF9344A
                                                        SHA-256:867B919D932C496BE91FDB3FC0AC489FDFFAE9371463BFC24C844FC7CF63A9E4
                                                        SHA-512:8617F7B992F824294D1B840AA0D04B6C040E3C756907729740CCF56E709CF1509E7A8F79B06901FE944D5DBB5C9EDCF1BFA4C1F166607CD2392EF8B6C81D14C7
                                                        Malicious:false
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........N..c ..c ..c ...#..c ...%.Rc ...$..c ...$..c ...#..c ...%..c .....c ..c!..c ...%..c ... ..c .....c ..."..c .Rich.c .................PE..L.....Z`...........!.........................................................p......@&....@..........................".......#..P....P...................6...`..H.......T...............................@...............,...d"..@....................text...W........................... ..`.rdata...Z.......\..................@..@.data........0......................@....rsrc........P......................@..@.reloc..H....`......................@..B................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Apr 18 03:25:36 2024, mtime=Thu Apr 18 05:15:05 2024, atime=Thu Apr 18 03:25:31 2024, length=18097912, window=hide
                                                        Category:dropped
                                                        Size (bytes):2241
                                                        Entropy (8bit):3.719570557661557
                                                        Encrypted:false
                                                        SSDEEP:24:8zK229iPUlSdPKJg0ALAQtLMMgpoLMLIESoLMxLkW9AMyycMxLAIJcJtm:8zK22sRFD8psfkWTrlJcJt
                                                        MD5:259B1F2BAD6893F1CD725CA9D8DEB2E3
                                                        SHA1:11483D70A466F08E1CE3B584B21EC9E59994F6E2
                                                        SHA-256:CCD2F69A37791DD4353581109F88F26A44F37E107203FA91109F1C41A005A0A1
                                                        SHA-512:8D211F74B0468F075B32A42B5F4D1EF3893C1933E512F0B00021739CB1EDEB0FFD641454C0D76945399784DEF47D73ABB33263E019978A9ED71C4904A6F5625D
                                                        Malicious:false
                                                        Preview:L..................F.@.. ....T(vH.....z.W...$..rH....&......................F.:..DG..Yr?.D..U..k0.&...&......Qg.*_...h..hH....6J.W.......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=.X.1..........................3*N.A.p.p.D.a.t.a...B.V.1......X2#..Roaming.@......EW.=.X.1..............................R.o.a.m.i.n.g.....b.1......X.1..TURBOM~1..J......X2#.X.1..........................O:..T.u.r.b.o.M.e.e.t.i.n.g.....b.1......X.1..TURBOM~1..J......X2#.X.1............................$.T.u.r.b.o.M.e.e.t.i.n.g.....n.2..&...X0# .TURBOM~1.EXE..R......X3#.X.1...........................br.T.u.r.b.o.M.e.e.t.i.n.g...e.x.e.......|...............-.......{............[.......C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe....T.u.r.b.o.M.e.e.t.i.n.g.=.....\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g.\.T.u.r.b.o.M.e.e.t.i.n.g...e.x.e.<.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.4610364170823695
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        File size:790'064 bytes
                                                        MD5:8745c960022bcefff65c91a47374a169
                                                        SHA1:e503dd1b85b17ba61e468890d11f3259e9437b72
                                                        SHA256:8fd4a4dcbe8b649c8c8cec213352c6da213caaefffc76450efee498e51f63cda
                                                        SHA512:c55e03d0a7ae03972f0dd5e9ef0873b196ecc988571f322d315e748c0fe06d0011ae17c7b7bf21c13f71ad97ec8cc40eafadba7f1d3d0e6e2cadca0fff22e75a
                                                        SSDEEP:12288:QNp51L0Z775xs2qnf8PtVXJSLKlK4pKJe5d0nocsxa3k48118t/HY4EErtkTd2h9:WJL0Z/mnet60yocssl8gY4hkTd2hCM
                                                        TLSH:E9F49E1275D1C072C2732130AAB9EB7156ADFC324A354687B3883A696F742F26E34777
                                                        File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......I.A.../.../..././.,..././.*..././.+.../......./......./......./._.+.../._.,.../.<...)./._.*.../...+.../......./......./...*.../
                                                        Icon Hash:0ccc694d4d688c4d
                                                        Entrypoint:0x443b33
                                                        Entrypoint Section:.text
                                                        Digitally signed:true
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x5F7B900E [Mon Oct 5 21:28:46 2020 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:213e0a4928f644955b6c40c3acf835d6
                                                        Signature Valid:true
                                                        Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                                                        Signature Validation Error:The operation completed successfully
                                                        Error Number:0
                                                        Not Before, Not After
                                                        • 24/08/2018 02:00:00 18/08/2021 14:00:00
                                                        Subject Chain
                                                        • CN="RHUB Communications, Inc.", O="RHUB Communications, Inc.", L=San Jose, S=California, C=US, SERIALNUMBER=C2724413, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=California, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                                        Version:3
                                                        Thumbprint MD5:C904612B1CF52E1055AA7446D74528C2
                                                        Thumbprint SHA-1:A720B7BF5F5AD71A08905396879B6B620E770593
                                                        Thumbprint SHA-256:8E1426B03264CA3D6C48FD76AAC4011C4F2EEFCD653C6EAB04F4CEA74C10A502
                                                        Serial:05CB860E41A7845345518D869C89A5F6
                                                        Instruction
                                                        call 00007F65CC7FB376h
                                                        jmp 00007F65CC7FA23Fh
                                                        call 00007F65CC7FA404h
                                                        push 00000000h
                                                        call 00007F65CC7FA5E8h
                                                        pop ecx
                                                        test al, al
                                                        je 00007F65CC7FA3D0h
                                                        push 00443C70h
                                                        call 00007F65CC7FA792h
                                                        pop ecx
                                                        xor eax, eax
                                                        ret
                                                        push 00000007h
                                                        call 00007F65CC7FB401h
                                                        int3
                                                        push ebp
                                                        mov ebp, esp
                                                        mov eax, dword ptr [004A6C44h]
                                                        and eax, 1Fh
                                                        push 00000020h
                                                        pop ecx
                                                        sub ecx, eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        ror eax, cl
                                                        xor eax, dword ptr [004A6C44h]
                                                        pop ebp
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push FFFFFFFFh
                                                        push 00476C7Ch
                                                        mov eax, dword ptr fs:[00000000h]
                                                        push eax
                                                        push ebx
                                                        push esi
                                                        push edi
                                                        mov eax, dword ptr [004A6C44h]
                                                        xor eax, ebp
                                                        push eax
                                                        lea eax, dword ptr [ebp-0Ch]
                                                        mov dword ptr fs:[00000000h], eax
                                                        push 00000FA0h
                                                        push 004AFB04h
                                                        call dword ptr [0047937Ch]
                                                        push 004844F0h
                                                        call dword ptr [004792DCh]
                                                        mov esi, eax
                                                        test esi, esi
                                                        jne 00007F65CC7FA3D7h
                                                        push 0047C92Ch
                                                        call dword ptr [004792DCh]
                                                        mov esi, eax
                                                        test esi, esi
                                                        je 00007F65CC7FA452h
                                                        push 00484534h
                                                        push esi
                                                        call dword ptr [00479340h]
                                                        push 00484550h
                                                        push esi
                                                        mov ebx, eax
                                                        call dword ptr [00479340h]
                                                        push 0048456Ch
                                                        Programming Language:
                                                        • [C++] VS2008 SP1 build 30729
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x9dcac0x140.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb50000xe230.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0xbe4000x2a30.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000x81d4.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x95bf00x54.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x95ce80x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x95c480x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x790000x760.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x778210x77a00e8d7927fc43751d5b762ceb11803c226False0.5324949386102403data6.651399701305167IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x790000x273f20x27400b4b8a9b8d56765a829e28e8cb38aab2eFalse0.4553269307324841DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 128.000000, slope 69177951903790594523136.0000005.596195970312029IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xa10000x12c300x82002fe776589c1b28f976dfdcc6d67d96caFalse0.12926682692307692data2.1641265224289206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        _RDATA0xb40000x9200xa0049bef94705afd51096e5fd4207b8d82cFalse0.555078125data5.482571152101737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .rsrc0xb50000xe2300xe4008484c4b0bf553fbd0ac5c98baf9c1046False0.23864103618421054data4.184187592933368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xc40000x81d40x8200c2f4f1ab89ac4bb34beed7905db49b69False0.6444110576923077data6.654015445973796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_CURSOR0xbfbe80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4805194805194805
                                                        RT_CURSOR0xbfd200xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"EnglishUnited States0.7
                                                        RT_CURSOR0xbfe000x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.36363636363636365
                                                        RT_CURSOR0xbff500x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.35714285714285715
                                                        RT_CURSOR0xc00a00x134dataEnglishUnited States0.37337662337662336
                                                        RT_CURSOR0xc01f00x134dataEnglishUnited States0.37662337662337664
                                                        RT_CURSOR0xc03400x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                                                        RT_CURSOR0xc04900x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.37662337662337664
                                                        RT_CURSOR0xc05e00x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
                                                        RT_CURSOR0xc07300x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                        RT_CURSOR0xc08800x134dataEnglishUnited States0.44155844155844154
                                                        RT_CURSOR0xc09d00x134dataEnglishUnited States0.4155844155844156
                                                        RT_CURSOR0xc0b200x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.5422077922077922
                                                        RT_CURSOR0xc0c700x134dataEnglishUnited States0.2662337662337662
                                                        RT_CURSOR0xc0dc00x134dataEnglishUnited States0.2824675324675325
                                                        RT_CURSOR0xc0f100x134dataEnglishUnited States0.3246753246753247
                                                        RT_BITMAP0xc11800xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80EnglishUnited States0.44565217391304346
                                                        RT_BITMAP0xc12380x144Device independent bitmap graphic, 33 x 11 x 4, image size 220EnglishUnited States0.37962962962962965
                                                        RT_ICON0xb5cc00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.08453757225433527
                                                        RT_ICON0xb62280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.09972924187725632
                                                        RT_ICON0xb6ad00x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4608EnglishUnited States0.08691819464033851
                                                        RT_ICON0xb81280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4288381742738589
                                                        RT_ICON0xba6e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.16151452282157677
                                                        RT_ICON0xbcca80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.1983402489626556
                                                        RT_ICON0xbf2680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088, resolution 2835 x 2835 px/mEnglishUnited States0.22606382978723405
                                                        RT_DIALOG0xbf6e80x206dataEnglishUnited States0.5308880308880309
                                                        RT_DIALOG0xc10600xe8dataEnglishUnited States0.6336206896551724
                                                        RT_DIALOG0xc11480x34dataEnglishUnited States0.9038461538461539
                                                        RT_STRING0xc13800x82StarOffice Gallery theme p, 536899072 objects, 1st nEnglishUnited States0.7153846153846154
                                                        RT_STRING0xc14080x2adataEnglishUnited States0.5476190476190477
                                                        RT_STRING0xc14380x184dataEnglishUnited States0.48711340206185566
                                                        RT_STRING0xc15c00x4eedataEnglishUnited States0.375594294770206
                                                        RT_STRING0xc1e400x264dataEnglishUnited States0.3333333333333333
                                                        RT_STRING0xc1b600x2dadataEnglishUnited States0.3698630136986301
                                                        RT_STRING0xc28880x8adataEnglishUnited States0.6594202898550725
                                                        RT_STRING0xc1ab00xacdataEnglishUnited States0.45348837209302323
                                                        RT_STRING0xc27780xdedataEnglishUnited States0.536036036036036
                                                        RT_STRING0xc20a80x4a8dataEnglishUnited States0.3221476510067114
                                                        RT_STRING0xc25500x228dataEnglishUnited States0.4003623188405797
                                                        RT_STRING0xc28580x2cdataEnglishUnited States0.5227272727272727
                                                        RT_STRING0xc29180x53edataEnglishUnited States0.2965722801788376
                                                        RT_GROUP_CURSOR0xbfdd80x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0294117647058822
                                                        RT_GROUP_CURSOR0xc05c80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xbff380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc04780x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc03280x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc0c580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc01d80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc08680x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc00880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc07180x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc09b80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc0b080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc0da80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc0ef80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_CURSOR0xc10480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                        RT_GROUP_ICON0xb80f80x30dataEnglishUnited States0.8958333333333334
                                                        RT_GROUP_ICON0xbf6d00x14dataEnglishUnited States1.25
                                                        RT_GROUP_ICON0xba6d00x14dataEnglishUnited States1.25
                                                        RT_GROUP_ICON0xbcc900x14dataEnglishUnited States1.25
                                                        RT_GROUP_ICON0xbf2500x14dataEnglishUnited States1.25
                                                        RT_VERSION0xbf8f00x2f8dataEnglishUnited States0.4513157894736842
                                                        RT_MANIFEST0xc2e580x3d1XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (917), with CRLF line terminatorsEnglishUnited States0.4687819856704197
                                                        DLLImport
                                                        KERNEL32.dllGetVolumeInformationW, LockFile, ReadFile, SetEndOfFile, UnlockFile, DuplicateHandle, GetThreadLocale, SetErrorMode, GetFileAttributesExW, GetFileSizeEx, GetTickCount, GetUserDefaultLCID, UnhandledExceptionFilter, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, InitializeSListHead, GetStartupInfoW, GetFullPathNameW, FlushFileBuffers, GetCurrentDirectoryW, SwitchToThread, LCMapStringW, GetStringTypeW, GetCPInfo, RtlUnwind, ExitProcess, GetModuleHandleExW, VirtualProtect, ExitThread, FreeLibraryAndExitThread, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, GetCommandLineA, GetCommandLineW, HeapQueryInformation, VirtualAlloc, GetStdHandle, IsValidLocale, EnumSystemLocalesW, GetConsoleCP, GetConsoleMode, SetStdHandle, ReadConsoleW, SetFilePointerEx, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetLocaleInfoW, GlobalFlags, LocalReAlloc, LocalAlloc, GlobalHandle, GlobalReAlloc, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, MulDiv, LocalFree, GlobalUnlock, WritePrivateProfileStringW, GetPrivateProfileStringW, GetPrivateProfileIntW, lstrcmpA, GlobalLock, CompareStringW, GlobalFindAtomW, GlobalAddAtomW, WriteConsoleW, DeleteFileA, GetTempPathA, lstrcmpW, GlobalDeleteAtom, LoadLibraryA, FindResourceW, SizeofResource, LockResource, LoadResource, LoadLibraryExW, FreeResource, GetSystemDirectoryW, EncodePointer, GetModuleHandleA, SetLastError, OutputDebugStringA, GetACP, lstrlenW, lstrcpyW, lstrcmpiW, FileTimeToDosDateTime, FreeLibrary, VirtualQuery, GetCurrentThreadId, OutputDebugStringW, IsDebuggerPresent, WriteFile, SetFilePointer, GetFileTime, GetFileSize, FileTimeToLocalFileTime, CreateMutexW, ReleaseMutex, Process32NextW, Process32FirstW, CreateToolhelp32Snapshot, GlobalFree, GlobalAlloc, GetModuleHandleW, GetSystemTime, GetSystemInfo, CreateProcessW, GetCurrentThread, TerminateProcess, QueryPerformanceFrequency, QueryPerformanceCounter, RemoveDirectoryW, GetLongPathNameW, FindNextFileW, FindFirstFileW, FindClose, WideCharToMultiByte, MultiByteToWideChar, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, SetThreadPriority, CreateEventW, SetEvent, GetTempPathW, CopyFileW, FormatMessageW, LoadLibraryW, GetProcAddress, GetVersionExW, OpenProcess, GetCurrentProcessId, GetCurrentProcess, Sleep, WaitForSingleObject, CloseHandle, SetFileAttributesW, GetFileAttributesW, DeleteFileW, CreateFileW, CreateDirectoryW, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetLastError, SetUnhandledExceptionFilter, RaiseException, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, CreateThread, DecodePointer, GetTempFileNameA
                                                        USER32.dllMapDialogRect, SetWindowContextHelpId, SetCursor, GetCursorPos, TranslateMessage, WinHelpW, CallNextHookEx, SetWindowsHookExW, GetLastActivePopup, GetTopWindow, GetClassLongW, SetWindowLongW, PtInRect, EqualRect, MapWindowPoints, ScreenToClient, AdjustWindowRectEx, GetWindowTextLengthW, RemovePropW, GetPropW, SetPropW, GetScrollPos, RedrawWindow, ValidateRect, EndPaint, BeginPaint, SetActiveWindow, UpdateWindow, GetMenuItemCount, GetMenuItemID, GetSubMenu, SetMenu, GetKeyState, SetFocus, GetDlgCtrlID, GetDlgItem, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, DestroyWindow, IsChild, IsMenu, IsWindow, CreateWindowExW, GetClassInfoExW, RegisterClassW, CallWindowProcW, DefWindowProcW, GetMessageTime, GetMessagePos, RegisterWindowMessageW, LoadBitmapW, SetWindowTextW, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, EnableMenuItem, CheckMenuItem, GetFocus, UnhookWindowsHookEx, SetRectEmpty, SendDlgItemMessageA, wsprintfW, wvsprintfW, GetMonitorInfoW, MonitorFromWindow, GetSystemMetrics, DrawTextW, DrawTextExW, GrayStringW, TabbedTextOutW, GetWindowDC, MoveWindow, FindWindowW, GetActiveWindow, GetWindow, IsWindowEnabled, GetMenu, GetWindowThreadProcessId, GetClassNameW, MessageBoxW, GetWindowTextW, SetForegroundWindow, GetForegroundWindow, IsIconic, IsWindowVisible, SetWindowPos, ShowWindow, GetIconInfo, CopyImage, DestroyIcon, GetParent, GetWindowLongW, CopyRect, GetSysColor, WindowFromPoint, ClientToScreen, SetWindowRgn, DrawStateW, GetNextDlgTabItem, SetRect, LoadIconW, GetDesktopWindow, OffsetRect, GetWindowRect, GetClientRect, InvalidateRect, ReleaseDC, GetDC, EnableWindow, ReleaseCapture, GetCapture, PostQuitMessage, PeekMessageW, DispatchMessageW, GetMessageW, LoadImageW, GetClassInfoW, UnregisterClassW, IsDialogMessageW, CreateDialogIndirectParamW, EndDialog, IntersectRect, RealChildWindowFromPoint, GetSysColorBrush, LoadCursorW, DestroyMenu, SetTimer, KillTimer, CharUpperW, SetCapture, CharNextW, CopyAcceleratorTableW, InvalidateRgn, IsRectEmpty, GetNextDlgGroupItem, MessageBeep, PostThreadMessageW, RegisterClipboardFormatW, SetMenuItemInfoW, PostMessageW, SendMessageW
                                                        GDI32.dllGetDeviceCaps, SaveDC, ExtSelectClipRgn, SelectObject, SetBkMode, SetMapMode, MoveToEx, TextOutW, RestoreDC, SetViewportExtEx, SetViewportOrgEx, SetWindowExtEx, OffsetViewportOrgEx, ScaleViewportExtEx, ScaleWindowExtEx, CreateRectRgnIndirect, GetMapMode, GetBkColor, GetTextColor, GetRgnBox, RectVisible, PtVisible, LineTo, GetWindowExtEx, GetViewportExtEx, GetStockObject, GetClipBox, Escape, CreatePen, SetTextColor, SetBkColor, CreateBitmap, GetObjectW, DeleteObject, ExtTextOutW, CreateCompatibleDC, DeleteDC, FrameRgn, CreateSolidBrush, CreateRoundRectRgn
                                                        WINSPOOL.DRVOpenPrinterW, ClosePrinter, DocumentPropertiesW
                                                        ADVAPI32.dllImpersonateSelf, AdjustTokenPrivileges, RegEnumValueW, RegQueryValueW, RegEnumKeyW, RegDeleteValueW, RegCreateKeyW, RegQueryValueExW, RegOpenKeyExW, GetUserNameW, OpenProcessToken, GetTokenInformation, FreeSid, EqualSid, AllocateAndInitializeSid, OpenThreadToken, RegSetValueExW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey, LookupPrivilegeValueW
                                                        SHELL32.dllShellExecuteW, SHGetSpecialFolderPathW, SHGetFolderPathW, SHCreateDirectoryExW, ShellExecuteExW
                                                        COMCTL32.dll_TrackMouseEvent
                                                        SHLWAPI.dllPathFindExtensionW, PathStripPathW, PathIsUNCW, PathStripToRootW, PathFindFileNameW, PathRemoveFileSpecW
                                                        ole32.dllCoTaskMemFree, CoTaskMemAlloc, CLSIDFromProgID, CLSIDFromString, CoCreateGuid, OleUninitialize, OleInitialize, CoInitialize, CoUninitialize, CoGetClassObject, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CreateILockBytesOnHGlobal, CoFreeUnusedLibraries, CoRevokeClassObject, OleFlushClipboard, CoCreateInstance, OleIsCurrentClipboard, CoRegisterMessageFilter
                                                        OLEAUT32.dllVariantCopy, SafeArrayDestroy, VariantTimeToSystemTime, SystemTimeToVariantTime, SysStringLen, OleCreateFontIndirect, SysAllocString, VariantChangeType, VariantClear, VariantInit, SysAllocStringLen, SysFreeString
                                                        oledlg.dllOleUIBusyW
                                                        WS2_32.dllWSALookupServiceNextW, WSAAddressToStringW, gethostbyname, socket, shutdown, WSALookupServiceEnd, getaddrinfo, gethostname, WSALookupServiceBeginW, setsockopt, send, recv, inet_ntoa, inet_addr, htons, connect, closesocket, WSAGetLastError, WSAStartup
                                                        OLEACC.dllCreateStdAccessibleObject, LresultFromObject
                                                        WININET.dllInternetOpenA, InternetConnectA, InternetReadFileExA, HttpSendRequestW, HttpOpenRequestW, InternetReadFile, InternetConnectW, InternetCloseHandle, InternetErrorDlg, InternetOpenW, HttpQueryInfoA, HttpSendRequestA, HttpOpenRequestA, InternetSetOptionA, InternetQueryOptionA, DetectAutoProxyUrl
                                                        urlmon.dllURLDownloadToFileA
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 18, 2024 06:25:21.604410887 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:21.604494095 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:21.604590893 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:21.615364075 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:21.615401983 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.018399954 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.018487930 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.074568033 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.074624062 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.075083017 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.075167894 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.078850985 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.120153904 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.213850021 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.213923931 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.213948965 CEST443497068.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.214010000 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.494931936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.495011091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.495089054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.495383024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.495404959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.738807917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.738886118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.739345074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.739378929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:22.741133928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:22.741146088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.162071943 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.162105083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.162169933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.162201881 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.162203074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.162241936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.162276030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.162300110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.163696051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.163744926 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.163789988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.163803101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.163829088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.163845062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.163944006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.164011002 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.287659883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.287724018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.287754059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.287774086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.287791014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.287810087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.288589954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.288616896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.288649082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.288659096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.288686991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.288705111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.291778088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.291826010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.291841984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.291847944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.291873932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.291914940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.405832052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.405956030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.406009912 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.406047106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.406080008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.406101942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409058094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.409111023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.409143925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409156084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.409181118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409209967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409781933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.409833908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.409859896 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409876108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.409902096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409919977 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.409971952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.410036087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.429876089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.429930925 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.429985046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.429997921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.430026054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.430190086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.430632114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.430668116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.430706024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.430718899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.430746078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.430773973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.450500965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.450561047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.450598001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.450612068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.450638056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.450658083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.451234102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.451288939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.451313019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.451328993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.451355934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.451400995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.525186062 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.525335073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.532032013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532085896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532161951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.532174110 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532207966 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.532840014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532886982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532924891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.532937050 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532960892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.532964945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.533026934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.533039093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.533092976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.552798033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.552855968 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.552917957 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.552932024 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.552995920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.553608894 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.553656101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.553703070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.553714991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.553744078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.553777933 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.573473930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.573534012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.573596954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.573611021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.573656082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.573678017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.574474096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.574510098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.574548960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.574563026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.574590921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.574628115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.594247103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.594311953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.594358921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.594371080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.594402075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.594422102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.594991922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.595040083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.595074892 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.595086098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.595112085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.595133066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.595204115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.595284939 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.614974976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.615024090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.615058899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.615070105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.615099907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.615117073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.615832090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.615892887 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.615931988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.615942955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.615971088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.615989923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.616028070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.616087914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.635745049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.635795116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.635960102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.635972023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.636032104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.636641026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.636667013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.636715889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.636734009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.636764050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.636785984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.656718016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.656768084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.656811953 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.656825066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.656852961 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.657116890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.657179117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.657210112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.657227039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.657254934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.657270908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.657270908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.657284975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.657315969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.657339096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.678165913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.678219080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.678344011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.678344011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.678359032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.678545952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.678582907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.678632021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.678651094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.678725958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.678745031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699336052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699398994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699428082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699445009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699467897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699618101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699837923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699887037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699918032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699928999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699945927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.699954033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699971914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.699981928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.700007915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.700036049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.720793962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.720846891 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.720874071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.720890045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.720916033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.720931053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.721173048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.721224070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.721266031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.721282959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.721311092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.721335888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.742141962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.742186069 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.742228031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.742234945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.742263079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.742281914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.742611885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.742645025 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.742676973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.742683887 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.742712021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.742741108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.763446093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.763485909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.763526917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.763531923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.763703108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.763703108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.763950109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.763978958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.764025927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.764034033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.764054060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.764081001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.784830093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.784878969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.784909964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.784924984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.785084963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.785140991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.785299063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.785330057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.785371065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.785382986 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.785434008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.785434008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.806178093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806226015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806255102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.806269884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806294918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.806313038 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.806478977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806526899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806555986 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806559086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.806571007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.806591034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.806607962 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.827471972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.827531099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.827564001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.827574968 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.827729940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.828062057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.828093052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.828120947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.828120947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.828136921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.828177929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.828198910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.848866940 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.848928928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.848968029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.848982096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.849009991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.849028111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.849225998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.849251032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.849298000 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.849311113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.849343061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.849374056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.870003939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.870078087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.870126963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.870151997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.870178938 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.870202065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.870487928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.870517969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.870552063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.870572090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.870600939 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.870654106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.891278028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.891344070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.891396046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.891408920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.891449928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.891472101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.891671896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.891714096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.891752958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.891766071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.891793013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.891829014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.912750006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.912812948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.912851095 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.912858963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.912919998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.913204908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.913245916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.913278103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.913285017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.913301945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.913306952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.913326979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.913336039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.913357019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.913388968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.934139967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.934267044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.934317112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.934351921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.934379101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.934400082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.934631109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.934688091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.934724092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.934736967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.934761047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.934782028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.955372095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.955432892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.955466986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.955478907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.955502987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.955519915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.955837011 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.955930948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.956031084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.956031084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.956099033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.956190109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.976707935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.976748943 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.976810932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.976833105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.976847887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.976876974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.977186918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.977230072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.977269888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.977338076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.977353096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.977380037 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.977401972 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.997972012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.998054028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.998090029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.998120070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.998147964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.998169899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.998440981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.998497009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.998528004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.998541117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:23.998570919 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:23.998589039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019284010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019345999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019443035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019454956 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019493103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019493103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019725084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019788027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019818068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019819021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019844055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.019850969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019870996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.019890070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.040741920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.040788889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.040836096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.040842056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.040868998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.040888071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.041282892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.041337013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.041369915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.041383982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.041416883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.041438103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.062141895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.062228918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.062273026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.062293053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.062320948 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.062339067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.062489033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.062550068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.062680006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.062680006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.062745094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.062805891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.083383083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.083436966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.083472967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.083487034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.083515882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.083532095 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.083674908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.083695889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.083739996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.083751917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.083780050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.083802938 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.104600906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.104654074 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.104680061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.104696989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.104715109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.104738951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.105037928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.105074883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.105106115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.105113029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.105139971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.105165958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.126097918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.126138926 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.126168013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.126177073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.126213074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.126224041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.126454115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.126512051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.126580000 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.126580000 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.126610994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.126657009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.147418022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.147607088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.147669077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.147747993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.147782087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.147844076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.147866964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.147887945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.147922993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.147943020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.168829918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.169002056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.169061899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.169131041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.169150114 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.169174910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.169219017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.169234991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.169265985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.169276953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.169301987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.169321060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.190165997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.190207005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.190279007 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.190284967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.190323114 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.190342903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.190541029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.190563917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.190598965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.190606117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.190634012 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.190663099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.211262941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.211317062 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.211364985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.211376905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.211401939 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.211426020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.211755037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.211779118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.211817026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.211828947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.211860895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.211893082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.232975006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.233091116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.233146906 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.233186960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.233218908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.233239889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.233347893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.233370066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.233428001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.233443022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.233469963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.233500957 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.234811068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.234864950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.234898090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.234908104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.234950066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.234966993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.235274076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.235323906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.235353947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.235372066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.235404968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.235431910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.256211042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.256258965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.256290913 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.256298065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.256342888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.256577015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.256613016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.256650925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.256663084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.256690979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.256710052 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277189970 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277271032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277296066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277317047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277333975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277374983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277515888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277554989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277575016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277582884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277606010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277626038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277628899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.277637959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.277673006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.298027039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.298067093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.298106909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.298113108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.298151016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.298170090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.298392057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.298418045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.298451900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.298459053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.298492908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.298516035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.318799973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.318851948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.318882942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.318898916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.318927050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.318952084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.319153070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.319181919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.319228888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.319241047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.319271088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.319310904 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.339448929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.339504004 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.339529037 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.339545012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.339566946 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.339586973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.339936972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.339960098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.340003014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.340017080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.340044975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.340078115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.360356092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.360404015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.360429049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.360444069 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.360471010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.360486031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.360690117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.360729933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.360848904 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.360848904 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.360914946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.360984087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.381565094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.381609917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.381767988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.381768942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.381776094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.381819963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.381993055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.382030964 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.382064104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.382072926 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.382098913 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.382132053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.402895927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.402966976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.402992964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.403011084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.403034925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.403053045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.403350115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.403372049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.403424025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.403431892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.403460979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.403501987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.424196959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424314022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424379110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.424416065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424448013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.424482107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.424700022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424751043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424782991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.424784899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424797058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.424817085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.424834013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.445713043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.445774078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.445821047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.445833921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.445868015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.445888042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.446562052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.446584940 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.446631908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.446647882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.446675062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.446696997 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.467174053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.467283010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.467402935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.467402935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.467442989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.467488050 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.467510939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.467520952 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.467540979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.467567921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.467586994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.467612028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488254070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488327026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488384008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488406897 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488452911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488452911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488774061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488826036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488854885 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488873005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488898993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488939047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.488949060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.488979101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.489005089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.489034891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.509124994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.509258986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.509290934 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.509376049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.509531021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.509571075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.509603024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.509618044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.509630919 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.509666920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.529834986 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.530002117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.530062914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.530136108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.530150890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.530174971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.530215979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.530232906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.530265093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.530276060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.530307055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.530329943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.550445080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.550499916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.550561905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.550570965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.550605059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.550626993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.550725937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.550762892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.550791979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.550801039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.550828934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.550852060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.571774006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.571841955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.571891069 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.571917057 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.571935892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.571948051 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.571993113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.591717005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.591778994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.591849089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.591860056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.591881990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.591906071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.592053890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.592099905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.592128992 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.592135906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.592149973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.592160940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.592189074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.592195034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.592210054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.592250109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.612330914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612407923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612541914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.612560034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612608910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.612847090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612890959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612921000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612935066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.612941027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.612967014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.612996101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.633553028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.633599997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.633661985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.633668900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.633696079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.633714914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.633959055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.633991003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.634030104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.634037971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.634071112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.634102106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.654830933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.654875040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.654903889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.654910088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.654932976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.654956102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.655332088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.655370951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.655399084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.655406952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.655421972 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.655457973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.675856113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.675904036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.675941944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.675947905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.675967932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.675991058 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.676233053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.676273108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.676316023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.676326036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.676338911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.676377058 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697164059 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697201967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697233915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697241068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697287083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697314978 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697576046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697613001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697643042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697648048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697659969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697673082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697709084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.697715998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.697757959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.718400002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.718452930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.718470097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.718521118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.718527079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.718573093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.719048023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.719073057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.719108105 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.719115019 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.719153881 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.739799023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.739849091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.739901066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.739906073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.739933968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.739957094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.740226030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.740267992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.740299940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.740309000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.740343094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.740359068 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.761233091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.761286974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.761307001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.761317968 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.761348009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.761362076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.761632919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.761657000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.761706114 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.761713982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.761739016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.761770964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.782540083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.782583952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.782660007 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.782669067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.782700062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.782700062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.782991886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.783016920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.783071041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.783081055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.783103943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.783126116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.803802013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.803848028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.803891897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.803900003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.804054976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.804054976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.804227114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.804265022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.804295063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.804300070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.804311037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.804332018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.804352999 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.804358959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.804400921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825294018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825339079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825375080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825382948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825413942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825436115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825629950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825670004 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825700998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825706959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825736046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825758934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.825778961 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.825826883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.846661091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.846707106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.846863985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.846870899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.846930027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.847054958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.847101927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.847136021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.847150087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.847155094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.847172022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.847194910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.867990017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.868035078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.868069887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.868076086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.868113995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.868134022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.868308067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.868345976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.868381023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.868391037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.868465900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.868465900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889336109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889391899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889439106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889457941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889470100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889508009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889812946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889856100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889882088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889888048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889899015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889915943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889944077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.889949083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.889997959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.910605907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.910657883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.910689116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.910701036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.910725117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.910742044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.910948992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.910996914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.911020994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.911029100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.911051989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.911092043 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.931870937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.931909084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.931938887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.931945086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.931979895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.931997061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.932255983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.932293892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.932326078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.932343960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.932363033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.932389021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.953357935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.953408957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.953442097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.953453064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.953480005 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.953505039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.953696012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.953736067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.953779936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.953793049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.953818083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.953852892 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.974627018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.974678040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.974725008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.974736929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.974764109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.974802017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.975025892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.975064993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.975105047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.975117922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.975146055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.975183964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.995887041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.995944023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.995968103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.995985985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.996011972 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.996031046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.996259928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.996306896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.996332884 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.996350050 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.996376991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.996390104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.996416092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.996426105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:24.996452093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:24.996471882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.017297029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.017350912 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.017399073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.017410040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.017446995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.017462969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.017724991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.017779112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.017846107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.017847061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.017863035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.017924070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.038568020 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.038624048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.038674116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.038683891 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.038710117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.038728952 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.039009094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.039038897 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.039078951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.039092064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.039117098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.039153099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.059931040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.059988022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.060030937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.060041904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.060074091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.060089111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.060396910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.060441971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.060471058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.060472965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.060489893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.060512066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.060529947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.081020117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.081079006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.081111908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.081130028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.081157923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.081267118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.081538916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.081577063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.081619024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.081633091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.081659079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.081680059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.101758957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.101809025 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.101855993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.101871967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.101897955 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.101914883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.102148056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.102186918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.102242947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.102255106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.102293968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.102308989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.122292995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.122473001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.122534990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.122606993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.122634888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.122653961 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.122688055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.122703075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.122730970 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.122740984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.122764111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.122807026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.142827988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.143019915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.143095970 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.143135071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.143179893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.143193007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.143203020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.143208981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.143279076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.163238049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.163335085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.163374901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.163413048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.163440943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.163460970 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.163621902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.163659096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.163697958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.163713932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.163742065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.163758993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.183677912 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.183862925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.183923006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.184012890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.184056997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.184098005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.184129000 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.184146881 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.184180975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.184201002 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.204153061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.204292059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.204353094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.204441071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.204581976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.204621077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.204673052 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.204690933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.204722881 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.204742908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.224859953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.224901915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.224966049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.224972963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.225012064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.225012064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.225117922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.225157976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.225182056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.225192070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.225222111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.225251913 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.245304108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.245356083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.245409012 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.245419979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.245456934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.245496988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.245699883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.245749950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.245793104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.245805025 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.245834112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.245881081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.265892029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.265934944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.266007900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.266017914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.266043901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.266077995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.266315937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.266364098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.266410112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.266421080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.266453981 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.266479015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.286628008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.286679983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.286760092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.286771059 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.286798954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.286828041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.286912918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.286957026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.287000895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.287014008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.287067890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.287089109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.307110071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.307168007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.307219982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.307233095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.307262897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.307282925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.307468891 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.307518005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.307569027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.307580948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.307614088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.307629108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.327781916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.327837944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.327883959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.327897072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.327924013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.327943087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.328008890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.328061104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.328087091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.328119993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.328156948 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.328176975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.348181009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.348347902 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.348408937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.348494053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.348668098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.348711014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.348746061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.348769903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.348799944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.348819017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.369097948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.369263887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.369324923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.369421959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.369503975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.369558096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.369595051 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.369612932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.369642019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.369703054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.390086889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.390255928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.390316010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.390413046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.390501022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.390537024 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.390584946 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.390600920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.390629053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.390649080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.411037922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.411134958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.411185026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.411218882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.411247015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.411268950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.411520958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.411561966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.411604881 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.411618948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.411652088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.411669016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.432014942 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.432070971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.432111979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.432125092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.432151079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.432171106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.432336092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.432387114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.432418108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.432435989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.432467937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.432497025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.453253031 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.453319073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.453346014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.453363895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.453391075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.453406096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.453633070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.453680038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.453707933 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.453723907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.453752995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.453777075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.474421024 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.474477053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.474508047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.474524975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.474554062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.474569082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.474836111 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.474879026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.474910975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.474922895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.474951982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.474970102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.495757103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.495811939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.495872974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.495892048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.495919943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.495949984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.496279955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.496325016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.496361017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.496373892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.496400118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.496423960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.517205954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.517256975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.517291069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.517302036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.517373085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.517373085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.517585039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.517621994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.517661095 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.517673969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.517700911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.517718077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.538439035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.538515091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.538564920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.538588047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.538599968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.538630009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.538800001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.538837910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.538865089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.538872004 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.538898945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.538918972 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.559767962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.559819937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.559840918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.559854984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.559875011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.559892893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.560125113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.560168982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.560199976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.560209036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.560239077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.560259104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581135035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581175089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581211090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581218958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581247091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581263065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581490040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581528902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581563950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581569910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581595898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581595898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581614971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581623077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.581641912 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.581675053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602451086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602489948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602518082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602524996 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602550983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602569103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602782965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602818012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602845907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602852106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602864027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602893114 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602917910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.602922916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.602965117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.623718023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.623765945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.623797894 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.623809099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.623852015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.623876095 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.624366045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.624399900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.624438047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.624447107 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.624464035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.624497890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.645029068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645086050 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645137072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.645153046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645180941 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.645204067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.645442963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645486116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645519972 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.645524979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645540953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.645556927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.645575047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.666301966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.666354895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.666393042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.666404009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.666418076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.666440964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.666770935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.666809082 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.666838884 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.666847944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.666877031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.666899920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.687732935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.687777996 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.687828064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.687849998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.687876940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.687899113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.688074112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.688133955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.688148022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.688160896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.688208103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.688225985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.708848000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.708906889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.708945990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.708965063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.708982944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.709002018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.709156036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.709193945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.709224939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.709263086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.709271908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.709295034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.709316969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.729549885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.729628086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.729652882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.729671955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.729687929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.729703903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.729984999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.730029106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.730058908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.730068922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.730087042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.730133057 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.750284910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750336885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750375032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.750390053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750412941 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.750427008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.750708103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750751019 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750780106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.750785112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750798941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.750813961 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.750839949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.771310091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771379948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771411896 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.771431923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771447897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.771471024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.771646976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771692038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771733046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.771738052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771753073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.771770954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.771801949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.792618990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.792684078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.792714119 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.792732000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.792747021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.792776108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.795641899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.795701027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.795737028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.795753002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.795774937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.795802116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.795991898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.796058893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.815510988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.815574884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.815607071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.815623999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.815661907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.815671921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.816348076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.816386938 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.816431999 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.816448927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.816479921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.816504002 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.835268974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.835341930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.835437059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.835459948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.835480928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.835515976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.835669994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.835710049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.835884094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.835884094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.835894108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.835937023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.856683016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.856734037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.856775999 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.856786013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.856801033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.856829882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.856986046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.857023001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.857049942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.857057095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.857085943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.857108116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.877893925 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.877953053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.878015995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.878032923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.878057957 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.878082991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.878278017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.878321886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.878353119 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.878365993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.878395081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.878416061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.899250031 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.899297953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.899347067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.899363995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.899391890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.899410009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.899563074 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.899612904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.899643898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.899657011 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.899688959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.899713993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.920573950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.920629978 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.920670986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.920684099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.920737982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.920737982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.920923948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.920975924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.921001911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.921016932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.921044111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.921057940 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.921103001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.921103001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.921114922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.921159029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.941586018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.941643953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.941705942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.941718102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.941745996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.941766024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.942095995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.942137957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.942178011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.942189932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.942215919 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.942238092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.962380886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.962436914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.962471008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.962481022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.962503910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.962529898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.962831974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.962884903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.962908983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.962940931 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.962975979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.962995052 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.983066082 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.983127117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.983170986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.983181953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.983338118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.983338118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.983417034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.983473063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.983500004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.983516932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:25.983546019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:25.983572960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.004091978 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.004260063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.004331112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.004435062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.004457951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.004517078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.004548073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.004568100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.004597902 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.004618883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.025010109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.025068045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.025152922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.025176048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.025338888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.025425911 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.025422096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.025423050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.025423050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.025496960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.025557041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.025557995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.045746088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.045912027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.045974016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.046075106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.046175003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.046221018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.046260118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.046276093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.046323061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.046339989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.066468000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.066648006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.066709995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.066803932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.066957951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.067012072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.067040920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.067059040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.067090988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.067128897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.087246895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.087416887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.087477922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.087563992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.087614059 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.087651968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.087651968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.087681055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.087722063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.087743044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.107952118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.108102083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.108163118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.108257055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.108360052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.108424902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.108428955 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.108457088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.108489037 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.108511925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.128680944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.128838062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.128900051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.129036903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.129086971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.129142046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.129178047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.129196882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.129235029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.129261971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.149451971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.149627924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.149693012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.149784088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.149796009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.149821997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.149862051 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.149878979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.149904013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.149919987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.149944067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.149976015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.170190096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.170350075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.170413017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.170491934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.170567036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.170628071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.170656919 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.170675993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.170708895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.170742035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.191160917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.191215992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.191247940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.191261053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.191294909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.191310883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.191519022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.191565037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.191596985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.191613913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.191644907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.191670895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.212486029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.212651968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.212713957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.212806940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.212871075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.212918043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.212954998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.212971926 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.213002920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.213021994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.233908892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.234072924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.234133959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.234230042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.234287977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.234354973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.234384060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.234401941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.234437943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.234463930 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.235841990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.235894918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.235930920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.235950947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.235979080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.235997915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.236366034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.236421108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.236457109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.236474037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.236500978 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.236531973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.256872892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.257030964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.257091999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.257189989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.257268906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.257338047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.257370949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.257390022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.257425070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.257443905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.277533054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.277604103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.277647018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.277674913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.277698994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.277718067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.277885914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.277931929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.278028965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.278044939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.278114080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.298132896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.298193932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.298230886 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.298242092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.298268080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.298294067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.298441887 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.298491001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.298515081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.298532009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.298558950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.298588991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.318748951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.318804979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.318835974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.318849087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.318886995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.319086075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.319134951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.319160938 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.319176912 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.319202900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.319216013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.319243908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.319253922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.319276094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.319298029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.339382887 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.339550018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.339617014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.339694977 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.339829922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.339883089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.339911938 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.339930058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.339962006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.339987040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.360120058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.360280991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.360342979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.360424995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.360508919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.360575914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.360605001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.360622883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.360654116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.360691071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.381170034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.381345034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.381406069 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.381484032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.381624937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.381669998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.381689072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.381710052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.381741047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.381761074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.402476072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.402535915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.402582884 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.402601957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.402635098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.402652025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.402961969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.403002024 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.403047085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.403059959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.403094053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.403114080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.423795938 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.423851967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.423902988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.423913956 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.423944950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.423969030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.424280882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.424331903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.424364090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.424385071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.424416065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.424447060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.445203066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.445293903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.445318937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.445336103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.445357084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.445377111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.445607901 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.445645094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.445684910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.445698977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.445730925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.445765018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.466425896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.466487885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.466512918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.466528893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.466556072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.466571093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.466824055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.466882944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.466913939 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.466933012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.466959953 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.466979027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.487746000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.487816095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.487865925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.487884998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.487911940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.487926006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.488202095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.488271952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.488301039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.488317966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.488341093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.488358974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.488382101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.488394976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.488420010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.488441944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.508809090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.508879900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.508908033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.508925915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.508954048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.508969069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.509181023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.509236097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.509262085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.509279966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.509310961 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.509325027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.529319048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.529380083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.529409885 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.529428959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.529454947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.529470921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.529720068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.529773951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.529800892 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.529818058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.529843092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.529871941 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.549824953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.549885035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.549943924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.549956083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.549983025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.550002098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.550136089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.550185919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.550210953 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.550228119 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.550257921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.550276041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.570184946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.570255995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.570301056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.570312977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.570339918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.570359945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.570555925 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.570604086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.570641994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.570662975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.570688009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.570705891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.590708971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.590770960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.590820074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.590837002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.590863943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.590879917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.590960026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.591015100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.591048002 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.591063976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.591090918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.591104984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.591134071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.591142893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.591166973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.591190100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.611030102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.611095905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.611133099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.611144066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.611175060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.611193895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.611452103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.611499071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.611542940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.611565113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.611594915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.611610889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.631453037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.631515026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.631550074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.631561995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.631644964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.631644964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.631855965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.631912947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.631942987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.631962061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.632024050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.632024050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.652043104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.652216911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.652278900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.652334929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.652374983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.652393103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.652434111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.652448893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.652479887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.652489901 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.652520895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.652542114 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.672555923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.672728062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.672797918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.672889948 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.672966957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.673022032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.673059940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.673080921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.673115015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.673142910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.693202972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.693370104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.693432093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.693525076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.693586111 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.693639994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.693670034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.693691969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.693723917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.693742990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.713695049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.713856936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.713917971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.714013100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.714370966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.714428902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.714467049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.714473963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.714487076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.714489937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.714509964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.714528084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734277010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.734333038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.734361887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734380960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.734405041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734442949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734579086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.734622002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.734726906 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734728098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734728098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.734795094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.734854937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.754755974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.754812956 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.754848003 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.754859924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.754883051 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.754904032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.755274057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.755316973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.755350113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.755362988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.755392075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.755410910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.775120020 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.775177002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.775211096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.775227070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.775279045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.775279045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.775540113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.775583029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.775620937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.775640011 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.775669098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.775688887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.795742989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.795808077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.795835018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.795850992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.795877934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.795907021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.796072960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.796118975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.796155930 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.796159983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.796176910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.796186924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.796207905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.796224117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.816262960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.816328049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.816375017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.816389084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.816415071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.816430092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.816616058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.816665888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.816701889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.816719055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.816746950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.816761971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.836896896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.836960077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.836997986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.837014914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.837043047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.837066889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.837274075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.837317944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.837356091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.837373972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.837397099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.837426901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.857777119 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.857887983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.857934952 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.857959032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.857965946 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.857975006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.857997894 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.858032942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.858061075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.858083010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.858088017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.858115911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.858129025 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.858155012 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.858202934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.878495932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.878556013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.878614902 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.878627062 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.878659964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.878678083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.878813028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.878865957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.878904104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.878922939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.878953934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.878998995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.899394035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.899559975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.899621010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.899719954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.899800062 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.899856091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.899888992 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.899897099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.899918079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.899924040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.899955034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.899975061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.920653105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.920715094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.920763969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.920778990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.920803070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.920825005 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.920989037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.921044111 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.921143055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.921144009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.921209097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.921281099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.941139936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.941353083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.941438913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.941461086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.941905022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.941946030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.942140102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.961815119 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.961999893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962060928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962260962 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962338924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962388992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962441921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962455034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962495089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962531090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962743998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962793112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962851048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962862015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.962896109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.962910891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963085890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963133097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963190079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963202000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963269949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963289976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963579893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963634968 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963675022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963685036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963709116 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963735104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963902950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963949919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.963983059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.963994026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.964025021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.964045048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.964067936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.964078903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.964288950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.977317095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.977368116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.977535009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.977559090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.977703094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.977761984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.977802038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.977916956 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.977927923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.977984905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.985810041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.985944986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.997697115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.997761965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.997827053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.997842073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.997864962 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.997898102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.998152018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.998191118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.998285055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:26.998286963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.998303890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:26.998348951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.018747091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.018804073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.018860102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.018872023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.018919945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.018937111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.019221067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.019268990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.019325018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.019345999 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.019361973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.019387960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.019407034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.019426107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.039956093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.040019989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.040190935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.040191889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.040210962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.040277958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.040457010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.040512085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.040558100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.040570021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.040612936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.040642023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.060359955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.060583115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.060636997 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.060671091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.060700893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.060723066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.060933113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.060981989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.061017036 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.061029911 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.061058998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.064222097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.081420898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.081620932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.081667900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.081702948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.081731081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.081765890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.082247972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.082298994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.082344055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.082356930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.082387924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.082415104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.082629919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.082680941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.082726002 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.082736969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.082765102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.082784891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.083308935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.083355904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.083386898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.083398104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.083422899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.083446980 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.083662987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.083731890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.084362984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084409952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084434032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084446907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.084453106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084467888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084484100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.084517956 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084541082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.084556103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.084580898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.084604025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.096133947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.096188068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.096226931 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.096236944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.096554041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.096554041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.097068071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.097138882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.097192049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.097209930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.097249031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.097280979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.108617067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.108673096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.108719110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.108730078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.108876944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.108876944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.117388010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.117451906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.117501020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.117513895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.117543936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.117566109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.117726088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.117794037 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.128932953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.128982067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.129015923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.129029989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.129172087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.129172087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.138588905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.138642073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.138686895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.138700008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.138731956 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.138756990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.158927917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.159126997 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.159198046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.159369946 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.159701109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.159753084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.159786940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.159791946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.159806967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.159807920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.159838915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.159857035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.179838896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180051088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180097103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.180136919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180212021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.180212021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.180519104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180571079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180608988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.180620909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180648088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.180675030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.180682898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180700064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.180757046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.200551987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.200710058 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.200773001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.200944901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.201823950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.201873064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.201915979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.201931953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.201958895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.201998949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.202313900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.202363014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.202398062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.202415943 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.202445984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.202461958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.202971935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.203010082 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.203052044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.203063965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.203093052 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.203113079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204195976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204243898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204272032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204286098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204313040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204329967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204710960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204756021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204785109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204794884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204818010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204843044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.204902887 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.204972982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.205058098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.205100060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.205127001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.205137014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.205162048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.205179930 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.216658115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.216710091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.216778994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.216789961 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.216814041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.216825008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.216842890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.216852903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.216881990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.216900110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.224582911 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.224639893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.224678993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.224689960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.224725962 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.224745989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.236625910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.236685991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.236732006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.236758947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.236773014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.237087011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.237087965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.245620012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.245697975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.245738983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.245754957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.245784044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.245804071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.257843971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.257901907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.257960081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.257972002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.257998943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.258017063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.258143902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.258208990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.258663893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.258713007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.258743048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.258754015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.258774996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.258802891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.278819084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.278944016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.278975964 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.279053926 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.279130936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.279190063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.286669016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.286725044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.286794901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.286813021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.286842108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.286856890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.299873114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.299943924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.300009966 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.300029993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.300055981 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.300062895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.300090075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.300096035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.300131083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.300159931 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.310014009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.310058117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.310100079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.310105085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.310162067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.321415901 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.321465015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.321494102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.321501017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.321532965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.321562052 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.321952105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.321996927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.322040081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.322046041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.322069883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.322088957 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.322668076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.322707891 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.322738886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.322750092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.322755098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.322797060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.323591948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.323633909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.323662996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.323668003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.323720932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.324446917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.324515104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.324542999 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.324548006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.324575901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.324600935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.335968971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336009026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336040020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.336045027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336072922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.336105108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.336455107 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336494923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336523056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.336529970 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336564064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336580038 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.336587906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.336610079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.336633921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.356736898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.356781006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.356806993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.356813908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.356844902 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.356864929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.357271910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.357309103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.357341051 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.357347965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.357384920 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.357402086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.377365112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.377418041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.377509117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.377516031 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.377558947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.377578020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.377665997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.377712965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.377743959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.377751112 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.377783060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.377808094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.398046017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.398092985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.398123026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.398129940 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.398174047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.398896933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.398935080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.398968935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.398972988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.399003029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.399022102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.399045944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.399099112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.418426037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.418469906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.418504000 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.418513060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.418566942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.419053078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.419090033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.419137955 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.419142008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.419167042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.419178963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.419329882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.419392109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.439187050 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.439352989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.439382076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.439456940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.439640999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.439687014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.439717054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.439723015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.439754963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.439771891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.440521002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.440603971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.459780931 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.459914923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.459944963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.460031986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.460175991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.460231066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.460264921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.460283995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.460318089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.460336924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.480751038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.480916023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.480977058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.481075048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.481177092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.481235981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.481265068 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.481285095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.481314898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.481357098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.502227068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.502293110 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.502405882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.502433062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.502433062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.502453089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.502475023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.502507925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.522267103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.522325993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.522373915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.522387028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.522414923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.522433043 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.522731066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.522808075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.522887945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.522887945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.522954941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.523025036 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.542856932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.542923927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.542977095 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.542993069 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.543016911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.543039083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.543236017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.543286085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.543329954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.543344021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.543378115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.543404102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563379049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563453913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563508987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563525915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563539982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563585043 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563785076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563836098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563872099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563878059 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563896894 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.563915014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563931942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.563955069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.583971977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.584023952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.584187984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.584187984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.584208965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.584379911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.584465027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.584517002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.584547997 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.584561110 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.584592104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.584619045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.604846954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.604904890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.604950905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.604960918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.604994059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.605016947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.605292082 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.605344057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.605389118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.605405092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.605431080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.605463028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.625457048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625519037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625556946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625577927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625606060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.625622034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625648022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625648022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.625677109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.625689983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.625714064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.625742912 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.646003008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.646064043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.646153927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.646166086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.646194935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.646217108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.646579981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.646630049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.646656036 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.646672010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.646699905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.646763086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.666944981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.667115927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.667176962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.667268991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.667433977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.667484045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.667514086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.667530060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.667561054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.667587042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.687748909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.687804937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.687844992 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.687858105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.687882900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.687902927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.688153028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.688203096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.688235998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.688247919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.688266993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.688271999 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.688293934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.688306093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.688330889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.688354015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.708739042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.708897114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.708982944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.709001064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.709039927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.709039927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.709131956 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.709187031 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.709223986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.709239960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.709285975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.709345102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.709783077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.709853888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.730132103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.730226040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.730252028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.730271101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.730294943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.730320930 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.730483055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.730539083 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.730566978 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.730583906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.730612040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.730657101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751351118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751413107 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751458883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751472950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751501083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751521111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751703978 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751755953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751792908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751799107 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751816988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.751832008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751848936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.751868963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.772687912 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.772732973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.772766113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.772774935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.772805929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.772834063 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.772978067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.773029089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.773056030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.773071051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.773097992 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.773098946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.773112059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.773127079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.773153067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.773176908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794045925 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794106007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794138908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794157982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794182062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794450045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794496059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794512987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794540882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794558048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794589043 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794598103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.794625998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.794645071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.815268040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815340996 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815390110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.815414906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815443993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.815459967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.815666914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815722942 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815797091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815845013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.815860033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.815888882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.815908909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.836595058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.836661100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.836689949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.836709023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.836734056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.836772919 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.837008953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.837064028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.837095022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.837112904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.837141991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.837172031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.857909918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858012915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858062983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.858097076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858125925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.858146906 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.858270884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858323097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858366013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.858382940 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858407974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.858428001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.858625889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.858699083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879164934 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879370928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879427910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879462957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879492044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879501104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879513979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879534006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879560947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879575968 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879607916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879620075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.879651070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.879678965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.900615931 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.900677919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.900734901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.900747061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.900778055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.900799036 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.900923014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.900979996 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.901010036 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.901022911 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.901052952 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.901072979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.921859026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.921936035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.921988010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.921998978 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.922029018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.922046900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.922226906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.922277927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.922312975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.922327042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.922352076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.922368050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.922386885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.922452927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943113089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943173885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943232059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943245888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943275928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943294048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943491936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943555117 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943571091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943588972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943624973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943656921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943670034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.943694115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.943713903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.964515924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.964571953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.964627981 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.964642048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.964673042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.964689970 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.964845896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.964895964 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.964926004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.964947939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.964962959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.965007067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.985759974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.985817909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.985846996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.985861063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.985886097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.985907078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.986083984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.986140013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.986176014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.986186028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.986213923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.986229897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:27.986264944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:27.986335993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.006984949 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007031918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007050037 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007057905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007076025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007097006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007355928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007395983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007419109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007424116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007436991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007450104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007462978 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007467031 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.007493973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.007515907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.028224945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.028270960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.028311968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.028321981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.028347015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.028367043 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.028708935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.028744936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.028770924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.028776884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.028804064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.028821945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.049587965 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.049670935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.049705029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.049729109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.049760103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.049777031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.049941063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.049989939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.050024986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.050043106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.050071955 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.050087929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.050101042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.050148964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.070871115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.070924044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.070974112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.070986032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.071013927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.071031094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.071300030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.071352959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.071384907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.071389914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.071405888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.071405888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.071425915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.071445942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.092189074 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.092339993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.092371941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.092454910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.092614889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.092669964 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.092708111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.092726946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.092765093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.092788935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.113538027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.113697052 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.113758087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.113840103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.113908052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.113965034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.113996029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.114015102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.114042044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.114085913 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.134767056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.134864092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.134906054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.134943962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.134975910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.134996891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.135200024 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.135257006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.135289907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.135308027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.135340929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.135371923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.156013012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.156068087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.156192064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.156193018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.156212091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.156271935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.156541109 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.156666994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.156698942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.156760931 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.156804085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.156829119 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.177238941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.177303076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.177346945 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.177360058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.177390099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.177408934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.177630901 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.177678108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.177709103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.177727938 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.177758932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.177789927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.198045015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.198110104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.198153019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.198163986 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.198193073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.198209047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.198468924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.198522091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.198554993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.198571920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.198607922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.198626041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.218673944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.218724966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.218760014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.218776941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.218802929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.218817949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.219095945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.219147921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.219177008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.219192982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.219224930 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.219249964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.239414930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.239458084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.239696026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.239708900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.239778042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.239800930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.239849091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.239881039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.239892960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.239921093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.239964008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260202885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260260105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260303974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260314941 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260341883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260356903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260560989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260611057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260637045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260652065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260674953 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260679960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260690928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260706902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.260735035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.260754108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281339884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281405926 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281461954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281476021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281503916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281527042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281778097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281835079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281864882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281869888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281884909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.281886101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281913042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.281933069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.302701950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.302762985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.302791119 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.302808046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.302836895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.302855968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.303083897 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.303134918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.303168058 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.303186893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.303215981 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.303240061 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.323932886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.323992968 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.324039936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.324052095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.324219942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.324219942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.324518919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.324572086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.324603081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.324615002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.324639082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.324665070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345408916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345473051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345510006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345521927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345699072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345700026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345716000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345732927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345782995 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345815897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345833063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345860958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345880985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345885038 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.345896959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.345947027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.366703987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.366766930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.366898060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.366898060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.366914988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.366970062 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.367060900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.367125988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.367162943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.367178917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.367204905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.367224932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.367254019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.367263079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.367286921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.367319107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.388000011 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.388062954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.388096094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.388109922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.388259888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.388259888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.388659000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.388712883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.388746023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.388761997 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.388789892 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.388806105 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409411907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409473896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409559965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409575939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409761906 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409761906 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409784079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409801960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409826994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409843922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409862041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409885883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409904003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409933090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.409941912 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.409962893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.410002947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.430682898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.430744886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.430782080 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.430794001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.430998087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.430998087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.431031942 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.431087017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.431118011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.431128979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.431152105 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.431168079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.431196928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.431205988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.431227922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.431257963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452121019 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452291012 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452353954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452426910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452589035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452657938 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452680111 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452697039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452727079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452742100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452770948 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452780962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.452805042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.452825069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.473537922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.473705053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.473766088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.473872900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.473927021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.473974943 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.473990917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.473990917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.473992109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.474018097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.474057913 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.474081993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.494769096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.494844913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.494883060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.494899988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.494926929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.494951963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.495089054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.495179892 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.495248079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.495249033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.495312929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.495378017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.516169071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.516244888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.516257048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.516287088 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.516324997 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.516350985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.516469002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.516644001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.516684055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.516746998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.516788960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.516813993 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.537502050 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.537602901 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.537652969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.537688971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.537791014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.537791967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.537939072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.537995100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.538027048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.538048029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.538080931 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.538105965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.558896065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.558968067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.559111118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.559111118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.559124947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.559154987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.559192896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.559195995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.559212923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.559232950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.559266090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.559295893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.559312105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.559366941 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580157042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580370903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580420017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580462933 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580492973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580517054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580538034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580605984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580627918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580645084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580679893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580694914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580727100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580737114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.580765963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.580789089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.601481915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.601684093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.601746082 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.601824045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.601855993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.601924896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.601954937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.601974010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.602003098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.602008104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.602020025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.602037907 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.602072954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.602098942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.622718096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.622884035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.622947931 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.623059034 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.623147011 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.623223066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.623251915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.623270035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.623298883 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.623312950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.623347044 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.623357058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.623380899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.623398066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644232988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644351959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644399881 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644434929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644464016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644486904 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644547939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644607067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644632101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644646883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644676924 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644680023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644696951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644709110 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.644733906 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.644767046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.665870905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.665929079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.665960073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.665977955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.666004896 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.666019917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.666445017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.666507959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.666536093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.666552067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.666575909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.666593075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.666645050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.666656017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.666678905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.666695118 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.686702967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.686778069 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.686808109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.686825037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.686852932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.686867952 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.687191963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.687254906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.687283039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.687299967 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.687324047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.687340975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.687367916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.687377930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.687398911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.687423944 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.708041906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.708105087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.708153009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.708164930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.708190918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.708209038 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.708489895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.708555937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.708576918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.708595991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.708622932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.708655119 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729087114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.729152918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.729185104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729197025 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.729223013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729244947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729528904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.729589939 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.729619026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729638100 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.729661942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729682922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.729703903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.749900103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.749965906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.750005960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.750025034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.750051975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.750067949 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.750226974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.750288963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.750318050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.750336885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.750365019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.750384092 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.770533085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.770704985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.770766973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.770842075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.770860910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.770884991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.770920992 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.770960093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.770967960 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.770986080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.771012068 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.771035910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.791407108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.791577101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.791640043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.791738987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.791835070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.791897058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.791932106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.791951895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.791985989 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.792011023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.812165976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.812330961 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.812391996 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.812489986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.812550068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.812608957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.812635899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.812654972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.812685013 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.812710047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.833471060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.833545923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.833602905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.833632946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.833668947 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.833683014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.833730936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.833738089 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.833751917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.833782911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.854497910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.854645967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.854676008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.854785919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.854824066 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.854861975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.854888916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.854888916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.854888916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.854898930 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.854914904 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.854952097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.875739098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.875796080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.875943899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.875967026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.876121998 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.876125097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.876142979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.876183033 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.876214027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.876214027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.876229048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.876251936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.876280069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.876280069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.876300097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.897100925 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.897262096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.897311926 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.897416115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.897454977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.897506952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.897533894 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.897551060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.897584915 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.897617102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.918514013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.918675900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.918704033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.918723106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.918747902 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.918776035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.918849945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.918883085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.918915033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.918920994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.918951035 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.918975115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.939693928 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.939821959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.939851999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.940071106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.940105915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.940181017 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.944907904 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.944928885 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.944998026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961040020 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961095095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961169004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961179972 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961441994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961441994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961494923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961504936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961569071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961606979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961630106 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.961663961 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961695910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.961716890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.982388020 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.982445955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.982597113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.982597113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.982614040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.982682943 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.982760906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.982809067 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.982841015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.982856035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:28.982888937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:28.982914925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.003680944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.003819942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.003849983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.004043102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.004059076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.004108906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.004178047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.004178047 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.004194021 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.004261971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.025072098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.025124073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.025160074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.025171041 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.025197029 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.025214911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.025538921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.025585890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.025621891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.025635004 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.025662899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.025682926 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046359062 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046566010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046626091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046660900 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046683073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046698093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046713114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046744108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046755075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046782970 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046812057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046818018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046828985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.046864986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.046901941 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.067624092 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.067790985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.067852020 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.067964077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.068015099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.068069935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.068087101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.068161011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.068161011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.089011908 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.089142084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.089173079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.089339018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.089457035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.089498043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.089529991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.089535952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.089550972 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.089584112 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.110341072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.110527992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.110553026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.110573053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.110599995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.110620022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.110693932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.110743999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.110795975 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.110807896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.110841990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.110867023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.131597042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.131759882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.131789923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.131866932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.131932020 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.131970882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.131994009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.132002115 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.132024050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.132047892 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.152903080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.153038979 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.153069973 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.153223991 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.153297901 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.153333902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.153366089 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.153372049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.153389931 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.153428078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.174247980 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.174412012 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.174420118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.174442053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.174474001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.174515009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.174593925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.174593925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.174593925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.174593925 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.174606085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.174654007 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195353985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195547104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195568085 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195585966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195621014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195640087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195806980 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195857048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195892096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195907116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195935011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195954084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.195957899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.195969105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.196018934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.216747046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.216788054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.217025995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.217025995 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.217056990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.217109919 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.217168093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.217211962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.217241049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.217247009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.217262030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.217319965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.237979889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238135099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.238202095 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238296032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.238343954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238398075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238425016 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.238441944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238466024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.238483906 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238512039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.238523960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.238548040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.238569021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.259274006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.259449959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.259526014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.259610891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.259666920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.259721994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.259751081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.259768009 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.259798050 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.259813070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.280602932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.280736923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.280771971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.280843019 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.280980110 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.281017065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.281038046 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.281045914 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.281064987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.281095028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302012920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302145004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302174091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302233934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302356958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302393913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302424908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302431107 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302443027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302443027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302467108 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302473068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.302495003 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.302520990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323472023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323524952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323566914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323576927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323596954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323606014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323618889 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323659897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323659897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323679924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323707104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323725939 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.323769093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.323834896 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.344752073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.344886065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.344917059 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.344985008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.344986916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.344995022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.345019102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.345047951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.345055103 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.345066071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.345071077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.345088959 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.345094919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.345120907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.345155001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.365959883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.366014957 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.366059065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.366070032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.366097927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.366117001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.366334915 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.366385937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.366528988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.366529942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.366594076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.366661072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.387191057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.387257099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.387301922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.387315989 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.387340069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.387370110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.387569904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.387753963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.387773037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.387821913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.387865067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.387891054 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.408626080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.408751011 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.408781052 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.408843040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.408977985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.409010887 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.409039021 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.409044027 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.409056902 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.409084082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.409099102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.409148932 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.429919958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.430007935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.430062056 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.430100918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.430128098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.430150032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.430305004 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.430347919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.430381060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.430397034 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.430428028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.430459976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.451179028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451250076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451390028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.451390028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.451411963 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451462984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.451637030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451682091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451711893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.451713085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451725006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.451741934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.451761961 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.472635984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.472824097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.472887993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.472954035 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.472970963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.472995996 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.473037004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.473052979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.473082066 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.473092079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.473115921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.473140001 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.493798971 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.493849993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.493891954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.493926048 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.494132996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.494132996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.494235039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.494277954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.494314909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.494316101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.494339943 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.494370937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.494370937 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.494391918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.515115976 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.515168905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.515517950 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.515542030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.515588999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.515634060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.515659094 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.515688896 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.515701056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.515733957 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.515749931 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.536587954 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.536660910 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.536791086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.536823988 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.536844015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.536880016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.536931038 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.536974907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.536974907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.536974907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.536997080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.537039042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.537060022 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.557735920 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.557897091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.557957888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.558125019 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.558163881 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.558182001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.558226109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.558244944 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.558273077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.558283091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.558310986 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.558340073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.579072952 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.579278946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.579319954 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.579360008 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.579387903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.579411983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.579539061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.579587936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.579619884 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.579636097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.579667091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.579684973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.600519896 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.600682974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.600747108 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.600837946 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.600914001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.600965023 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.600996971 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.601010084 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.601028919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.601038933 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.601057053 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.601068974 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.601118088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.601160049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.621748924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.621824026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.621881008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.621916056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.622044086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.622045040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.622231960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.622273922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.622318983 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.622445107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.622458935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.622517109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.643090010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.643158913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.643275023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.643275976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.643296003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.643349886 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.643493891 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.643533945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.643565893 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.643577099 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.643604994 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.643630981 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664382935 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664433956 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664573908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664575100 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664591074 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664645910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664766073 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664800882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664834023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664839029 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664849043 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664863110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664885998 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664892912 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.664905071 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.664940119 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.685714960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.685775042 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.685900927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.685900927 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.685914040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.685980082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.686178923 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.686223030 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.686249018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.686254978 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.686265945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.686296940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.686296940 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.686316967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.706960917 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707113028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.707174063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707284927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707336903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707370996 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.707391977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707422018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.707422018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.707429886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707451105 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.707463026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.707487106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.707510948 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728199005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728404999 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728455067 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728490114 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728518963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728538990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728657007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728704929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728738070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728753090 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728779078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728794098 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.728802919 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.728854895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.749970913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750051975 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750096083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.750127077 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750158072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.750180006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.750494003 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750540018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750566006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.750581026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750608921 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.750623941 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.750637054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.750685930 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.770931005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.770984888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771014929 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771033049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771056890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771078110 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771347046 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771393061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771416903 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771430969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771456003 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771469116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771471024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771486044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.771509886 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.771550894 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.792288065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.792383909 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.792481899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.792481899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.792521000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.792650938 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.792690992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.792721033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.792741060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.792781115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.792781115 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.792805910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.813507080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.813558102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.813683987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.813683987 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.813698053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.813751936 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.814009905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.814050913 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.814095020 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.814110994 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.814140081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.814163923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.835161924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.835212946 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.835356951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.835356951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.835370064 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.835416079 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.835706949 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.835865974 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.835927010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.835987091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.836026907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.836042881 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.836071014 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.836091042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.856431007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.856617928 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.856679916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.856713057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.856745958 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.856779099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.856779099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.856797934 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.856834888 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.856858015 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.877918005 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.877994061 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878021955 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878046036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878060102 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878084898 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878282070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878335953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878369093 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878384113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878408909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878424883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878427982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878454924 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.878472090 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.878503084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.899481058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.899636030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.899697065 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.899774075 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.899985075 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.900043964 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.900079966 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.900096893 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.900162935 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.900163889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.920886993 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921051025 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.921114922 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921206951 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.921382904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921438932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921480894 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.921493053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921516895 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921523094 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.921540976 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.921551943 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.921581030 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.921624899 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.941617966 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.941721916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.941768885 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.941804886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.941837072 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.941855907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.941968918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.942015886 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.942044973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.942064047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.942100048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.942100048 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.942121983 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963145018 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963211060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963267088 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963280916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963311911 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963331938 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963560104 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963610888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963710070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963726044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963748932 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963756084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963784933 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963794947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.963818073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.963843107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984349012 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984407902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984481096 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984491110 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984538078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984558105 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984733105 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984786987 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984814882 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984829903 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984857082 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984872103 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:29.984904051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:29.984966040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.005615950 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.005676031 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.005723000 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.005734921 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.005767107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.005785942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.005939007 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.005990982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.006028891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.006040096 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.006066084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.006081104 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.006202936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.006270885 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.026936054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027010918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027036905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027055979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027081966 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027100086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027342081 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027403116 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027431965 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027441978 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027467966 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027476072 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027486086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027524948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.027549028 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.027573109 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048300982 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.048357010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.048409939 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048422098 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.048456907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048476934 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048664093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.048718929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.048743010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048757076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.048784018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048798084 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.048945904 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.049014091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.069612026 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.069679022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.069823027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.069823027 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.069838047 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.069886923 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.069972992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.070023060 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.070050955 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.070065022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.070090055 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.070111036 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.070113897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.070136070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.070141077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.070158958 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.070185900 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.090888977 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.090939045 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.090989113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091000080 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.091026068 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091047049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091233015 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.091290951 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.091315031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091330051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.091356039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091366053 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.091372967 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091391087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.091422081 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.091444969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112097979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112171888 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112205982 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112216949 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112245083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112262964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112576962 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112632990 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112657070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112670898 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112698078 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112710953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112713099 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112734079 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.112765074 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.112785101 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.133630037 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.133688927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.133944988 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.133958101 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.134025097 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.134041071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.134089947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.134135008 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.134144068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.134171963 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.134188890 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.134191990 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.134211063 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.134238005 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.134263039 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.154833078 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.154901028 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.154944897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.154956102 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.154985905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.155009031 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.155189991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.155240059 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.155280113 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.155287981 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.155313969 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.155320883 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.155333042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.155358076 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.155380964 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.155404091 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.175995111 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.176047087 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.176096916 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.176131010 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.176162004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.176182985 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.176369905 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.176414013 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.176462889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.176462889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.176476002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.176536083 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.197324991 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.197395086 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.197432041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.197442055 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.197468042 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.197493076 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.197741032 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.197782040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.197820902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.197952032 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.197963953 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.198029041 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.218579054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.218632936 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.218669891 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.218682051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.218723059 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.218758106 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.218961000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.219007969 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.219032049 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.219047070 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.219075918 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.219099045 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.240129948 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.240185022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.240255117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.240266085 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.240293026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.240314007 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.240596056 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.240642071 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.240674973 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.240690947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.240722895 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.240741968 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242193937 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242244959 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242281914 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242291927 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242319107 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242333889 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242567062 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242614985 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242640018 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242655039 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242681026 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242695093 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242723942 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242733955 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.242758036 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.242775917 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263499022 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263562918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263609886 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263628006 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263660908 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263690948 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263793945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263847113 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263881922 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263884068 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263896942 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.263906956 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263928890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.263956070 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.284796000 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.284864902 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.284919024 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.284946918 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.284976006 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.284992933 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.285260916 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.285300016 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.285335064 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.285351992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.285379887 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.285402060 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.306251049 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.306313992 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.306385040 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.306401014 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.306449890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.306449890 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.306606054 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.306648970 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.306674004 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.306689978 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.306719065 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.306742907 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.327460051 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.327510118 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.327601910 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.327617884 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.327732086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.327732086 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.327874899 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.327919960 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.327946901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.327958107 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.327987909 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.328013897 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.348860979 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.349016905 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.349078894 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.349235058 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.349292040 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.349327087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.349327087 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.349350929 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.349390984 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.349419117 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370187044 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370337009 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370397091 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370558023 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370563984 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370577097 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370641947 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370665073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370665073 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370682001 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370706081 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.370732069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370732069 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.370773077 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.391469002 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.391521931 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.391726017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.391726017 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.391742945 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.391815901 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.391931057 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.391983986 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.392019033 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.392035961 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.392066956 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.392107010 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:30.392433882 CEST443497078.18.62.6192.168.2.7
                                                        Apr 18, 2024 06:25:30.392486095 CEST49707443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:37.703008890 CEST49706443192.168.2.78.18.62.6
                                                        Apr 18, 2024 06:25:37.703171015 CEST49707443192.168.2.78.18.62.6
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 18, 2024 06:25:21.452157974 CEST5970553192.168.2.71.1.1.1
                                                        Apr 18, 2024 06:25:21.599008083 CEST53597051.1.1.1192.168.2.7
                                                        Apr 18, 2024 06:25:22.289244890 CEST5752253192.168.2.71.1.1.1
                                                        Apr 18, 2024 06:25:22.473436117 CEST53575221.1.1.1192.168.2.7
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Apr 18, 2024 06:25:21.452157974 CEST192.168.2.71.1.1.10x1b83Standard query (0)support.lockwoodbroadcast.comA (IP address)IN (0x0001)false
                                                        Apr 18, 2024 06:25:22.289244890 CEST192.168.2.71.1.1.10x8d0cStandard query (0)support.lockwoodbroadcast.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Apr 18, 2024 06:25:21.599008083 CEST1.1.1.1192.168.2.70x1b83No error (0)support.lockwoodbroadcast.com8.18.62.6A (IP address)IN (0x0001)false
                                                        Apr 18, 2024 06:25:22.473436117 CEST1.1.1.1192.168.2.70x8d0cNo error (0)support.lockwoodbroadcast.com8.18.62.6A (IP address)IN (0x0001)false
                                                        • support.lockwoodbroadcast.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.7497068.18.62.64433624C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-18 04:25:22 UTC243OUTGET /as/wapi/get_client_size?client_type=0&xml_format=Y&client=pc&myrand11262017=fsOpyNl7RRDmyVQ8cYMYTocPl4347283&rdm=1713420883 HTTP/1.1
                                                        User-Agent: Microsoft Internet Explorer
                                                        Host: support.lockwoodbroadcast.com
                                                        Connection: Keep-Alive
                                                        2024-04-18 04:25:22 UTC177INHTTP/1.1 200 OK
                                                        Date: Thu, 18 Apr 2024 00:25:22 GMT
                                                        Cache-Control: no-store
                                                        Accept-Ranges: bytes
                                                        Content-Type: text/html
                                                        Content-Length: 86
                                                        X-Frame-Options: SAMEORIGIN
                                                        2024-04-18 04:25:22 UTC86INData Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 54 68 65 20 63 6c 69 65 6e 74 20 73 69 7a 65 20 69 73 20 3c 5f 5f 43 6c 69 65 6e 74 53 69 7a 65 5f 5f 3e 31 30 39 32 31 30 30 33 3c 2f 5f 5f 43 6c 69 65 6e 74 53 69 7a 65 5f 5f 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <html><body>The client size is <__ClientSize__>10921003</__ClientSize__></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.7497078.18.62.64433624C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-18 04:25:22 UTC225OUTGET /as/wapi/get_client?client_type=0&client=pc&myrand11262017=1s4z4AVItfvg3fyyYjjDdD6L2c347284&rdm=1713420884 HTTP/1.1
                                                        User-Agent: Microsoft Internet Explorer
                                                        Host: support.lockwoodbroadcast.com
                                                        Connection: Keep-Alive
                                                        2024-04-18 04:25:23 UTC245INHTTP/1.1 200 OK
                                                        Date: Thu, 18 Apr 2024 00:25:22 GMT
                                                        Cache-Control: no-store
                                                        CAccept-Ranges: bytes
                                                        Content-Type: application/octet-stream
                                                        Last-Modified: Thu, 18 Apr 2024 00:25:22 GMT
                                                        Content-Length: 10921003
                                                        X-Frame-Options: SAMEORIGIN
                                                        2024-04-18 04:25:23 UTC14100INData Raw: 0f 00 00 00 43 6c 69 65 6e 74 44 61 74 61 62 61 73 65 00 c0 02 00 00 a4 01 78 9c ed 58 61 6b d3 40 18 de 88 3f a0 5d ee 12 06 ab 74 ba 16 c6 14 99 bd 0f 13 56 e8 50 eb 87 ac b8 a8 d5 5a 19 bb 96 92 80 30 e8 b5 a4 4d 93 e5 3f 38 c7 ec 37 ff 9b fe 01 7f 81 e2 25 4d ba 5c 93 26 55 c4 2a bd 07 12 2e f7 de 73 ef 7b ef 3d 2f 5c ee d9 d3 86 83 09 ea 65 00 84 e0 15 42 b7 d6 d6 d7 d7 2a f9 3c 00 20 e7 3f 01 44 fa 64 42 df 10 a4 23 07 1e 7d ff 91 a5 0d 49 fe ea 7d cb df 26 0d 0e 0e 8e 25 62 c3 2d e5 ac b4 e9 b6 69 93 d6 e5 97 25 47 c4 c1 c1 f1 37 20 5f 5d c8 60 4b 86 32 c8 05 f5 cf c1 c1 b1 7a e0 f5 cf c1 b1 ba 70 eb 1f c2 63 00 8f e9 eb 9f c2 f5 03 28 0a e5 32 fc 54 c0 c6 c0 24 43 d3 21 16 56 74 82 b1 63 f5 d9 2f e9 4d 55 ad 57 54 54 a9 bf 6e a8 88 b5 a1 c3 db c8
                                                        Data Ascii: ClientDatabasexXak@?]tVPZ0M?87%M\&U*.s{=/\eB*< ?DdB#}I}&%b-i%G7 _]`K2zpc(2T$C!Vtc/MUWTTn
                                                        2024-04-18 04:25:23 UTC14338INData Raw: 18 6b 52 f3 7f 7a 1f d4 85 ff 2e 10 a9 ef 91 6b 08 d7 9e 8d 05 7f 26 6f 36 c5 f5 47 c2 3e c1 dc 39 4b d4 4a fb 51 de ef e9 7b fa f3 83 71 39 37 e8 e9 e4 d5 4b a6 f7 c2 f0 fe fc a2 e0 59 e3 9a 82 ef 8b 58 6b 52 f7 ae 87 73 5e f2 57 d1 c9 3b fc 85 f4 73 2c cb b7 26 38 fb 14 3e ef c6 d7 a4 ee 6f 24 af dd 27 84 cf 06 d4 4a df 62 d0 da 73 2c 79 ef 35 66 cd 2d 85 97 51 d8 67 a9 c6 9f 88 ff 7f ea 1e 85 99 55 e6 02 e9 19 dd f4 77 56 24 cb 50 83 e3 29 59 93 96 c6 bb 95 15 53 fe ae 9e 96 62 e6 aa a7 95 75 5c a7 62 2e 6c f6 9d 60 8d c1 15 6e 6a 26 cd 7b 1f 2e ab 6e 7e 99 fe 67 9c d9 df e1 91 5c 1d a6 9f 1b 52 83 e3 a4 3e fc 84 7e 4e c6 b1 95 3d b7 24 6b 62 8a aa a6 f9 27 fd 6d 44 79 c7 ef ff 63 f5 ca fc 06 92 bc f7 e9 72 d4 27 fd bd 41 a9 ef ae 4a bd 49 50 1b cc 54
                                                        Data Ascii: kRz.k&o6G>9KJQ{q97KYXkRs^W;s,&8>o$'Jbs,y5f-QgUwV$P)YSbu\b.l`nj&{.n~g\R>~N=$kb'mDycr'AJIPT
                                                        2024-04-18 04:25:23 UTC3306INData Raw: 6d 8f 07 97 db 3c 26 78 83 ca 7d ec 58 70 7f f8 ef 2c b7 41 65 fe 91 28 77 c7 13 2f bd dc bb 9f 08 2e 37 95 f5 c8 13 bf 3f e5 ee 38 6d 51 e8 00 80 78 cf 58 ba 28 d4 01 20 fa 0d 2b 16 85 0a 80 a3 80 58 23 60 d5 a2 d0 c1 55 22 dc d1 75 08 b7 1e 6e 80 1e e7 c0 06 d0 6a 81 5f 2b e2 02 62 1b e1 06 1c 02 1c 3f 7b 91 33 46 b7 ad 86 df 2b 81 5f 03 7a e7 2c 0a 1d 01 1c 7a b3 c8 c7 b1 37 bb 34 0f 1d 40 3c 80 f1 56 84 05 1c 7a ab 9b 8f e3 6f 75 e3 1c b8 c5 9b 8f a3 b7 b8 79 3f fe 61 37 ce ec 5f 68 e9 cc ba 71 76 e3 bd ed 33 6e 3a b3 77 bb 71 cc 3b 44 1c fa c6 77 e4 b3 be 74 ee 41 b8 c3 a0 47 f0 39 2d 0e ad 09 c8 74 0a c7 dc 38 1d 3f 84 1f 60 f6 09 c4 ff 11 d2 7c d2 8d 73 e8 29 37 6f b1 e7 bc e9 1c 7a 4e e4 ed d0 f3 78 fe 46 8b 83 77 9a 57 74 5c b5 38 b4 1b 70 e8 ca
                                                        Data Ascii: m<&x}Xp,Ae(w/.7?8mQxX( +X#`U"unj_+b?{3F+_z,z74@<Vzouy?a7_hqv3n:wq;DwtAG9-t8?`|s)7ozNxFwWt\8p
                                                        2024-04-18 04:25:23 UTC14338INData Raw: e2 5e 5d a6 79 e5 a0 0e bb a4 55 d8 56 29 23 82 c3 34 73 ce 82 fd 05 ae dd 08 fe 0e 4f d2 8b e4 d3 b9 1c ee 5c ce 45 cc e1 55 ef 3e 51 ff 17 87 bc 94 b1 7a dc ca f3 a0 95 7e f4 ab 77 34 a0 09 ae d9 2c cb 6c 95 ae a8 99 b4 cc a7 2e 67 6c 96 bc 6a c7 4c 4e 8e ef 6a a5 ce dd c1 a1 d6 e9 d3 ac 1d 05 69 ba fe d3 34 ed 9c 7f d5 12 cd 68 97 cd f8 6b e5 ff 6d 99 27 43 1b b7 2a c3 78 cb 95 65 2e a2 7c af 71 be 6e 89 31 c6 5d 25 aa ac e1 b4 23 8b a7 8d 8c 67 9d 52 5f 03 d1 4f 18 b9 23 9a bb 62 5f 6d 5e e7 ae 6f 51 69 eb d1 13 84 8e 18 d3 38 41 d4 80 57 2f 75 f1 02 eb 96 52 2f 8b 68 27 35 d7 d5 57 53 95 5e 9b 31 52 4e ce 83 57 62 dd f5 77 ff 0a ac e5 94 d2 6b 5d c1 6d fd e0 79 a4 be 2a bb 81 7b 77 9e e3 28 2d db 9f 72 7d 8d 79 b1 db 7b bc ab 83 39 43 ed 89 50 6b 3b
                                                        Data Ascii: ^]yUV)#4sO\EU>Qz~w4,l.gljLNji4hkm'C*xe.|qn1]%#gR_O#b_m^oQi8AW/uR/h'5WS^1RNWbwk]my*{w(-r}y{9CPk;
                                                        2024-04-18 04:25:23 UTC14338INData Raw: 7c 6e 96 cf 2d f2 c9 07 ae 23 f1 f8 50 dc 55 4e 7a e3 6b ea 8d 9d e1 f8 60 74 b0 b7 dd 14 f7 4f f2 5c 9a c7 01 69 99 3e 29 44 8d 25 83 1b 9d a4 7f 8b 09 b7 09 35 29 65 76 6e 6a 67 c3 ba 17 93 ea 9a 4d 8e 5b d9 31 cc 10 2f a6 1e 1e 29 64 a0 2f cb 60 9b a1 b6 f2 32 36 07 ec 8f 74 62 e4 59 47 eb 0a eb 2b c3 6e 09 08 4b 33 d8 8b 85 dc a8 cc c3 d6 aa 79 18 81 c6 35 91 21 93 24 fd e4 cf 92 67 d8 9d 5b 0a 19 48 2a ab dc 22 5e cf 7d 3e e9 1e 8e f7 21 bb 78 6d 91 6a 2a 40 f5 a4 13 a6 ee 54 88 be 8d 52 16 e3 9b 4c b1 09 ae 9d 27 24 17 53 18 f1 99 4c 96 47 85 db 2c 03 b4 55 c1 6f a9 42 c0 a7 6d 52 95 60 b4 80 da 8e 06 8b 0b fd 3d 6d 32 63 f1 a2 98 2a a6 31 90 b1 53 03 49 7b 0f 84 16 ed eb 96 f2 4e 86 6f b6 3d 81 7b 8a de 90 bd 3e 37 7d df 8f a5 84 5b 9c 94 88 b1 58
                                                        Data Ascii: |n-#PUNzk`tO\i>)D%5)evnjgM[1/)d/`26tbYG+nK3y5!$g[H*"^}>!xmj*@TRL'$SLG,UoBmR`=m2c*1SI{No={>7}[X
                                                        2024-04-18 04:25:23 UTC3068INData Raw: 83 f7 de 53 d6 6a 7a 61 23 9f 17 90 c8 7f cd ab bc a7 bd 9d c4 ce 9b 3a e0 f2 43 ae fd 5a 75 e0 b5 e7 be fa 9f 5e fb ce 76 83 6b 1f cd af 3d 42 9b c2 a7 0e 27 c9 b6 74 b4 13 c8 bf 9d aa 48 7e 3b fe 2c 13 c6 bd 33 d8 8d 01 da 86 d9 ba d5 4b 0f ad 85 cc a2 e3 78 bf e0 27 29 b3 cc 9e 86 6b 1d ea db ff e4 4f 98 d0 bb 2e cc 7b 65 32 a3 aa af 90 fb 2a 1f 48 c3 09 e4 c2 5a bd 1d 74 c0 30 e6 bf 38 f2 d4 f1 90 41 de 7c f4 8b f9 4c ff dc 67 69 41 bf e2 02 95 ca ba c7 b5 db 13 2c d1 0f d5 33 68 93 7e 1f 61 1d 7e 3f 29 9e fa c1 b3 4c ab ed 7e 5f 3c df 4a c2 a7 1e e0 5b 47 90 f7 14 0d a5 ef a0 17 83 d4 b5 3b d8 d6 32 67 fd 16 53 78 e7 43 6a f1 0e cd d1 cd dc 42 8e ae 59 1d 3b 89 1c dd fa 70 a8 4d e7 8f d4 99 7c f7 95 5a 53 76 4a da 51 5f df c6 c6 81 fa 31 38 2c 4f f6
                                                        Data Ascii: Sjza#:CZu^vk=B'tH~;,3Kx')kO.{e2*HZt08A|LgiA,3h~a~?)L~_<J[G;2gSxCjBY;pM|ZSvJQ_18,O
                                                        2024-04-18 04:25:23 UTC14338INData Raw: a1 55 36 75 3e ab 7f 00 2d df 1e f0 67 f4 e4 63 ae bd a1 0f 7a dc 27 6f e8 75 28 5b 69 fc 7a 73 36 ba 9f 5a fe 03 0d 10 a6 0d f4 1c e4 34 28 9b bb cf bf b5 07 1d 5a 9d bc 11 17 cf 0e a4 f3 71 6a ef 9b 8b 70 82 43 9d c3 cf 58 ff 21 1d dd eb df 2a 8d a0 87 93 36 4a fc e9 cb 90 67 d4 e8 41 a4 ec bc 7c 54 fb 59 9c 4d 89 bf 59 4a 04 4e 55 23 49 a6 7a 3d 01 9e 76 b2 b2 b5 39 8a 3d cc 3b b6 fc f0 69 fa 4f 4b ee 28 f5 d8 5f 51 7a af d0 76 94 5d 1f fa c4 e1 16 d8 69 32 3b f4 78 25 3b 6c 60 92 90 01 64 f8 cd 32 a4 94 e7 a0 94 e9 b2 e9 9a 49 0b d8 9b 9c e2 72 6f 05 53 de ea 8d 60 ef 8b c9 95 eb 23 98 87 b1 b5 14 7f d3 94 ac 9e c6 ca f5 33 b5 09 fb d6 2d f8 63 9c 8e d7 38 9d 9b 07 a5 53 2d d2 29 d7 d2 71 19 a4 53 33 38 1d 7a f2 e5 9b 7c 4c b4 cf b9 46 2a 1f aa 5f 37
                                                        Data Ascii: U6u>-gcz'ou([izs6Z4(ZqjpCX!*6JgA|TYMYJNU#Iz=v9=;iOK(_Qzv]i2;x%;l`d2IroS`#3-c8S-)qS38z|LF*_7
                                                        2024-04-18 04:25:23 UTC14338INData Raw: 92 7f e7 68 5a 7b 3d aa 26 ca 80 04 09 7f bb 16 63 a9 e0 11 9a cf 43 c5 0c 34 51 50 21 39 d8 a8 a7 c4 04 43 17 3a 30 f1 d7 a1 c4 37 a3 bc 76 85 af 30 51 09 25 da a3 4b 7e 03 89 ed 8f 68 78 cd 9d 0b fa f4 29 b4 df 8e 9a 8f 50 17 0c 91 da 85 73 98 77 32 82 4a 4f 34 84 3a 16 2e 60 a2 db 90 68 88 9a 2c 5c c6 c4 c4 48 e2 d6 e8 10 d9 82 09 58 80 f6 bf 5f 89 a4 1f 8c 4e b7 60 7a 23 a6 13 a8 12 e0 a7 fa 36 86 ff df 66 28 d3 14 5d a6 1f 96 79 de 90 de 19 9d 6e c7 f4 25 86 74 67 34 64 1c 98 5e 7a 25 04 99 bf 22 64 06 c5 85 21 b3 b5 3b ba ba 21 98 dd 6d a8 6e 6d 74 7a 32 a6 5b 0d e9 ee e8 e6 86 63 fa 99 cb 91 74 6b 74 fa 08 4c 3f 68 48 6f 8d ae 7f 14 a6 6f 8e a4 1b e3 f3 0b 6e 4c 5c 65 28 6c 8a ae fc 06 4c 7f 98 d2 f1 da b3 f2 a8 10 ca 14 1a 1a 78 e7 2e 4b 19 da e5
                                                        Data Ascii: hZ{=&cC4QP!9C:07v0Q%K~hx)Psw2JO4:.`h,\HX_N`z#6f(]yn%tg4d^z%"d!;!mnmtz2[ctktL?hHoonL\e(lLx.K
                                                        2024-04-18 04:25:23 UTC3068INData Raw: e6 bc f8 36 b0 b3 2a 9b e6 6b 63 3e 07 ec 6f cc 6f e2 03 b4 e1 ae c0 4c 8b 3e 17 6e 0b 5c ab c5 4e ad ba 43 53 ba b4 7a ae 55 1d 43 74 3a 3d 4b 72 95 e1 9e 07 1d ca 10 8f df 69 5d 83 4a 14 b5 51 60 ef 18 2b 3f 1e f1 ed f3 c7 ea 6c c0 ab f9 e7 06 03 f1 a5 76 5c ec 83 7d de 62 9b 7c ab 5a ef 34 58 d7 6c 21 ac 1e 65 87 91 4b 65 68 6b 39 b1 03 d8 9b 25 22 1e fe 0b 88 fd 99 36 4f f9 51 eb 6a 24 71 ea 19 4b ad 29 6c 59 50 81 bc a3 9f af ef a0 85 c5 66 e6 b2 62 89 18 bc 22 a3 56 9c 1b b5 c4 8a 5d 9e 62 57 6d 36 2b b6 14 6a c5 ae fb 66 ba f2 23 4a 0f 5b e8 64 55 c7 60 1f ce 55 9b 3a 4c b0 ef 39 3b 57 e1 c7 90 01 4a a7 36 d3 01 62 40 a5 13 3e 4f 50 93 fa 8e 98 72 5c 2b ce d3 2a 27 b1 4b 2a 53 96 62 7b 22 21 6e 7c 39 6e fa 9d 58 8e b9 a9 ce 96 80 53 58 84 e5 e7 61
                                                        Data Ascii: 6*kc>ooL>n\NCSzUCt:=Kri]JQ`+?lv\}b|Z4Xl!eKehk9%"6OQj$qK)lYPfb"V]bWm6+jf#J[dU`U:L9;WJ6b@>OPr\+*'K*Sb{"!n|9nXSXa
                                                        2024-04-18 04:25:23 UTC14338INData Raw: 2b 80 57 9c 5e e3 29 19 ae 4c 5d b9 62 84 51 b9 c1 fa a7 12 8b fa a8 7a de 20 4f b4 6e 2e 71 98 80 23 3a 0f df b1 d9 92 a9 4c f2 96 1f af 33 69 e5 c7 59 c9 c8 32 13 86 d3 f4 fa f8 32 13 c0 b6 fe b1 64 44 a9 a9 4f 6d 19 89 dd 85 56 6a 5f 86 51 a1 a1 c9 30 f4 c3 2c 1e 89 aa d4 8e a4 67 21 53 7a 26 ee 61 2d 5a f9 a1 a6 2e 60 56 ae 32 b5 f1 fd 18 39 ae 13 86 88 66 1c ff 43 a4 e7 78 64 66 1e ab 3f 06 24 b0 58 42 bd 7a 9d 13 15 7a 95 2e ad d2 a2 15 db b4 4a 3b 74 4c 9b 99 ab d5 1f a3 71 dc 55 e3 09 0c 57 aa 69 1c 41 1c 07 2b ef 65 f3 56 9d 07 44 95 60 3a a6 12 47 dd 0d ac 8f 55 9f 77 ef 06 89 b7 58 1a 35 d3 c2 aa 7b 34 93 36 d3 0c 5c 05 6c cc 2c 68 47 dd 69 c3 71 97 6a d5 3d c0 00 1c 84 e6 01 0a 02 d3 00 92 fb 60 da 40 a1 61 18 6b 7d 57 ed 4a e6 3b 04 e3 2d c4
                                                        Data Ascii: +W^)L]bQz On.q#:L3iY22dDOmVj_Q0,g!Sz&a-Z.`V29fCxdf?$XBzz.J;tLqUWiA+eVD`:GUwX5{46\l,hGiqj=`@ak}WJ;-


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:06:25:20
                                                        Start date:18/04/2024
                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe"
                                                        Imagebase:0xe00000
                                                        File size:790'064 bytes
                                                        MD5 hash:8745C960022BCEFFF65C91A47374A169
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:06:25:31
                                                        Start date:18/04/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\tm_starter_dir\TMLauncher.exe"
                                                        Imagebase:0xca0000
                                                        File size:688'888 bytes
                                                        MD5 hash:8FCA72C59D3A9AA6EDA33C64DAA0296D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 0%, ReversingLabs
                                                        • Detection: 0%, Virustotal, Browse
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:08:15:01
                                                        Start date:18/04/2024
                                                        Path:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe" --program C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\rsp1024hcmd.txt
                                                        Imagebase:0xad0000
                                                        File size:18'097'912 bytes
                                                        MD5 hash:D973EE70262ADF0A3D8AC412964517F9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:08:15:02
                                                        Start date:18/04/2024
                                                        Path:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:TurboMeeting.exe --MagDetect
                                                        Imagebase:0xad0000
                                                        File size:18'097'912 bytes
                                                        MD5 hash:D973EE70262ADF0A3D8AC412964517F9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:08:15:05
                                                        Start date:18/04/2024
                                                        Path:C:\Users\user\AppData\Roaming\TurboMeeting\TurboMeeting\TurboMeeting.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:TurboMeeting.exe --VSEDetect
                                                        Imagebase:0xad0000
                                                        File size:18'097'912 bytes
                                                        MD5 hash:D973EE70262ADF0A3D8AC412964517F9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:8.5%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:17%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:68
                                                          execution_graph 55502 e0e5a0 SetUnhandledExceptionFilter 55503 e0e5b7 SetThreadPriority 55502->55503 55504 e0e5fa SetEvent 55502->55504 55503->55504 55505 e0e5c6 WSAGetLastError 55503->55505 55513 e0daa0 55504->55513 55532 e0e3c0 55504->55532 55540 e70f20 55505->55540 55507 e0e60c SetEvent 55508 e0e5d4 55551 e0eee0 EnterCriticalSection 55508->55551 55510 e0e5f7 55510->55504 55613 e09b00 55513->55613 55515 e0dab4 55516 e0daf2 55515->55516 55517 e0dab8 55515->55517 55519 e0db02 55516->55519 55655 e08ac0 55516->55655 55518 e0eee0 131 API calls 55517->55518 55525 e0dad6 55518->55525 55523 e0db12 55519->55523 55937 e09fa0 311 API calls 5 library calls 55519->55937 55523->55525 55728 e09040 55523->55728 55524 e0db1d 55524->55525 55526 e0db36 55524->55526 55527 e0db2a 55524->55527 55525->55507 55938 e4ff23 55526->55938 55810 e082a0 55527->55810 55530 e0db31 55530->55507 55533 e0e3cd Concurrency::details::ExternalContextBase::~ExternalContextBase __wsopen_s 55532->55533 55534 e72e40 302 API calls 55533->55534 55535 e0e442 55534->55535 55536 e0e472 55535->55536 55537 e0eee0 131 API calls 55535->55537 55538 e0eee0 131 API calls 55536->55538 55537->55536 55539 e0e4ad __ehhandler$___std_fs_get_file_attributes_by_handle@8 55538->55539 55539->55507 55541 e70f48 ___scrt_fastfail 55540->55541 55542 e70f5d __ehhandler$___std_fs_get_file_attributes_by_handle@8 55541->55542 55543 e713d3 FormatMessageW 55541->55543 55542->55508 55544 e71400 55543->55544 55544->55544 55545 e7140b WideCharToMultiByte 55544->55545 55546 e7145e __ehhandler$___std_fs_get_file_attributes_by_handle@8 55545->55546 55547 e71439 WideCharToMultiByte 55545->55547 55546->55508 55547->55546 55548 e714d2 55547->55548 55549 e4405e std::_Locinfo::_Locinfo_ctor 5 API calls 55548->55549 55550 e714d7 55549->55550 55552 e4fa5e 24 API calls 55551->55552 55553 e0ef48 55552->55553 55554 e0ef55 55553->55554 55555 e0ef8a 55553->55555 55556 e07cd0 46 API calls 55554->55556 59186 e0ecb0 55555->59186 55557 e0ef75 LeaveCriticalSection 55556->55557 55559 e0f4c2 __ehhandler$___std_fs_get_file_attributes_by_handle@8 55557->55559 55559->55510 55560 e0efba 55561 e0f5aa 55560->55561 55562 e0f00d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 55560->55562 59207 e4a823 21 API calls 2 library calls 55561->59207 55563 e01d51 23 API calls 55562->55563 55565 e0f09a 55563->55565 55567 e07cd0 46 API calls 55565->55567 55568 e0f0b2 55567->55568 55569 e07ec0 23 API calls 55568->55569 55570 e0f0cc 55569->55570 55571 e068a0 23 API calls 55570->55571 55572 e0f0e1 55571->55572 55573 e07e60 23 API calls 55572->55573 55574 e0f135 55573->55574 55575 e01d16 21 API calls 55574->55575 55577 e0f14b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 55574->55577 55575->55577 55576 e07ec0 23 API calls 55578 e0f277 55576->55578 55577->55576 55579 e068a0 23 API calls 55578->55579 55580 e0f2a8 55579->55580 55581 e068a0 23 API calls 55580->55581 55582 e0f2fa 55581->55582 55583 e01d16 21 API calls 55582->55583 55587 e0f32d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 55583->55587 55584 e0f400 55588 e4f88c 66 API calls 55584->55588 55585 e0f4de 55586 e0e2d0 75 API calls 55585->55586 55589 e0f503 __vswprintf_c_l 55586->55589 55587->55584 55587->55585 55590 e0f40b 55588->55590 55592 e4e7eb __vfwprintf_l 75 API calls 55589->55592 59204 e0e840 63 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 55590->59204 55597 e0f524 55592->55597 55593 e0f42d 55594 e0f43d 55593->55594 59205 e0e740 113 API calls 2 library calls 55593->59205 59206 e0e840 63 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 55594->59206 55599 e0e2d0 75 API calls 55597->55599 55598 e0f452 55600 e4fa5e 24 API calls 55598->55600 55601 e0f534 55599->55601 55602 e0f46d 55600->55602 59198 e5598b 55601->59198 55602->55585 55604 e0f47a WSAGetLastError 55602->55604 55606 e70f20 8 API calls 55604->55606 55608 e0f492 55606->55608 55607 e4f88c 66 API calls 55609 e0f54a 55607->55609 55610 e07cd0 46 API calls 55608->55610 55611 e0f4b0 LeaveCriticalSection 55609->55611 55612 e0f4a7 55610->55612 55611->55559 55612->55611 55614 e09b35 ___scrt_fastfail 55613->55614 55941 e13110 55614->55941 55616 e09b9a _strstr 55617 e09bcd GetTempPathW 55616->55617 55619 e09cfd _strstr 55616->55619 56015 e16610 55617->56015 55620 e07cd0 46 API calls 55619->55620 55653 e09dde 55619->55653 55624 e09d3c 55620->55624 55621 e09c32 56020 e07cd0 55621->56020 55622 e09bfe 55622->55621 55631 e09f54 55622->55631 55623 e07cd0 46 API calls 55628 e09e25 55623->55628 55625 e0eee0 131 API calls 55624->55625 55630 e09d64 55625->55630 55626 e09f33 __ehhandler$___std_fs_get_file_attributes_by_handle@8 55626->55515 55629 e0eee0 131 API calls 55628->55629 55633 e09e4d 55629->55633 55634 e14040 78 API calls 55630->55634 56052 e4405e 55631->56052 55637 e14040 78 API calls 55633->55637 55638 e09d83 55634->55638 55651 e09e6c 55637->55651 55638->55631 55643 e09d8e 55638->55643 55640 e09c75 55641 e09cba 55640->55641 55642 e09c7c 55640->55642 55647 e0eee0 131 API calls 55641->55647 56038 e0db40 55642->56038 55646 e0db40 40 API calls 55643->55646 55645 e09f0b 55648 e07cd0 46 API calls 55645->55648 55650 e09c99 55646->55650 55649 e09ce5 __ehhandler$___std_fs_get_file_attributes_by_handle@8 55647->55649 55648->55626 55649->55515 55652 e0eee0 131 API calls 55650->55652 55651->55645 55654 e0eee0 131 API calls 55651->55654 55652->55653 55653->55623 55653->55626 55654->55645 55656 e08aeb ___scrt_fastfail 55655->55656 55657 e07cd0 46 API calls 55656->55657 55658 e08b3a 55657->55658 56662 e16680 MultiByteToWideChar 55658->56662 55660 e08b52 55661 e0eee0 131 API calls 55660->55661 55662 e08b7d 55661->55662 55663 e4fa5e 24 API calls 55662->55663 55664 e08b8e 55663->55664 55665 e08c7b 55664->55665 55666 e08b9f 55664->55666 55668 e07cd0 46 API calls 55665->55668 55667 e07cd0 46 API calls 55666->55667 55669 e08bc4 55667->55669 55670 e08c9e 55668->55670 56666 e0e300 42 API calls ___scrt_initialize_default_local_stdio_options 55669->56666 56663 e16680 MultiByteToWideChar 55670->56663 55673 e08bdc 55675 e0eee0 131 API calls 55673->55675 55674 e08cb6 55676 e0eee0 131 API calls 55674->55676 55677 e08c05 55675->55677 55678 e08cde 55676->55678 55679 e4f88c 66 API calls 55677->55679 55680 e4fa5e 24 API calls 55678->55680 55716 e08c0e __ehhandler$___std_fs_get_file_attributes_by_handle@8 55679->55716 55681 e08cf2 55680->55681 55682 e08db0 55681->55682 55683 e08d03 55681->55683 55684 e07cd0 46 API calls 55682->55684 55685 e07cd0 46 API calls 55683->55685 55687 e08dd3 55684->55687 55686 e08d28 55685->55686 56667 e0e300 42 API calls ___scrt_initialize_default_local_stdio_options 55686->56667 56664 e16680 MultiByteToWideChar 55687->56664 55690 e08deb 55692 e0eee0 131 API calls 55690->55692 55691 e08d40 55693 e0eee0 131 API calls 55691->55693 55694 e08e13 55692->55694 55695 e08d69 55693->55695 55696 e4fa5e 24 API calls 55694->55696 55697 e4f88c 66 API calls 55695->55697 55698 e08e27 55696->55698 55697->55716 55699 e08ee5 55698->55699 55700 e08e38 55698->55700 55701 e07cd0 46 API calls 55699->55701 55702 e07cd0 46 API calls 55700->55702 55703 e08f01 55701->55703 55704 e08e5d 55702->55704 56665 e16680 MultiByteToWideChar 55703->56665 56668 e0e300 42 API calls ___scrt_initialize_default_local_stdio_options 55704->56668 55707 e08f19 55709 e0eee0 131 API calls 55707->55709 55708 e08e75 55710 e0eee0 131 API calls 55708->55710 55711 e08f41 55709->55711 55712 e08e9e 55710->55712 55713 e4fa5e 24 API calls 55711->55713 55714 e4f88c 66 API calls 55712->55714 55715 e08f52 55713->55715 55714->55716 55717 e09002 55715->55717 55718 e08f5f 55715->55718 55716->55519 55719 e0eee0 131 API calls 55717->55719 55720 e07cd0 46 API calls 55718->55720 55721 e0902c __ehhandler$___std_fs_get_file_attributes_by_handle@8 55719->55721 55722 e08f83 55720->55722 55721->55519 56669 e0e300 42 API calls ___scrt_initialize_default_local_stdio_options 55722->56669 55724 e08f95 55725 e0eee0 131 API calls 55724->55725 55726 e08fbe 55725->55726 55727 e4f88c 66 API calls 55726->55727 55727->55716 55729 e0905b __wsopen_s 55728->55729 55730 e0eee0 131 API calls 55729->55730 55731 e0909c 55730->55731 55732 e090a8 55731->55732 55733 e090da Concurrency::details::ExternalContextBase::~ExternalContextBase 55731->55733 55734 e0eee0 131 API calls 55732->55734 55737 e07cd0 46 API calls 55733->55737 55735 e090c9 55734->55735 55736 e0c770 221 API calls 55735->55736 55739 e090d3 __ehhandler$___std_fs_get_file_attributes_by_handle@8 55736->55739 55738 e090f1 55737->55738 56670 e01596 55738->56670 55739->55524 55740 e09107 56767 e715f0 InitializeCriticalSection 55740->56767 55742 e0911a 55743 e01d51 23 API calls 55742->55743 55744 e09151 55743->55744 55745 e07cd0 46 API calls 55744->55745 55746 e09181 55745->55746 55747 e0eee0 131 API calls 55746->55747 55748 e091a8 55747->55748 56768 e72e40 55748->56768 55751 e091df ___scrt_fastfail 55753 e09225 55751->55753 55756 e09219 55751->55756 55811 e082ad __wsopen_s 55810->55811 55812 e0eee0 131 API calls 55811->55812 55813 e082e4 55812->55813 59011 e09920 55813->59011 55815 e082f5 55816 e08325 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 55815->55816 55820 e08a8a 55815->55820 55817 e084e5 55816->55817 55818 e0833c GetTempPathW 55816->55818 55819 e0eee0 131 API calls 55817->55819 55821 e16610 2 API calls 55818->55821 55822 e08506 55819->55822 59094 e4a823 21 API calls 2 library calls 55820->59094 55829 e08366 55821->55829 55824 e07cd0 46 API calls 55822->55824 55826 e0851d 55824->55826 55825 e08a8f 55827 e4405e std::_Locinfo::_Locinfo_ctor 5 API calls 55825->55827 59028 e16680 MultiByteToWideChar 55826->59028 55831 e08a94 55827->55831 55828 e08394 55832 e07cd0 46 API calls 55828->55832 55829->55825 55829->55828 55834 e083b8 55832->55834 55833 e08535 55835 e4fa5e 24 API calls 55833->55835 59086 e16680 MultiByteToWideChar 55834->59086 55837 e08546 55835->55837 55839 e0856c 55837->55839 55840 e0854f 55837->55840 55838 e083d0 55841 e4fa5e 24 API calls 55838->55841 55843 e0eee0 131 API calls 55839->55843 55842 e0e2d0 75 API calls 55840->55842 55845 e083e1 55841->55845 55846 e08561 55842->55846 55844 e08567 55843->55844 59029 e16680 MultiByteToWideChar 55844->59029 55847 e08407 55845->55847 55848 e083ea 55845->55848 55849 e4f88c 66 API calls 55846->55849 55850 e0eee0 131 API calls 55847->55850 55852 e0e2d0 75 API calls 55848->55852 55849->55844 55853 e08402 55850->55853 55855 e083fc 55852->55855 55859 e07cd0 46 API calls 55853->55859 55854 e085a9 55856 e085b9 55854->55856 55857 e086ed 55854->55857 55858 e4f88c 66 API calls 55855->55858 55860 e0eee0 131 API calls 55856->55860 55861 e0eee0 131 API calls 55857->55861 55858->55853 55862 e0845b 55859->55862 55863 e085da 55860->55863 55866 e0870e 55861->55866 55867 e14a40 139 API calls 55862->55867 55864 e07cd0 46 API calls 55863->55864 55865 e085fc 55864->55865 59087 e16680 MultiByteToWideChar 55865->59087 55871 e086bb 55866->55871 55876 e088d6 55866->55876 55869 e0848e Sleep 55867->55869 55872 e0eee0 131 API calls 55869->55872 55870 e08614 55873 e07cd0 46 API calls 55870->55873 55871->55866 55874 e0eee0 131 API calls 55871->55874 55889 e084bd __ehhandler$___std_fs_get_file_attributes_by_handle@8 55872->55889 55875 e0862b 55873->55875 55877 e0876d 55874->55877 59088 e16680 MultiByteToWideChar 55875->59088 55881 e08928 55876->55881 55882 e0890f 55876->55882 55879 e07cd0 46 API calls 55877->55879 55883 e08784 55879->55883 55880 e08646 CopyFileW 55884 e07cd0 46 API calls 55880->55884 55888 e07cd0 46 API calls 55881->55888 55886 e07cd0 46 API calls 55882->55886 59090 e16680 MultiByteToWideChar 55883->59090 55885 e08671 55884->55885 59089 e16680 MultiByteToWideChar 55885->59089 55891 e08920 55886->55891 55893 e08939 55888->55893 55889->55530 55900 e0eee0 131 API calls 55891->55900 55892 e0879c 59091 e13d20 144 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 55892->59091 59030 e16680 MultiByteToWideChar 55893->59030 55895 e08689 55899 e4fa5e 24 API calls 55895->55899 55897 e087e7 59092 e13bd0 GetVersionExW GetVersionExW __ehhandler$___std_fs_get_file_attributes_by_handle@8 ___scrt_fastfail 55897->59092 55898 e08951 GetFileAttributesW 55898->55891 55902 e08966 55898->55902 55903 e0869a 55899->55903 55904 e089d0 55900->55904 55906 e0eee0 131 API calls 55902->55906 55907 e086c0 55903->55907 55908 e086a3 55903->55908 59031 e16680 MultiByteToWideChar 55904->59031 55905 e0882b 55910 e0887c 55905->55910 55911 e0882f ShellExecuteExW 55905->55911 55912 e0898e 55906->55912 55914 e0eee0 131 API calls 55907->55914 55913 e0e2d0 75 API calls 55908->55913 59093 e13bd0 GetVersionExW GetVersionExW __ehhandler$___std_fs_get_file_attributes_by_handle@8 ___scrt_fastfail 55910->59093 55911->55910 55916 e08840 55911->55916 55917 e07cd0 46 API calls 55912->55917 55914->55871 55915 e089e8 59032 e16680 MultiByteToWideChar 55915->59032 55921 e0eee0 131 API calls 55916->55921 55917->55891 55925 e08868 __ehhandler$___std_fs_get_file_attributes_by_handle@8 55921->55925 55923 e08881 55926 e08885 55923->55926 55927 e088ab GetLastError 55923->55927 55924 e08a00 ___scrt_fastfail 55930 e07cd0 46 API calls 55924->55930 55925->55530 55929 e0eee0 131 API calls 55926->55929 55928 e0eee0 131 API calls 55927->55928 55932 e08a39 55930->55932 59033 e14a40 55932->59033 55937->55523 59120 e4fd52 55938->59120 55945 e1311a __wsopen_s 55941->55945 55942 e13210 GetModuleFileNameW GetLongPathNameW 55943 e16610 2 API calls 55942->55943 55944 e1325a 55943->55944 55946 e0eee0 131 API calls 55944->55946 55945->55942 55947 e13283 55946->55947 55948 e1329a GetUserNameW 55947->55948 55949 e16610 2 API calls 55948->55949 55950 e132d9 55949->55950 55951 e13346 55950->55951 55952 e1346c SHGetFolderPathW 55950->55952 55958 e0eee0 131 API calls 55951->55958 55953 e13482 55952->55953 55954 e134aa 55952->55954 55955 e0eee0 131 API calls 55953->55955 55956 e16610 2 API calls 55954->55956 55955->55954 55957 e134c0 55956->55957 55959 e0eee0 131 API calls 55957->55959 55960 e13384 55958->55960 55963 e13405 55959->55963 55961 e07cd0 46 API calls 55960->55961 55962 e133a0 _strstr 55961->55962 55964 e133b8 55962->55964 55971 e1340d _strstr 55962->55971 55965 e135b8 GetTempPathW GetLongPathNameW 55963->55965 55966 e1351d 55963->55966 55970 e0eee0 131 API calls 55964->55970 55968 e16610 2 API calls 55965->55968 56055 e13b40 GetVersionExW GetVersionExW __ehhandler$___std_fs_get_file_attributes_by_handle@8 ___scrt_fastfail 55966->56055 55972 e135f9 SHGetSpecialFolderPathW 55968->55972 55969 e13522 55969->55965 55974 e1352a SHGetFolderPathW 55969->55974 55970->55963 55971->55963 55977 e0eee0 131 API calls 55971->55977 55973 e16610 2 API calls 55972->55973 55978 e13626 55973->55978 55975 e16610 2 API calls 55974->55975 55976 e13556 55975->55976 55987 e13983 55976->55987 55988 e1365b 55976->55988 55991 e13593 55976->55991 55977->55963 55979 e13687 55978->55979 55980 e136a0 55978->55980 56056 e13b40 GetVersionExW GetVersionExW __ehhandler$___std_fs_get_file_attributes_by_handle@8 ___scrt_fastfail 55979->56056 55983 e136ae SHGetFolderPathW 55980->55983 55981 e0eee0 131 API calls 55984 e135b5 55981->55984 55986 e16610 2 API calls 55983->55986 55984->55965 55985 e1368c 55985->55980 55985->55983 55993 e136c8 55986->55993 55990 e4405e std::_Locinfo::_Locinfo_ctor 5 API calls 55987->55990 55989 e07cd0 46 API calls 55988->55989 55989->55991 55992 e13988 55990->55992 55991->55981 55993->55993 55994 e13708 GetLongPathNameW GetLongPathNameW 55993->55994 55995 e16610 2 API calls 55994->55995 55996 e1375c SHGetFolderPathW GetLongPathNameW 55995->55996 55997 e16610 2 API calls 55996->55997 56001 e1379e 55997->56001 55998 e0eee0 131 API calls 55999 e13842 55998->55999 56000 e0eee0 131 API calls 55999->56000 56002 e13867 56000->56002 56001->55998 56003 e0eee0 131 API calls 56002->56003 56004 e1388c 56003->56004 56005 e0eee0 131 API calls 56004->56005 56006 e138b1 56005->56006 56007 e0eee0 131 API calls 56006->56007 56008 e138d3 56007->56008 56009 e0eee0 131 API calls 56008->56009 56010 e138f5 56009->56010 56011 e0eee0 131 API calls 56010->56011 56012 e1392e 56011->56012 56013 e0eee0 131 API calls 56012->56013 56014 e13967 __ehhandler$___std_fs_get_file_attributes_by_handle@8 56013->56014 56014->55616 56016 e16624 56015->56016 56016->56016 56017 e1662f WideCharToMultiByte 56016->56017 56018 e16672 56017->56018 56019 e16652 WideCharToMultiByte 56017->56019 56018->55622 56019->55622 56021 e07ce6 __vswprintf_c_l 56020->56021 56057 e4e91c 56021->56057 56024 e14040 56128 e16680 MultiByteToWideChar 56024->56128 56026 e1408b 56129 e4fa5e 56026->56129 56029 e14108 __ehhandler$___std_fs_get_file_attributes_by_handle@8 56029->55640 56031 e140b9 56032 e55f8c 63 API calls 56031->56032 56033 e140cb Concurrency::details::ExternalContextBase::~ExternalContextBase 56032->56033 56135 e55c28 56033->56135 56037 e140eb __ehhandler$___std_fs_get_file_attributes_by_handle@8 56037->55640 56039 e0dd1e __ehhandler$___std_fs_get_file_attributes_by_handle@8 56038->56039 56040 e0db7c ___scrt_fastfail 56038->56040 56039->55650 56042 e0dbfe 56040->56042 56576 e4f79e 56040->56576 56580 e01d51 56042->56580 56044 e0dccb 56584 e07ec0 56044->56584 56049 e07e60 23 API calls 56050 e0dd10 56049->56050 56606 e08230 21 API calls 56050->56606 56657 e4406a IsProcessorFeaturePresent 56052->56657 56055->55969 56056->55985 56060 e4b09a 56057->56060 56059 e07cf4 56059->56024 56061 e4b0c2 56060->56061 56062 e4b0da 56060->56062 56073 e4ea42 56061->56073 56062->56061 56064 e4b0e2 56062->56064 56077 e4b9e3 34 API calls 2 library calls 56064->56077 56068 e4b0f2 __vfwprintf_l 56078 e4c0e1 46 API calls 3 library calls 56068->56078 56069 e4b0d2 __ehhandler$___std_fs_get_file_attributes_by_handle@8 56069->56059 56072 e4b179 56079 e4ba66 15 API calls _free 56072->56079 56080 e5cf9f GetLastError 56073->56080 56076 e4a813 21 API calls _Atexit 56076->56069 56077->56068 56078->56072 56079->56069 56081 e5cfbe 56080->56081 56082 e5cfb8 56080->56082 56087 e5cfc4 56081->56087 56107 e5d736 6 API calls 2 library calls 56081->56107 56106 e5d6e0 6 API calls 2 library calls 56082->56106 56085 e5cfc9 SetLastError 56088 e4b0c7 56085->56088 56086 e5cfe5 56086->56085 56108 e5d098 56086->56108 56087->56085 56090 e5d049 SetLastError 56087->56090 56088->56076 56090->56088 56092 e5d012 56124 e5d736 6 API calls 2 library calls 56092->56124 56093 e5cffd 56117 e5d736 6 API calls 2 library calls 56093->56117 56096 e5d009 56118 e5d0f5 56096->56118 56097 e5d01e 56098 e5d031 56097->56098 56099 e5d022 56097->56099 56126 e5cc78 15 API calls _Atexit 56098->56126 56125 e5d736 6 API calls 2 library calls 56099->56125 56103 e5d00f 56103->56085 56104 e5d03c 56105 e5d0f5 _free 12 API calls 56104->56105 56105->56087 56106->56081 56107->56086 56109 e5d0a5 56108->56109 56110 e5d0e5 56109->56110 56111 e5d0d0 HeapAlloc 56109->56111 56112 e5d0b9 _Atexit 56109->56112 56113 e4ea42 _Atexit 14 API calls 56110->56113 56111->56112 56114 e5d0e3 56111->56114 56112->56110 56112->56111 56127 e66852 EnterCriticalSection LeaveCriticalSection _Atexit __ehhandler$___std_fs_get_file_attributes_by_handle@8 56112->56127 56115 e5cff5 56113->56115 56114->56115 56115->56092 56115->56093 56117->56096 56119 e5d100 RtlFreeHeap 56118->56119 56123 e5d129 __dosmaperr 56118->56123 56120 e5d115 56119->56120 56119->56123 56121 e4ea42 _Atexit 13 API calls 56120->56121 56122 e5d11b GetLastError 56121->56122 56122->56123 56123->56103 56124->56097 56125->56096 56126->56104 56127->56112 56128->56026 56151 e4f9b2 56129->56151 56131 e1409a 56131->56029 56132 e55f8c 56131->56132 56200 e55d59 56132->56200 56134 e55fa2 56134->56031 56379 e55c45 56135->56379 56137 e140e5 56138 e4f88c 56137->56138 56139 e4f898 CallCatchBlock 56138->56139 56140 e4f8b7 56139->56140 56141 e4f8a2 56139->56141 56150 e4f8b2 __fread_nolock 56140->56150 56504 e4abbf EnterCriticalSection 56140->56504 56142 e4ea42 _Atexit 15 API calls 56141->56142 56143 e4f8a7 56142->56143 56521 e4a813 21 API calls _Atexit 56143->56521 56146 e4f8d3 56505 e4f816 56146->56505 56148 e4f8de 56522 e4f8fb LeaveCriticalSection __fread_nolock 56148->56522 56150->56037 56152 e4f9be CallCatchBlock 56151->56152 56153 e4f9c5 56152->56153 56156 e4f9e7 56152->56156 56154 e4ea42 _Atexit 15 API calls 56153->56154 56155 e4f9ca 56154->56155 56176 e4a813 21 API calls _Atexit 56155->56176 56158 e4f9ec 56156->56158 56159 e4f9f9 56156->56159 56160 e4ea42 _Atexit 15 API calls 56158->56160 56168 e5ef8b 56159->56168 56165 e4f9d5 __fread_nolock 56160->56165 56162 e4fa02 56163 e4fa15 56162->56163 56164 e4fa08 56162->56164 56177 e4fa47 LeaveCriticalSection __fread_nolock 56163->56177 56166 e4ea42 _Atexit 15 API calls 56164->56166 56165->56131 56166->56165 56169 e5ef97 CallCatchBlock 56168->56169 56178 e5bf19 EnterCriticalSection 56169->56178 56171 e5efa5 56179 e5f025 56171->56179 56175 e5efd6 __fread_nolock 56175->56162 56176->56165 56177->56165 56178->56171 56180 e5f048 56179->56180 56181 e5f0a1 56180->56181 56188 e5efb2 56180->56188 56195 e4abbf EnterCriticalSection 56180->56195 56196 e4abd3 LeaveCriticalSection 56180->56196 56182 e5d098 _Atexit 15 API calls 56181->56182 56183 e5f0aa 56182->56183 56185 e5d0f5 _free 15 API calls 56183->56185 56186 e5f0b3 56185->56186 56186->56188 56197 e5d88e 6 API calls 2 library calls 56186->56197 56192 e5efe1 56188->56192 56189 e5f0d2 56198 e4abbf EnterCriticalSection 56189->56198 56199 e5bf61 LeaveCriticalSection 56192->56199 56194 e5efe8 56194->56175 56195->56180 56196->56180 56197->56189 56198->56188 56199->56194 56203 e55d65 CallCatchBlock 56200->56203 56201 e55d6b 56202 e4ea42 _Atexit 15 API calls 56201->56202 56205 e55d70 56202->56205 56203->56201 56204 e55d91 56203->56204 56213 e4abbf EnterCriticalSection 56204->56213 56225 e4a813 21 API calls _Atexit 56205->56225 56207 e55d9d 56214 e55eb3 56207->56214 56210 e55db1 56226 e55dd0 LeaveCriticalSection __fread_nolock 56210->56226 56212 e55d7b __fread_nolock 56212->56134 56213->56207 56215 e55ed5 56214->56215 56216 e55ec5 56214->56216 56227 e55dda 56215->56227 56217 e4ea42 _Atexit 15 API calls 56216->56217 56219 e55eca 56217->56219 56219->56210 56220 e55f77 56220->56210 56222 e55ef8 56222->56220 56231 e558d8 56222->56231 56225->56212 56226->56212 56228 e55de6 56227->56228 56229 e55ded 56227->56229 56228->56222 56229->56228 56230 e61fa3 __wsopen_s 23 API calls 56229->56230 56230->56228 56232 e558ef 56231->56232 56236 e55914 56231->56236 56232->56236 56240 e5ed31 56232->56240 56234 e5590d 56247 e6033b 56234->56247 56237 e61fa3 56236->56237 56353 e61f0a 56237->56353 56241 e5ed52 56240->56241 56242 e5ed3d 56240->56242 56241->56234 56243 e4ea42 _Atexit 15 API calls 56242->56243 56244 e5ed42 56243->56244 56272 e4a813 21 API calls _Atexit 56244->56272 56246 e5ed4d 56246->56234 56248 e60347 CallCatchBlock 56247->56248 56249 e60367 56248->56249 56250 e6034f 56248->56250 56252 e60402 56249->56252 56256 e60399 56249->56256 56325 e4ea2f 15 API calls _Atexit 56250->56325 56328 e4ea2f 15 API calls _Atexit 56252->56328 56253 e60354 56257 e4ea42 _Atexit 15 API calls 56253->56257 56255 e60407 56258 e4ea42 _Atexit 15 API calls 56255->56258 56273 e60cf7 EnterCriticalSection 56256->56273 56266 e6035c __fread_nolock 56257->56266 56260 e6040f 56258->56260 56329 e4a813 21 API calls _Atexit 56260->56329 56261 e6039f 56263 e603d0 56261->56263 56264 e603bb 56261->56264 56274 e60423 56263->56274 56265 e4ea42 _Atexit 15 API calls 56264->56265 56268 e603c0 56265->56268 56266->56236 56326 e4ea2f 15 API calls _Atexit 56268->56326 56269 e603cb 56327 e603fa LeaveCriticalSection __wsopen_s 56269->56327 56272->56246 56273->56261 56275 e60450 56274->56275 56279 e60449 __ehhandler$___std_fs_get_file_attributes_by_handle@8 56274->56279 56276 e60474 56275->56276 56277 e60454 56275->56277 56281 e604c3 56276->56281 56282 e604a6 56276->56282 56342 e4ea2f 15 API calls _Atexit 56277->56342 56279->56269 56280 e60459 56285 e4ea42 _Atexit 15 API calls 56280->56285 56284 e604d6 56281->56284 56287 e61fa3 __wsopen_s 23 API calls 56281->56287 56344 e4ea2f 15 API calls _Atexit 56282->56344 56330 e5ffcb 56284->56330 56288 e60461 56285->56288 56286 e604ab 56290 e4ea42 _Atexit 15 API calls 56286->56290 56287->56284 56343 e4a813 21 API calls _Atexit 56288->56343 56293 e604b3 56290->56293 56345 e4a813 21 API calls _Atexit 56293->56345 56294 e604ec 56299 e60515 56294->56299 56300 e604f0 56294->56300 56295 e6052b 56325->56253 56326->56269 56327->56266 56328->56255 56329->56266 56331 e6a26a __fread_nolock 21 API calls 56330->56331 56332 e5ffdb 56331->56332 56333 e5ffe0 56332->56333 56334 e5ce4e __Toupper 34 API calls 56332->56334 56333->56294 56333->56295 56335 e60003 56334->56335 56335->56333 56342->56280 56343->56279 56344->56286 56345->56279 56362 e60f6b 56353->56362 56355 e61f1c 56356 e61f24 56355->56356 56357 e61f35 SetFilePointerEx 56355->56357 56358 e4ea42 _Atexit 15 API calls 56356->56358 56359 e61f4d GetLastError 56357->56359 56361 e61f29 56357->56361 56358->56361 56375 e4ea0c 15 API calls 2 library calls 56359->56375 56361->56220 56363 e60f8d 56362->56363 56364 e60f78 56362->56364 56369 e60fb2 56363->56369 56377 e4ea2f 15 API calls _Atexit 56363->56377 56376 e4ea2f 15 API calls _Atexit 56364->56376 56366 e60f7d 56368 e4ea42 _Atexit 15 API calls 56366->56368 56371 e60f85 56368->56371 56369->56355 56370 e60fbd 56372 e4ea42 _Atexit 15 API calls 56370->56372 56371->56355 56373 e60fc5 56372->56373 56378 e4a813 21 API calls _Atexit 56373->56378 56375->56361 56376->56366 56377->56370 56378->56371 56380 e55c51 CallCatchBlock 56379->56380 56381 e55c91 56380->56381 56384 e55c64 ___scrt_fastfail 56380->56384 56391 e55c89 __fread_nolock 56380->56391 56392 e4abbf EnterCriticalSection 56381->56392 56383 e55c9b 56393 e55a4f 56383->56393 56385 e4ea42 _Atexit 15 API calls 56384->56385 56387 e55c7e 56385->56387 56406 e4a813 21 API calls _Atexit 56387->56406 56391->56137 56392->56383 56397 e55a61 ___scrt_fastfail 56393->56397 56399 e55a7e 56393->56399 56394 e55a6e 56395 e4ea42 _Atexit 15 API calls 56394->56395 56396 e55a73 56395->56396 56473 e4a813 21 API calls _Atexit 56396->56473 56397->56394 56397->56399 56401 e55ac1 __fread_nolock 56397->56401 56407 e55cd0 LeaveCriticalSection __fread_nolock 56399->56407 56400 e55bea ___scrt_fastfail 56404 e4ea42 _Atexit 15 API calls 56400->56404 56401->56399 56401->56400 56403 e5ed31 __fread_nolock 21 API calls 56401->56403 56408 e61a63 56401->56408 56474 e54b87 21 API calls 3 library calls 56401->56474 56403->56401 56404->56396 56406->56391 56407->56391 56409 e61a76 56408->56409 56410 e61a8e 56408->56410 56484 e4ea2f 15 API calls _Atexit 56409->56484 56412 e61de6 56410->56412 56417 e61ace 56410->56417 56500 e4ea2f 15 API calls _Atexit 56412->56500 56413 e61a7b 56415 e4ea42 _Atexit 15 API calls 56413->56415 56418 e61a83 56415->56418 56416 e61deb 56419 e4ea42 _Atexit 15 API calls 56416->56419 56417->56418 56420 e61ad9 56417->56420 56424 e61b09 56417->56424 56418->56401 56421 e61ae6 56419->56421 56485 e4ea2f 15 API calls _Atexit 56420->56485 56501 e4a813 21 API calls _Atexit 56421->56501 56423 e61ade 56426 e4ea42 _Atexit 15 API calls 56423->56426 56427 e61b24 56424->56427 56428 e61b44 56424->56428 56429 e61b60 56424->56429 56426->56421 56427->56428 56460 e61b31 56427->56460 56486 e4ea2f 15 API calls _Atexit 56428->56486 56488 e5debd 56429->56488 56432 e61b49 56435 e4ea42 _Atexit 15 API calls 56432->56435 56438 e61b50 56435->56438 56436 e5d0f5 _free 15 API calls 56439 e61b80 56436->56439 56437 e61cc1 56440 e61d36 56437->56440 56444 e61cda GetConsoleMode 56437->56444 56487 e4a813 21 API calls _Atexit 56438->56487 56442 e5d0f5 _free 15 API calls 56439->56442 56443 e61d3a ReadFile 56440->56443 56444->56440 56445 e61ceb 56444->56445 56445->56443 56456 e5d0f5 _free 15 API calls 56456->56418 56475 e6a26a 56460->56475 56470 e61b5b __fread_nolock 56470->56456 56473->56399 56474->56401 56476 e6a277 56475->56476 56477 e6a284 56475->56477 56478 e4ea42 _Atexit 15 API calls 56476->56478 56479 e6a290 56477->56479 56480 e4ea42 _Atexit 15 API calls 56477->56480 56481 e6a27c 56478->56481 56479->56437 56482 e6a2b1 56480->56482 56481->56437 56502 e4a813 21 API calls _Atexit 56482->56502 56484->56413 56485->56423 56486->56432 56487->56470 56489 e5defb 56488->56489 56490 e5decb _Atexit 56488->56490 56491 e4ea42 _Atexit 15 API calls 56489->56491 56490->56489 56492 e5dee6 RtlAllocateHeap 56490->56492 56503 e66852 EnterCriticalSection LeaveCriticalSection _Atexit __ehhandler$___std_fs_get_file_attributes_by_handle@8 56490->56503 56493 e5def9 56491->56493 56492->56490 56492->56493 56493->56436 56500->56416 56501->56418 56502->56481 56503->56490 56504->56146 56506 e4f823 56505->56506 56507 e4f838 56505->56507 56508 e4ea42 _Atexit 15 API calls 56506->56508 56510 e558d8 __vfwprintf_l 61 API calls 56507->56510 56514 e4f833 56507->56514 56509 e4f828 56508->56509 56542 e4a813 21 API calls _Atexit 56509->56542 56512 e4f84c 56510->56512 56523 e5dc93 56512->56523 56514->56148 56516 e5ed31 __fread_nolock 21 API calls 56517 e4f85a 56516->56517 56527 e57a54 56517->56527 56521->56150 56522->56150 56524 e5dca9 56523->56524 56526 e4f854 56523->56526 56525 e5d0f5 _free 15 API calls 56524->56525 56524->56526 56525->56526 56526->56516 56528 e57a65 56527->56528 56529 e57a7a 56527->56529 56554 e4ea2f 15 API calls _Atexit 56528->56554 56531 e57ac3 56529->56531 56535 e57aa1 56529->56535 56542->56514 56577 e4f7b7 __vfwprintf_l 56576->56577 56607 e4eb13 56577->56607 56581 e01d60 BuildCatchObjectHelperInternal 56580->56581 56582 e01d84 56580->56582 56581->56044 56638 e0141b 23 API calls 2 library calls 56582->56638 56585 e07f20 56584->56585 56587 e07f58 56585->56587 56588 e08019 56585->56588 56601 e07fe9 _memcpy_s std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 56585->56601 56590 e08076 56587->56590 56591 e07f6b 56587->56591 56588->56601 56651 e0e090 21 API calls 2 library calls 56588->56651 56589 e08045 56597 e068a0 23 API calls 56589->56597 56652 e01d3c 23 API calls 56590->56652 56650 e066e0 23 API calls 5 library calls 56591->56650 56593 e0807b 56653 e4a823 21 API calls 2 library calls 56593->56653 56599 e08062 56597->56599 56602 e07e60 56599->56602 56600 e07fa8 _memcpy_s 56600->56593 56600->56601 56639 e068a0 56601->56639 56603 e07e70 56602->56603 56603->56603 56604 e068a0 23 API calls 56603->56604 56605 e07e83 56604->56605 56605->56049 56606->56039 56625 e4e166 56607->56625 56609 e4eb60 56633 e4b9e3 34 API calls 2 library calls 56609->56633 56611 e4eb25 56611->56609 56612 e4eb3a 56611->56612 56624 e4eb4a 56611->56624 56613 e4ea42 _Atexit 15 API calls 56612->56613 56614 e4eb3f 56613->56614 56632 e4a813 21 API calls _Atexit 56614->56632 56617 e4eb6c 56618 e4eb9b 56617->56618 56634 e4f741 38 API calls __Toupper 56617->56634 56621 e4ec05 56618->56621 56635 e4f6c3 21 API calls _Atexit 56618->56635 56636 e4f6c3 21 API calls _Atexit 56621->56636 56622 e4eccf __vfwprintf_l 56623 e4ea42 _Atexit 15 API calls 56622->56623 56622->56624 56623->56624 56624->56042 56626 e4e17e 56625->56626 56627 e4e16b 56625->56627 56626->56611 56628 e4ea42 _Atexit 15 API calls 56627->56628 56629 e4e170 56628->56629 56637 e4a813 21 API calls _Atexit 56629->56637 56631 e4e17b 56631->56611 56632->56624 56633->56617 56634->56617 56635->56621 56636->56622 56637->56631 56638->56581 56640 e068ef 56639->56640 56644 e068c2 BuildCatchObjectHelperInternal 56639->56644 56641 e069eb 56640->56641 56642 e068fe 56640->56642 56655 e01d3c 23 API calls 56641->56655 56654 e066e0 23 API calls 5 library calls 56642->56654 56644->56589 56648 e06945 _memcpy_s 56649 e069a2 _memcpy_s std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 56648->56649 56656 e4a823 21 API calls 2 library calls 56648->56656 56649->56589 56650->56600 56651->56601 56654->56648 56658 e4407e 56657->56658 56661 e43f3a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 56658->56661 56660 e09f6f 56661->56660 56662->55660 56663->55674 56664->55690 56665->55707 56666->55673 56667->55691 56668->55708 56669->55724 57078 e44260 56670->57078 56674 e015e2 57088 e2825b 56674->57088 56680 e01607 57280 e01dc3 75 API calls 2 library calls 56680->57280 56682 e01602 56682->56680 57115 e0e8e0 56682->57115 56684 e01611 __ehhandler$___std_fs_get_file_attributes_by_handle@8 56684->55740 56767->55742 56769 e72e5c __wsopen_s 56768->56769 56770 e01d51 23 API calls 56769->56770 56771 e72ee6 56770->56771 56772 e7360e 56771->56772 56773 e72f15 56771->56773 56774 e0eee0 131 API calls 56772->56774 58424 e10230 56773->58424 56776 e73639 56774->56776 56779 e735e2 __ehhandler$___std_fs_get_file_attributes_by_handle@8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 56776->56779 58428 e4a823 21 API calls 2 library calls 56776->58428 56779->55751 57079 e015b1 SetUnhandledExceptionFilter #17 57078->57079 57080 e264c7 57079->57080 57081 e264d3 __EH_prolog3 57080->57081 57293 e26586 GetModuleFileNameW 57081->57293 57082 e264fd 57083 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 57082->57083 57084 e2650e 57082->57084 57083->57084 57086 e26543 std::locale::_Locimp::_Locimp_dtor 57084->57086 57298 e25951 57084->57298 57086->56674 57089 e28266 57088->57089 57090 e2827b 57088->57090 57457 e2d247 7 API calls 4 library calls 57089->57457 57092 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 57090->57092 57094 e015ea 57092->57094 57093 e28275 57093->57090 57095 e28286 57093->57095 57098 e27c91 57094->57098 57458 e29057 57095->57458 57462 e4e9ac 57098->57462 57102 e27ca7 57103 e4e9ac std::locale::_Locimp::_Locimp_dtor 15 API calls 57102->57103 57104 e27cb2 57103->57104 57105 e58aa5 __Getctype 22 API calls 57104->57105 57106 e015f8 57105->57106 57107 e0edb0 57106->57107 57108 e0edba 57107->57108 57109 e0ee0e 57107->57109 57108->56682 57110 e1d982 std::_Facet_Register 16 API calls 57109->57110 57111 e0ee18 57110->57111 57112 e0ee36 57111->57112 57491 e0e620 InitializeCriticalSection InitializeCriticalSection MultiByteToWideChar 57111->57491 57112->56682 57114 e0ee2d 57114->56682 57116 e0e927 57115->57116 57117 e0e968 GetTempPathW 57116->57117 57119 e0e950 57116->57119 57497 e0ee50 57117->57497 57120 e0ea4a 57119->57120 57121 e0e9cf 57119->57121 57122 e0ea93 57120->57122 57123 e0ea4f 57120->57123 57124 e07cd0 46 API calls 57121->57124 57127 e07cd0 46 API calls 57122->57127 57125 e07cd0 46 API calls 57123->57125 57126 e0e9e0 57124->57126 57128 e0ea60 57125->57128 57129 e07cd0 46 API calls 57126->57129 57130 e0eaa6 57127->57130 57131 e07cd0 46 API calls 57128->57131 57132 e0e9f7 57129->57132 57135 e07cd0 46 API calls 57130->57135 57133 e0ea77 57131->57133 57134 e07cd0 46 API calls 57132->57134 57136 e07cd0 46 API calls 57133->57136 57137 e0ea0e 57134->57137 57138 e0eacc 57135->57138 57142 e0ea8e 57136->57142 57140 e07cd0 46 API calls 57137->57140 57139 e07cd0 46 API calls 57138->57139 57139->57142 57141 e0ea3f 57140->57141 57144 e07cd0 46 API calls 57141->57144 57143 e07cd0 46 API calls 57142->57143 57143->57141 57145 e0eb21 57144->57145 57492 e0eec0 MultiByteToWideChar 57145->57492 57147 e0eb38 57493 e0eec0 MultiByteToWideChar 57147->57493 57149 e0eb52 57494 e0eec0 MultiByteToWideChar 57149->57494 57151 e0eb6c 57495 e0eec0 MultiByteToWideChar 57151->57495 57280->56684 57294 e265b4 57293->57294 57297 e265ea __ehhandler$___std_fs_get_file_attributes_by_handle@8 57293->57297 57295 e265b8 PathFindExtensionW 57294->57295 57294->57297 57306 e25f1e 57295->57306 57297->57082 57299 e2595d __EH_prolog3 57298->57299 57443 e1d9dd 57299->57443 57301 e2596f 57450 e260bd 57301->57450 57305 e2598b std::locale::_Locimp::_Locimp_dtor 57305->57086 57307 e25f2d __EH_prolog3_GS 57306->57307 57308 e25951 59 API calls 57307->57308 57309 e25f3f 57308->57309 57310 e25951 59 API calls 57309->57310 57311 e25f4f ___scrt_fastfail 57310->57311 57318 e2f894 57311->57318 57313 e25f93 57315 e25fb2 57313->57315 57345 e26cfd 57313->57345 57317 e25fd2 57315->57317 57349 e26d36 57315->57349 57317->57297 57319 e2f8c2 GetModuleHandleW 57318->57319 57320 e2f8ed DecodePointer 57318->57320 57321 e2f912 GetUserDefaultUILanguage 57319->57321 57322 e2f8d1 GetProcAddress EncodePointer 57319->57322 57323 e2f8f6 57320->57323 57366 e2fc8f 21 API calls 2 library calls 57321->57366 57322->57323 57323->57321 57324 e2f8fa __ehhandler$___std_fs_get_file_attributes_by_handle@8 57323->57324 57324->57313 57326 e2f92d 57367 e58d9f 57326->57367 57330 e2f95c 57331 e58d9f ___crtDownlevelLCIDToLocaleName 21 API calls 57330->57331 57332 e2f980 GetSystemDefaultUILanguage 57331->57332 57377 e2fc8f 21 API calls 2 library calls 57332->57377 57334 e2f99a 57335 e58d9f ___crtDownlevelLCIDToLocaleName 21 API calls 57334->57335 57336 e2f9be 57335->57336 57378 e2fc8f 21 API calls 2 library calls 57336->57378 57338 e2f9d2 57339 e58d9f ___crtDownlevelLCIDToLocaleName 21 API calls 57338->57339 57340 e2f9f6 57339->57340 57379 e2fc8f 21 API calls 2 library calls 57340->57379 57342 e2fa08 57343 e58d9f ___crtDownlevelLCIDToLocaleName 21 API calls 57342->57343 57344 e2fa2b 57343->57344 57344->57324 57346 e26d09 57345->57346 57347 e26d2e 57346->57347 57381 e26c37 57346->57381 57347->57315 57350 e4ea42 _Atexit 15 API calls 57349->57350 57351 e26d54 57350->57351 57352 e4ea42 _Atexit 15 API calls 57351->57352 57353 e26d5b 57352->57353 57354 e24fec __snprintf_s 47 API calls 57353->57354 57355 e26d7d 57354->57355 57356 e4ea42 _Atexit 15 API calls 57355->57356 57357 e26d87 57356->57357 57358 e4ea42 _Atexit 15 API calls 57357->57358 57359 e26d8e 57358->57359 57361 e26d99 57359->57361 57442 e1f517 18 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 57359->57442 57362 e24dd9 11 API calls 57361->57362 57364 e26dce __ehhandler$___std_fs_get_file_attributes_by_handle@8 57361->57364 57363 e26dbb 57362->57363 57363->57364 57365 e24dd9 11 API calls 57363->57365 57364->57317 57365->57364 57366->57326 57368 e58dba 57367->57368 57370 e58dac 57367->57370 57369 e4ea42 _Atexit 15 API calls 57368->57369 57371 e58dc4 57369->57371 57370->57368 57374 e58dd3 57370->57374 57380 e4a813 21 API calls _Atexit 57371->57380 57373 e2f947 57376 e2fc8f 21 API calls 2 library calls 57373->57376 57374->57373 57375 e4ea42 _Atexit 15 API calls 57374->57375 57375->57371 57376->57330 57377->57334 57378->57338 57379->57342 57380->57373 57400 e2f81b 57381->57400 57384 e4ea42 _Atexit 15 API calls 57385 e26c71 57384->57385 57386 e4ea42 _Atexit 15 API calls 57385->57386 57388 e26c78 57386->57388 57387 e26ceb __ehhandler$___std_fs_get_file_attributes_by_handle@8 57387->57346 57410 e24fec 57388->57410 57391 e4ea42 _Atexit 15 API calls 57392 e26ca3 57391->57392 57393 e4ea42 _Atexit 15 API calls 57392->57393 57394 e26caa 57393->57394 57396 e26cb5 57394->57396 57420 e1f517 18 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 57394->57420 57396->57387 57413 e24dd9 57396->57413 57399 e24dd9 11 API calls 57399->57387 57401 e2f853 DecodePointer 57400->57401 57402 e2f828 GetModuleHandleW 57400->57402 57405 e2f85c 57401->57405 57403 e2f837 GetProcAddress EncodePointer 57402->57403 57404 e2f878 57402->57404 57403->57405 57407 e2f889 GetLocaleInfoW 57404->57407 57405->57404 57406 e2f860 GetLocaleInfoEx 57405->57406 57409 e26c60 57406->57409 57407->57409 57409->57384 57409->57387 57421 e2500b 57410->57421 57415 e24de5 CallCatchBlock 57413->57415 57414 e24e0c LoadLibraryExW 57434 e24e47 57414->57434 57415->57414 57425 e1d692 57415->57425 57418 e24e30 57418->57387 57418->57399 57420->57396 57422 e25025 __vswprintf_c_l 57421->57422 57423 e4e8f5 __vsnwprintf_s_l 47 API calls 57422->57423 57424 e25006 57423->57424 57424->57391 57426 e1d6a1 OutputDebugStringA 57425->57426 57427 e1d6b1 57425->57427 57426->57427 57428 e1d6d8 57427->57428 57429 e1d7b1 6 API calls 57427->57429 57431 e1d6c2 57427->57431 57428->57414 57428->57418 57429->57431 57430 e1d57b GetProcAddress 57432 e1d6d4 57430->57432 57431->57430 57433 e1d6dd GetLastError 57431->57433 57432->57428 57432->57433 57433->57428 57435 e24e50 57434->57435 57436 e24e85 57435->57436 57437 e24e64 GetLastError 57435->57437 57438 e24e6e 57435->57438 57436->57418 57437->57438 57439 e1d603 GetProcAddress 57438->57439 57440 e24e7a 57439->57440 57440->57436 57441 e24e7e SetLastError 57440->57441 57441->57436 57442->57361 57444 e1da0b 57443->57444 57445 e1d9ec 57443->57445 57455 e021f1 18 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 57444->57455 57445->57301 57447 e1da15 57448 e1d9dd 18 API calls 57447->57448 57449 e1da26 57448->57449 57449->57301 57451 e260c9 57450->57451 57453 e2597d 57450->57453 57451->57453 57456 e265fc 59 API calls 57451->57456 57453->57305 57454 e230d5 24 API calls 57453->57454 57454->57305 57455->57447 57456->57453 57457->57093 57461 e47b17 RaiseException 57458->57461 57460 e29070 57461->57460 57463 e5d0f5 _free 15 API calls 57462->57463 57464 e27c9f 57463->57464 57465 e58aa5 57464->57465 57466 e58ab4 57465->57466 57467 e58ab0 57465->57467 57475 e585f0 57466->57475 57467->57102 57470 e58ae0 57470->57102 57471 e58d9f ___crtDownlevelLCIDToLocaleName 21 API calls 57472 e58aee 57471->57472 57472->57470 57482 e4a840 IsProcessorFeaturePresent 57472->57482 57474 e58b05 57481 e5debd _Atexit 57475->57481 57476 e5defb 57477 e4ea42 _Atexit 15 API calls 57476->57477 57479 e58ad9 57477->57479 57478 e5dee6 RtlAllocateHeap 57478->57479 57478->57481 57479->57470 57479->57471 57481->57476 57481->57478 57486 e66852 EnterCriticalSection LeaveCriticalSection _Atexit __ehhandler$___std_fs_get_file_attributes_by_handle@8 57481->57486 57483 e4a84c 57482->57483 57487 e4a64e 57483->57487 57485 e4a861 GetCurrentProcess TerminateProcess 57485->57474 57486->57481 57488 e4a66a ___scrt_fastfail 57487->57488 57489 e4a696 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 57488->57489 57490 e4a767 __ehhandler$___std_fs_get_file_attributes_by_handle@8 ___scrt_fastfail 57489->57490 57490->57485 57491->57114 57492->57147 57493->57149 57494->57151 57498 e0ee60 57497->57498 57498->57498 57499 e0ee6b WideCharToMultiByte 57498->57499 57500 e0eeb5 57499->57500 57501 e0ee8e WideCharToMultiByte 57499->57501 57500->57119 57501->57119 58425 e01d51 23 API calls 58424->58425 58426 e10285 58425->58426 58429 e12320 50 API calls 3 library calls 58426->58429 59012 e0993b __wsopen_s ___scrt_fastfail 59011->59012 59013 e09a86 59012->59013 59015 e0998e ___scrt_fastfail 59012->59015 59014 e0eee0 131 API calls 59013->59014 59016 e09a84 59014->59016 59095 e715f0 InitializeCriticalSection 59015->59095 59017 e01d51 23 API calls 59016->59017 59021 e09adb __ehhandler$___std_fs_get_file_attributes_by_handle@8 59017->59021 59019 e099c2 59020 e07cd0 46 API calls 59019->59020 59022 e099f2 59020->59022 59021->55815 59023 e72e40 302 API calls 59022->59023 59024 e09a26 59023->59024 59025 e0eee0 131 API calls 59024->59025 59026 e09a6f 59025->59026 59096 e71650 DeleteCriticalSection 59026->59096 59028->55833 59029->55854 59030->55898 59031->55915 59032->55924 59034 e14a5b __wsopen_s 59033->59034 59035 e01d51 23 API calls 59034->59035 59036 e14abd 59035->59036 59086->55838 59087->55870 59088->55880 59089->55895 59090->55892 59091->55897 59092->55905 59093->55923 59095->59019 59096->59016 59121 e4fd60 59120->59121 59122 e4fd72 59120->59122 59148 e4fdfa GetModuleHandleW 59121->59148 59132 e4fc01 59122->59132 59125 e4fda5 59126 e0db3d 59125->59126 59140 e4fdb8 59125->59140 59127 e4fd65 59127->59122 59149 e4fe3e GetModuleHandleExW 59127->59149 59131 e4fd71 59131->59122 59133 e4fc0d CallCatchBlock 59132->59133 59155 e5bf19 EnterCriticalSection 59133->59155 59135 e4fc17 59156 e4fc63 59135->59156 59137 e4fc24 59160 e4fc38 59137->59160 59139 e4fc30 __fread_nolock 59139->59125 59181 e5fd67 GetPEB 59140->59181 59143 e4fde7 59146 e4fe3e _Atexit 3 API calls 59143->59146 59144 e4fdc7 GetPEB 59144->59143 59145 e4fdd7 GetCurrentProcess TerminateProcess 59144->59145 59145->59143 59147 e4fdef ExitProcess 59146->59147 59148->59127 59150 e4fe68 GetProcAddress 59149->59150 59151 e4fe8b 59149->59151 59154 e4fe7d 59150->59154 59152 e4fe91 FreeLibrary 59151->59152 59153 e4fe9a __ehhandler$___std_fs_get_file_attributes_by_handle@8 59151->59153 59152->59153 59153->59131 59154->59151 59155->59135 59158 e4fc6f _Atexit 59156->59158 59157 e4fcdc _Atexit 59157->59137 59158->59157 59163 e5b502 59158->59163 59180 e5bf61 LeaveCriticalSection 59160->59180 59162 e4fc42 59162->59139 59166 e5b1eb 59163->59166 59165 e5b52d 59165->59157 59167 e5b1f7 CallCatchBlock 59166->59167 59174 e5bf19 EnterCriticalSection 59167->59174 59169 e5b205 59175 e5b3ce 59169->59175 59171 e5b212 59179 e5b230 LeaveCriticalSection std::_Lockit::~_Lockit 59171->59179 59173 e5b223 __fread_nolock 59173->59165 59174->59169 59176 e5b3ec __ehhandler$___std_fs_get_file_attributes_by_handle@8 59175->59176 59177 e5b3f4 59175->59177 59176->59171 59177->59176 59178 e5d0f5 _free 15 API calls 59177->59178 59178->59176 59179->59173 59180->59162 59182 e5fd81 59181->59182 59184 e4fdc2 59181->59184 59185 e5d46e 5 API calls 2 library calls 59182->59185 59184->59143 59184->59144 59185->59184 59187 e0ece4 ___scrt_fastfail 59186->59187 59188 e54c8c 22 API calls 59187->59188 59189 e0eceb 59188->59189 59208 e56320 59189->59208 59194 e0ee50 2 API calls 59195 e0ed48 59194->59195 59196 e01d51 23 API calls 59195->59196 59197 e0ed76 __ehhandler$___std_fs_get_file_attributes_by_handle@8 59196->59197 59197->55560 59199 e5599d 59198->59199 59201 e559a6 ___scrt_uninitialize_crt 59198->59201 59255 e55834 65 API calls ___scrt_uninitialize_crt 59199->59255 59202 e0f53f 59201->59202 59247 e55750 59201->59247 59202->55607 59204->55593 59205->55594 59206->55598 59217 e57de3 59208->59217 59211 e0ecfd 59213 e0f5d0 59211->59213 59214 e0f5e8 __vswprintf_c_l 59213->59214 59227 e4e964 59214->59227 59218 e5cf9f _Atexit 15 API calls 59217->59218 59221 e57deb 59218->59221 59219 e57e09 59220 e5632b 59219->59220 59222 e4ea42 _Atexit 15 API calls 59219->59222 59220->59211 59226 e56096 44 API calls 4 library calls 59220->59226 59221->59219 59221->59220 59223 e5debd std::_Locinfo::_Locinfo_ctor 16 API calls 59221->59223 59222->59220 59224 e57dff 59223->59224 59225 e5d0f5 _free 15 API calls 59224->59225 59225->59219 59226->59211 59230 e4b21a 59227->59230 59229 e0ed2c 59229->59194 59231 e4b242 59230->59231 59232 e4b25a 59230->59232 59234 e4ea42 _Atexit 15 API calls 59231->59234 59232->59231 59233 e4b262 59232->59233 59244 e4b9e3 34 API calls 2 library calls 59233->59244 59235 e4b247 59234->59235 59243 e4a813 21 API calls _Atexit 59235->59243 59238 e4b252 __ehhandler$___std_fs_get_file_attributes_by_handle@8 59238->59229 59239 e4b272 __swprintf 59245 e4c44d 47 API calls 3 library calls 59239->59245 59242 e4b2f9 59246 e4ba66 15 API calls _free 59242->59246 59243->59238 59244->59239 59245->59242 59246->59238 59248 e5575c CallCatchBlock 59247->59248 59256 e4abbf EnterCriticalSection 59248->59256 59250 e5576a 59257 e5593b 59250->59257 59254 e5578d __fread_nolock 59254->59202 59255->59202 59256->59250 59258 e55951 59257->59258 59259 e55948 59257->59259 59261 e558d8 __vfwprintf_l 61 API calls 59258->59261 59268 e55834 65 API calls ___scrt_uninitialize_crt 59259->59268 59263 e55957 59261->59263 59262 e5577b 59267 e5579a LeaveCriticalSection __fread_nolock 59262->59267 59263->59262 59264 e5ed31 __fread_nolock 21 API calls 59263->59264 59265 e55971 59264->59265 59269 e61295 25 API calls 2 library calls 59265->59269 59267->59254 59268->59262 59269->59262 59270 e26420 59271 e1f182 49 API calls 59270->59271 59272 e2642c 59271->59272 59273 e26432 PostMessageW 59272->59273 59274 e26467 59272->59274 59276 e2645d 59273->59276 59275 e29057 Concurrency::details::ExternalContextBase::~ExternalContextBase RaiseException 59274->59275 59277 e2646c 59275->59277 59280 e26e3e 59277->59280 59281 e264c0 59280->59281 59285 e26e74 59280->59285 59282 e26e75 RegOpenKeyExW 59282->59285 59283 e26e92 RegQueryValueExW 59283->59285 59284 e26ee5 RegCloseKey 59284->59285 59285->59281 59285->59282 59285->59283 59285->59284 59286 e2cf61 59287 e2cf6a 59286->59287 59288 e2cf83 59287->59288 59290 e2ce4e 59287->59290 59291 e2ce7b 59290->59291 59292 e2ce8e 59290->59292 59291->59292 59298 e2d0b1 EnterCriticalSection LeaveCriticalSection LocalFree TlsSetValue RaiseException 59291->59298 59294 e2ce93 TlsFree 59292->59294 59295 e2ce9b 59292->59295 59294->59295 59296 e2cea1 GlobalHandle GlobalUnlock GlobalFree 59295->59296 59297 e2ceba DeleteCriticalSection 59295->59297 59296->59297 59297->59288 59298->59291 59299 e55621 59300 e5563e 59299->59300 59301 e5562e 59299->59301 59334 e60aed 26 API calls 5 library calls 59300->59334 59312 e54ebf 59301->59312 59304 e5564e 59306 e55654 59304->59306 59307 e55662 59304->59307 59305 e55638 59308 e5d0f5 _free 15 API calls 59306->59308 59309 e54ebf 56 API calls 59307->59309 59308->59305 59310 e5566d 59309->59310 59311 e5d0f5 _free 15 API calls 59310->59311 59311->59305 59313 e54eed ___scrt_fastfail 59312->59313 59314 e54ecd 59312->59314 59317 e54f13 59313->59317 59318 e54f2f CreateFileW 59313->59318 59359 e4ea2f 15 API calls _Atexit 59314->59359 59316 e54ed2 59319 e4ea42 _Atexit 15 API calls 59316->59319 59361 e4ea2f 15 API calls _Atexit 59317->59361 59321 e54f61 59318->59321 59322 e54f53 59318->59322 59323 e54eda 59319->59323 59363 e54fa2 48 API calls __dosmaperr 59321->59363 59335 e5502e GetFileType 59322->59335 59360 e4a813 21 API calls _Atexit 59323->59360 59325 e54f18 59330 e4ea42 _Atexit 15 API calls 59325->59330 59328 e54ee5 59328->59305 59329 e54f5c ___scrt_fastfail 59329->59328 59333 e54f92 FindCloseChangeNotification 59329->59333 59331 e54f1f 59330->59331 59362 e4a813 21 API calls _Atexit 59331->59362 59333->59328 59334->59304 59336 e5511c 59335->59336 59337 e55069 59335->59337 59338 e55148 59336->59338 59341 e55126 59336->59341 59342 e55083 ___scrt_fastfail 59337->59342 59373 e55361 17 API calls __dosmaperr 59337->59373 59339 e55172 PeekNamedPipe 59338->59339 59349 e55112 __ehhandler$___std_fs_get_file_attributes_by_handle@8 59338->59349 59339->59349 59343 e55139 GetLastError 59341->59343 59344 e5512a 59341->59344 59345 e550a2 GetFileInformationByHandle 59342->59345 59342->59349 59375 e4ea0c 15 API calls 2 library calls 59343->59375 59346 e4ea42 _Atexit 15 API calls 59344->59346 59345->59343 59347 e550b8 59345->59347 59346->59349 59364 e552fb 59347->59364 59349->59329 59353 e550d5 59354 e551a1 2 API calls 59353->59354 59355 e550e8 59354->59355 59356 e551a1 2 API calls 59355->59356 59357 e550ff 59356->59357 59374 e552c8 15 API calls _Atexit 59357->59374 59359->59316 59360->59328 59361->59325 59362->59328 59363->59329 59365 e5530f 59364->59365 59376 e553ce 59365->59376 59367 e550c4 59368 e551a1 59367->59368 59369 e551c7 FileTimeToSystemTime 59368->59369 59370 e551b9 59368->59370 59371 e551d9 SystemTimeToTzSpecificLocalTime 59369->59371 59372 e551bf __ehhandler$___std_fs_get_file_attributes_by_handle@8 59369->59372 59370->59369 59370->59372 59371->59372 59372->59353 59373->59342 59374->59349 59375->59349 59377 e553d9 59376->59377 59379 e553dd _wcsrchr 59376->59379 59377->59367 59378 e5542e 59378->59367 59379->59378 59380 e56db7 std::_Locinfo::_Locinfo_ctor 36 API calls 59379->59380 59381 e553fb 59380->59381 59381->59378 59382 e56db7 std::_Locinfo::_Locinfo_ctor 36 API calls 59381->59382 59383 e5540c 59382->59383 59383->59378 59384 e56db7 std::_Locinfo::_Locinfo_ctor 36 API calls 59383->59384 59385 e5541d 59384->59385 59385->59378 59386 e56db7 std::_Locinfo::_Locinfo_ctor 36 API calls 59385->59386 59386->59378 59387 e56f2c 59388 e56f38 CallCatchBlock 59387->59388 59389 e56f53 59388->59389 59390 e56f3e 59388->59390 59400 e4abbf EnterCriticalSection 59389->59400 59391 e4ea42 _Atexit 15 API calls 59390->59391 59393 e56f43 59391->59393 59406 e4a813 21 API calls _Atexit 59393->59406 59394 e56f5f 59401 e56f93 59394->59401 59399 e56f4e __fread_nolock 59400->59394 59408 e56fbe 59401->59408 59403 e56fa0 59404 e56f6c 59403->59404 59405 e4ea42 _Atexit 15 API calls 59403->59405 59407 e56f89 LeaveCriticalSection __fread_nolock 59404->59407 59405->59404 59406->59399 59407->59399 59409 e56fe6 59408->59409 59410 e56fcc 59408->59410 59411 e5ed31 __fread_nolock 21 API calls 59409->59411 59412 e4ea42 _Atexit 15 API calls 59410->59412 59413 e56ff0 59411->59413 59414 e56fd1 59412->59414 59428 e61f88 59413->59428 59431 e4a813 21 API calls _Atexit 59414->59431 59416 e56fdc __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 59416->59403 59419 e570d1 59421 e570de 59419->59421 59425 e570aa 59419->59425 59420 e5707c 59423 e57096 59420->59423 59420->59425 59422 e4ea42 _Atexit 15 API calls 59421->59422 59422->59416 59432 e572d7 26 API calls 4 library calls 59423->59432 59425->59416 59433 e57164 25 API calls 2 library calls 59425->59433 59426 e570a2 59426->59416 59434 e61e08 59428->59434 59430 e5700b 59430->59416 59430->59419 59430->59420 59431->59416 59432->59426 59433->59416 59435 e61e14 CallCatchBlock 59434->59435 59436 e61e1c 59435->59436 59440 e61e34 59435->59440 59460 e4ea2f 15 API calls _Atexit 59436->59460 59437 e61ee5 59463 e4ea2f 15 API calls _Atexit 59437->59463 59440->59437 59443 e61e69 59440->59443 59441 e61e21 59444 e4ea42 _Atexit 15 API calls 59441->59444 59442 e61eea 59445 e4ea42 _Atexit 15 API calls 59442->59445 59459 e60cf7 EnterCriticalSection 59443->59459 59453 e61e29 __fread_nolock 59444->59453 59447 e61ef2 59445->59447 59464 e4a813 21 API calls _Atexit 59447->59464 59448 e61e6f 59450 e61e93 59448->59450 59451 e61ea8 59448->59451 59452 e4ea42 _Atexit 15 API calls 59450->59452 59454 e61f0a __wsopen_s 23 API calls 59451->59454 59455 e61e98 59452->59455 59453->59430 59456 e61ea3 59454->59456 59461 e4ea2f 15 API calls _Atexit 59455->59461 59462 e61edd LeaveCriticalSection __wsopen_s 59456->59462 59459->59448 59460->59441 59461->59456 59462->59453 59463->59442 59464->59453 59465 e5f5cf 59470 e5f30f 59465->59470 59468 e5f5f7 59475 e5f335 try_get_first_available_module 59470->59475 59471 e4ea42 _Atexit 15 API calls 59472 e5f536 59471->59472 59488 e4a813 21 API calls _Atexit 59472->59488 59474 e5f48b 59474->59468 59482 e56d97 59474->59482 59478 e5f480 59475->59478 59485 e6a2c0 36 API calls _Atexit 59475->59485 59477 e5f4d4 59477->59478 59486 e6a2c0 36 API calls _Atexit 59477->59486 59478->59471 59478->59474 59480 e5f4f3 59480->59478 59487 e6a2c0 36 API calls _Atexit 59480->59487 59489 e5643c 59482->59489 59484 e56db2 59484->59468 59485->59477 59486->59480 59487->59478 59488->59474 59492 e56448 CallCatchBlock 59489->59492 59490 e5644f 59491 e4ea42 _Atexit 15 API calls 59490->59491 59493 e56454 59491->59493 59492->59490 59494 e5647a 59492->59494 59547 e4a813 21 API calls _Atexit 59493->59547 59500 e56a6e 59494->59500 59499 e5645e __fread_nolock 59499->59484 59549 e567d1 59500->59549 59503 e56aa0 59580 e4ea2f 15 API calls _Atexit 59503->59580 59504 e56ab9 59566 e60dd1 59504->59566 59507 e56aa5 59512 e4ea42 _Atexit 15 API calls 59507->59512 59508 e56abe 59509 e56ac7 59508->59509 59510 e56ade 59508->59510 59581 e4ea2f 15 API calls _Atexit 59509->59581 59579 e5673c CreateFileW 59510->59579 59514 e5649e 59512->59514 59548 e564c7 LeaveCriticalSection __wsopen_s 59514->59548 59515 e56acc 59517 e4ea42 _Atexit 15 API calls 59515->59517 59516 e56b94 GetFileType 59519 e56be6 59516->59519 59520 e56b9f GetLastError 59516->59520 59517->59507 59518 e56b69 GetLastError 59583 e4ea0c 15 API calls 2 library calls 59518->59583 59585 e60d1a 16 API calls 3 library calls 59519->59585 59584 e4ea0c 15 API calls 2 library calls 59520->59584 59521 e56b17 59521->59516 59521->59518 59582 e5673c CreateFileW 59521->59582 59525 e56bad CloseHandle 59525->59507 59528 e56bd6 59525->59528 59527 e56b5c 59527->59516 59527->59518 59530 e4ea42 _Atexit 15 API calls 59528->59530 59529 e56c07 59532 e56c53 59529->59532 59586 e5694d 71 API calls 4 library calls 59529->59586 59531 e56bdb 59530->59531 59531->59507 59536 e56c80 59532->59536 59587 e564f3 71 API calls 4 library calls 59532->59587 59535 e56c79 59535->59536 59537 e56c91 59535->59537 59538 e57ae3 __wsopen_s 24 API calls 59536->59538 59537->59514 59539 e56d0f CloseHandle 59537->59539 59538->59514 59588 e5673c CreateFileW 59539->59588 59541 e56d3a 59542 e56d44 GetLastError 59541->59542 59543 e56d70 59541->59543 59589 e4ea0c 15 API calls 2 library calls 59542->59589 59543->59514 59545 e56d50 59590 e60eda 16 API calls 3 library calls 59545->59590 59547->59499 59548->59499 59550 e567f2 59549->59550 59551 e5680c 59549->59551 59550->59551 59554 e4ea42 _Atexit 15 API calls 59550->59554 59591 e56761 59551->59591 59553 e56844 59557 e56873 59553->59557 59559 e4ea42 _Atexit 15 API calls 59553->59559 59555 e56801 59554->59555 59598 e4a813 21 API calls _Atexit 59555->59598 59564 e568c6 59557->59564 59600 e59ed9 21 API calls _Atexit 59557->59600 59561 e56868 59559->59561 59560 e568c1 59563 e4a840 __Getctype 6 API calls 59560->59563 59560->59564 59599 e4a813 21 API calls _Atexit 59561->59599 59565 e5694c 59563->59565 59564->59503 59564->59504 59567 e60ddd CallCatchBlock 59566->59567 59602 e5bf19 EnterCriticalSection 59567->59602 59569 e60e2b 59603 e60ed1 59569->59603 59571 e60de4 59571->59569 59572 e60e09 59571->59572 59576 e60e6e EnterCriticalSection 59571->59576 59606 e60bb4 16 API calls 3 library calls 59572->59606 59573 e60e4b __fread_nolock 59573->59508 59575 e60e0e 59575->59569 59607 e60cf7 EnterCriticalSection 59575->59607 59576->59569 59577 e60e7b LeaveCriticalSection 59576->59577 59577->59571 59579->59521 59580->59507 59581->59515 59582->59527 59583->59507 59584->59525 59585->59529 59586->59532 59587->59535 59588->59541 59589->59545 59590->59543 59593 e56779 59591->59593 59592 e56794 59592->59553 59593->59592 59594 e4ea42 _Atexit 15 API calls 59593->59594 59595 e567b8 59594->59595 59601 e4a813 21 API calls _Atexit 59595->59601 59597 e567c3 59597->59553 59598->59551 59599->59557 59600->59560 59601->59597 59602->59571 59608 e5bf61 LeaveCriticalSection 59603->59608 59605 e60ed8 59605->59573 59606->59575 59607->59569 59608->59605 59609 e023eb 59610 e2ba7d 59609->59610 59613 e2b935 59610->59613 59612 e2ba84 59614 e2b964 EndDialog 59613->59614 59615 e2b94b 59613->59615 59614->59612 59618 e2082a 59615->59618 59619 e2083a PostMessageW 59618->59619 59620 e2084e 59618->59620 59619->59620 59620->59614 59621 e16dd0 59622 e16e26 59621->59622 59623 e16e0c __ehhandler$___std_fs_get_file_attributes_by_handle@8 59621->59623 59624 e16e3c EnterCriticalSection 59622->59624 59630 e16f0b __ehhandler$___std_fs_get_file_attributes_by_handle@8 59622->59630 59656 e16680 MultiByteToWideChar 59624->59656 59626 e16e5b CreateMutexW WaitForSingleObject 59627 e16e83 WSAGetLastError 59626->59627 59628 e16eb4 59626->59628 59631 e70f20 8 API calls 59627->59631 59629 e4fa5e 24 API calls 59628->59629 59632 e16ec8 59629->59632 59633 e16e91 59631->59633 59635 e16ed1 ReleaseMutex LeaveCriticalSection 59632->59635 59637 e16f15 Concurrency::details::ExternalContextBase::~ExternalContextBase 59632->59637 59634 e0eee0 131 API calls 59633->59634 59634->59628 59636 e0eee0 131 API calls 59635->59636 59636->59630 59638 e55c28 __fread_nolock 35 API calls 59637->59638 59639 e16f3e 59638->59639 59640 e4f88c 66 API calls 59639->59640 59641 e16f44 Concurrency::details::ExternalContextBase::~ExternalContextBase 59640->59641 59642 e16f95 ReleaseMutex LeaveCriticalSection 59641->59642 59643 e16fae 59641->59643 59642->59630 59644 e4fa5e 24 API calls 59643->59644 59645 e16fbf 59644->59645 59646 e16fc8 ReleaseMutex LeaveCriticalSection 59645->59646 59648 e17012 _strstr 59645->59648 59647 e0eee0 131 API calls 59646->59647 59647->59630 59649 e0e2d0 75 API calls 59648->59649 59650 e1705b 59649->59650 59651 e5598b 65 API calls 59650->59651 59652 e17061 59651->59652 59653 e4f88c 66 API calls 59652->59653 59654 e17067 59653->59654 59655 e1706d ReleaseMutex LeaveCriticalSection 59654->59655 59655->59630 59656->59626 59657 e61314 59658 e61321 59657->59658 59659 e61339 59657->59659 59660 e4ea42 _Atexit 15 API calls 59658->59660 59663 e61394 59659->59663 59671 e61331 59659->59671 59708 e61fbe 59659->59708 59661 e61326 59660->59661 59707 e4a813 21 API calls _Atexit 59661->59707 59665 e5ed31 __fread_nolock 21 API calls 59663->59665 59666 e613ac 59665->59666 59677 e61959 59666->59677 59668 e613b3 59669 e5ed31 __fread_nolock 21 API calls 59668->59669 59668->59671 59670 e613df 59669->59670 59670->59671 59672 e5ed31 __fread_nolock 21 API calls 59670->59672 59673 e613ed 59672->59673 59673->59671 59674 e5ed31 __fread_nolock 21 API calls 59673->59674 59675 e613fd 59674->59675 59676 e5ed31 __fread_nolock 21 API calls 59675->59676 59676->59671 59678 e61965 CallCatchBlock 59677->59678 59679 e61985 59678->59679 59680 e6196d 59678->59680 59681 e61a42 59679->59681 59686 e619bb 59679->59686 59714 e4ea2f 15 API calls _Atexit 59680->59714 59718 e4ea2f 15 API calls _Atexit 59681->59718 59684 e61972 59685 e4ea42 _Atexit 15 API calls 59684->59685 59696 e6197a __fread_nolock 59685->59696 59688 e619c4 59686->59688 59689 e619d9 59686->59689 59687 e61a47 59690 e4ea42 _Atexit 15 API calls 59687->59690 59715 e4ea2f 15 API calls _Atexit 59688->59715 59713 e60cf7 EnterCriticalSection 59689->59713 59693 e619d1 59690->59693 59719 e4a813 21 API calls _Atexit 59693->59719 59694 e619c9 59697 e4ea42 _Atexit 15 API calls 59694->59697 59695 e619df 59698 e61a10 59695->59698 59699 e619fb 59695->59699 59696->59668 59697->59693 59701 e61a63 __fread_nolock 33 API calls 59698->59701 59702 e4ea42 _Atexit 15 API calls 59699->59702 59704 e61a0b 59701->59704 59703 e61a00 59702->59703 59716 e4ea2f 15 API calls _Atexit 59703->59716 59717 e61a3a LeaveCriticalSection __wsopen_s 59704->59717 59707->59671 59709 e5debd std::_Locinfo::_Locinfo_ctor 16 API calls 59708->59709 59710 e61fd9 59709->59710 59711 e5d0f5 _free 15 API calls 59710->59711 59712 e61fe3 59711->59712 59712->59663 59713->59695 59714->59684 59715->59694 59716->59704 59717->59696 59718->59687 59719->59696 59720 e439b7 59721 e439c3 CallCatchBlock 59720->59721 59746 e43d33 59721->59746 59723 e439ca 59724 e43b1d 59723->59724 59732 e439f4 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock _Atexit 59723->59732 59777 e44b9f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 59724->59777 59726 e43b24 59727 e4ff23 24 API calls 59726->59727 59728 e43b2a 59727->59728 59778 e4fed5 24 API calls _Atexit 59728->59778 59730 e43b32 59731 e43a13 59732->59731 59733 e43a94 59732->59733 59773 e4feeb 34 API calls 4 library calls 59732->59773 59754 e44cb9 59733->59754 59735 e43a9a 59758 e74f4b 59735->59758 59740 e43ab6 59740->59726 59741 e43aba 59740->59741 59742 e43ac3 59741->59742 59775 e4fec6 24 API calls _Atexit 59741->59775 59776 e43ec2 73 API calls 2 library calls 59742->59776 59745 e43acb 59745->59731 59747 e43d3c 59746->59747 59779 e44ddf IsProcessorFeaturePresent 59747->59779 59749 e43d48 59780 e490b0 10 API calls 3 library calls 59749->59780 59751 e43d4d 59753 e43d51 59751->59753 59781 e490d9 8 API calls 3 library calls 59751->59781 59753->59723 59782 e47160 59754->59782 59757 e44cdf 59757->59735 59759 e74f54 59758->59759 59760 e25170 49 API calls 59759->59760 59761 e74f63 59760->59761 59762 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 59761->59762 59763 e74f6a 59762->59763 59784 e3f215 SetErrorMode SetErrorMode 59763->59784 59766 e43aaf 59774 e44cef GetModuleHandleW 59766->59774 59768 e74fb3 59795 e2d664 72 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 59768->59795 59769 e0edb0 19 API calls 59769->59768 59770 e0e580 45 API calls 59770->59768 59771 e14040 78 API calls 59771->59768 59772 e01596 435 API calls 59772->59768 59773->59733 59774->59740 59775->59742 59776->59745 59777->59726 59778->59730 59779->59749 59780->59751 59781->59753 59783 e44ccc GetStartupInfoW 59782->59783 59783->59757 59785 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 59784->59785 59786 e3f232 59785->59786 59787 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 59786->59787 59788 e3f240 59787->59788 59789 e3f25b 59788->59789 59796 e3f273 59788->59796 59791 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 59789->59791 59792 e3f260 59791->59792 59793 e3f26c 59792->59793 59830 e25179 59792->59830 59793->59768 59793->59769 59793->59770 59793->59771 59793->59772 59795->59766 59797 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 59796->59797 59798 e3f290 GetModuleFileNameW 59797->59798 59799 e3f2b8 59798->59799 59801 e3f2c1 PathFindExtensionW 59799->59801 59840 e29ad5 RaiseException __CxxThrowException@8 59799->59840 59802 e3f2d4 59801->59802 59803 e3f2d9 59801->59803 59841 e29ad5 RaiseException __CxxThrowException@8 59802->59841 59836 e3f1d0 59803->59836 59831 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 59830->59831 59832 e2517e 59831->59832 59833 e251a6 59832->59833 59834 e1de31 43 API calls 59832->59834 59833->59793 59835 e2518a GetCurrentThreadId SetWindowsHookExW 59834->59835 59835->59833 59837 e3f20f 59836->59837 59838 e29057 Concurrency::details::ExternalContextBase::~ExternalContextBase RaiseException 59837->59838 59839 e3f214 59838->59839 59842 e60635 59843 e5ed31 __fread_nolock 21 API calls 59842->59843 59844 e60643 59843->59844 59845 e60670 59844->59845 59846 e60651 59844->59846 59848 e6067d 59845->59848 59853 e6068a _wprintf 59845->59853 59847 e4ea42 _Atexit 15 API calls 59846->59847 59851 e60656 59847->59851 59849 e4ea42 _Atexit 15 API calls 59848->59849 59849->59851 59850 e6071a 59857 e6085b 59850->59857 59853->59850 59853->59851 59854 e6a26a __fread_nolock 21 API calls 59853->59854 59855 e6070d 59853->59855 59854->59855 59855->59850 59856 e61fbe 16 API calls 59855->59856 59856->59850 59858 e5ed31 __fread_nolock 21 API calls 59857->59858 59859 e6086a 59858->59859 59860 e6090c 59859->59860 59861 e6087c 59859->59861 59862 e6033b __wsopen_s 61 API calls 59860->59862 59863 e60899 59861->59863 59866 e608bd 59861->59866 59865 e608a6 59862->59865 59864 e6033b __wsopen_s 61 API calls 59863->59864 59864->59865 59865->59851 59866->59865 59867 e61f88 25 API calls 59866->59867 59867->59865 59868 e60fd5 59869 e6117f 59868->59869 59872 e60fff 59868->59872 59870 e4ea42 _Atexit 15 API calls 59869->59870 59871 e6116a __ehhandler$___std_fs_get_file_attributes_by_handle@8 59870->59871 59872->59869 59873 e61050 59872->59873 59887 e62833 59873->59887 59875 e61070 59895 e6206a 59875->59895 59877 e61084 59878 e611a0 59877->59878 59902 e62096 59877->59902 59879 e4a840 __Getctype 6 API calls 59878->59879 59881 e611aa 59879->59881 59882 e61096 59882->59878 59909 e620c2 59882->59909 59884 e610a8 59884->59878 59885 e610b1 59884->59885 59885->59871 59916 e62884 21 API calls 3 library calls 59885->59916 59888 e6283f CallCatchBlock 59887->59888 59891 e62875 __fread_nolock 59888->59891 59917 e5bf19 EnterCriticalSection 59888->59917 59890 e6284f 59892 e62862 59890->59892 59918 e62753 59890->59918 59891->59875 59934 e6287b LeaveCriticalSection std::_Lockit::~_Lockit 59892->59934 59896 e62076 59895->59896 59897 e6208b 59895->59897 59898 e4ea42 _Atexit 15 API calls 59896->59898 59897->59877 59899 e6207b 59898->59899 60033 e4a813 21 API calls _Atexit 59899->60033 59901 e62086 59901->59877 59903 e620b7 59902->59903 59904 e620a2 59902->59904 59903->59882 59905 e4ea42 _Atexit 15 API calls 59904->59905 59906 e620a7 59905->59906 60034 e4a813 21 API calls _Atexit 59906->60034 59908 e620b2 59908->59882 59910 e620e3 59909->59910 59911 e620ce 59909->59911 59910->59884 59912 e4ea42 _Atexit 15 API calls 59911->59912 59913 e620d3 59912->59913 60035 e4a813 21 API calls _Atexit 59913->60035 59915 e620de 59915->59884 59916->59871 59917->59890 59920 e6279f 59918->59920 59919 e627a6 59922 e62816 59919->59922 59924 e6280d 59919->59924 59920->59919 59921 e5debd std::_Locinfo::_Locinfo_ctor 16 API calls 59920->59921 59929 e627be 59921->59929 59928 e62813 59922->59928 59994 e625f8 59922->59994 59935 e62425 59924->59935 59926 e5d0f5 _free 15 API calls 59930 e62821 __ehhandler$___std_fs_get_file_attributes_by_handle@8 59926->59930 59927 e627c5 59931 e5d0f5 _free 15 API calls 59927->59931 59928->59926 59929->59927 59932 e627eb 59929->59932 59930->59892 59931->59919 59933 e5d0f5 _free 15 API calls 59932->59933 59933->59919 59934->59891 59936 e62434 59935->59936 59937 e620c2 21 API calls 59936->59937 59938 e6244a 59937->59938 59939 e625c2 59938->59939 59940 e6206a 21 API calls 59938->59940 59941 e4a840 __Getctype 6 API calls 59939->59941 59992 e625cb 59939->59992 59943 e6245c 59940->59943 59944 e625f7 59941->59944 59942 e5d0f5 _free 15 API calls 59945 e624ac 59942->59945 59943->59939 59943->59942 59943->59992 59946 e620c2 21 API calls 59944->59946 59951 e5debd std::_Locinfo::_Locinfo_ctor 16 API calls 59945->59951 59947 e6261d 59946->59947 59948 e62748 59947->59948 59949 e6206a 21 API calls 59947->59949 59950 e4a840 __Getctype 6 API calls 59948->59950 59952 e6262f 59949->59952 59957 e62752 59950->59957 59953 e624c4 59951->59953 59952->59948 59955 e62096 21 API calls 59952->59955 59954 e5d0f5 _free 15 API calls 59953->59954 59960 e624d0 59954->59960 59956 e62641 59955->59956 59956->59948 59958 e6264a 59956->59958 59961 e5debd std::_Locinfo::_Locinfo_ctor 16 API calls 59957->59961 59979 e627a6 59957->59979 59959 e5d0f5 _free 15 API calls 59958->59959 59963 e62655 GetTimeZoneInformation 59959->59963 59960->59992 60028 e5cada 21 API calls _Atexit 59960->60028 59976 e627be 59961->59976 59962 e62816 59965 e62813 59962->59965 59966 e625f8 41 API calls 59962->59966 59974 e62671 59963->59974 59982 e62712 59963->59982 59971 e5d0f5 _free 15 API calls 59965->59971 59966->59965 59967 e6280d 59970 e62425 41 API calls 59967->59970 59968 e624fa 59968->59939 60029 e6333c 21 API calls _Atexit 59968->60029 59969 e627c5 59975 e5d0f5 _free 15 API calls 59969->59975 59970->59965 59973 e62821 __ehhandler$___std_fs_get_file_attributes_by_handle@8 59971->59973 59973->59928 60031 e5bfb5 34 API calls __Toupper 59974->60031 59975->59979 59976->59969 59977 e627eb 59976->59977 59980 e5d0f5 _free 15 API calls 59977->59980 59979->59962 59979->59967 59980->59979 59981 e626c6 WideCharToMultiByte 59983 e626e4 WideCharToMultiByte 59981->59983 59982->59928 59983->59982 59984 e62513 59984->59939 59986 e4f79e 38 API calls 59984->59986 59987 e62538 59986->59987 59988 e62584 59987->59988 59989 e4f79e 38 API calls 59987->59989 59988->59992 60030 e6333c 21 API calls _Atexit 59988->60030 59991 e6255f 59989->59991 59991->59988 59993 e4f79e 38 API calls 59991->59993 59992->59928 59993->59988 59995 e62607 59994->59995 59996 e620c2 21 API calls 59995->59996 59997 e6261d 59996->59997 59998 e62748 59997->59998 59999 e6206a 21 API calls 59997->59999 60000 e4a840 __Getctype 6 API calls 59998->60000 60001 e6262f 59999->60001 60004 e62752 60000->60004 60001->59998 60002 e62096 21 API calls 60001->60002 60003 e62641 60002->60003 60003->59998 60005 e6264a 60003->60005 60007 e5debd std::_Locinfo::_Locinfo_ctor 16 API calls 60004->60007 60022 e627a6 60004->60022 60006 e5d0f5 _free 15 API calls 60005->60006 60009 e62655 GetTimeZoneInformation 60006->60009 60019 e627be 60007->60019 60008 e62816 60010 e62813 60008->60010 60011 e625f8 41 API calls 60008->60011 60017 e62671 60009->60017 60025 e62712 60009->60025 60015 e5d0f5 _free 15 API calls 60010->60015 60011->60010 60012 e6280d 60014 e62425 41 API calls 60012->60014 60013 e627c5 60018 e5d0f5 _free 15 API calls 60013->60018 60014->60010 60016 e62821 __ehhandler$___std_fs_get_file_attributes_by_handle@8 60015->60016 60016->59928 60032 e5bfb5 34 API calls __Toupper 60017->60032 60018->60022 60019->60013 60020 e627eb 60019->60020 60023 e5d0f5 _free 15 API calls 60020->60023 60022->60008 60022->60012 60023->60022 60024 e626c6 WideCharToMultiByte 60026 e626e4 WideCharToMultiByte 60024->60026 60025->59928 60026->60025 60028->59968 60029->59984 60030->59939 60031->59981 60032->60024 60033->59901 60034->59908 60035->59915 60036 e23437 60063 e44222 60036->60063 60038 e23443 GetPropW 60039 e23520 60038->60039 60040 e2346f 60038->60040 60041 e20997 50 API calls 60039->60041 60042 e23478 60040->60042 60043 e234ff 60040->60043 60044 e23526 60041->60044 60045 e234d5 SetWindowLongW RemovePropW GlobalFindAtomW GlobalDeleteAtom 60042->60045 60046 e2347d 60042->60046 60047 e20997 50 API calls 60043->60047 60048 e20997 50 API calls 60044->60048 60051 e2353e 60045->60051 60049 e23545 CallWindowProcW 60046->60049 60050 e23489 60046->60050 60052 e23505 60047->60052 60053 e2352f 60048->60053 60055 e234d0 60049->60055 60054 e20997 50 API calls 60050->60054 60051->60049 60051->60055 60066 e238bf 58 API calls 60052->60066 60067 e2384a 57 API calls 60053->60067 60059 e2349b 60054->60059 60057 e23515 60057->60051 60064 e23a4c GetWindowRect GetWindowLongW 60059->60064 60061 e234ac CallWindowProcW 60065 e239a1 71 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 60061->60065 60063->60038 60064->60061 60065->60055 60066->60057 60067->60057 60068 e2e059 8 API calls 60069 e2359e 60070 e235ad __EH_prolog3_GS 60069->60070 60071 e2d29e Concurrency::details::ExternalContextBase::~ExternalContextBase 43 API calls 60070->60071 60072 e235c8 60071->60072 60073 e235d2 60072->60073 60074 e237ce 60072->60074 60075 e235f1 60073->60075 60076 e235de CallNextHookEx 60073->60076 60077 e29057 Concurrency::details::ExternalContextBase::~ExternalContextBase RaiseException 60074->60077 60080 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 60075->60080 60079 e237c4 60076->60079 60078 e237d3 60077->60078 60081 e23607 60080->60081 60082 e23725 60081->60082 60086 e23618 ___scrt_fastfail 60081->60086 60100 e1fe87 50 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 60082->60100 60083 e2379a CallNextHookEx 60083->60079 60084 e237b7 UnhookWindowsHookEx 60083->60084 60084->60079 60085 e236a9 GetClassLongW 60088 e23690 60085->60088 60086->60083 60086->60085 60099 e24c64 11 API calls CallCatchBlock 60086->60099 60088->60083 60089 e236c2 GetWindowLongW 60088->60089 60089->60083 60090 e236d5 GetPropW 60089->60090 60090->60083 60093 e236e9 SetPropW GetPropW 60090->60093 60092 e2373f SetWindowLongW 60098 e23789 pre_c_initialization 60092->60098 60093->60083 60095 e2370a GlobalAddAtomW SetWindowLongW 60093->60095 60094 e2366b 60094->60085 60096 e23679 GetClassNameW 60094->60096 60095->60083 60096->60088 60096->60089 60098->60083 60099->60094 60100->60092 60101 e03cde GetWindowLongW 60102 e03cfc 60101->60102 60105 e2acf7 60102->60105 60106 e2ad02 60105->60106 60108 e03d16 60105->60108 60109 e2117d 60106->60109 60112 e23951 GetWindowLongW 60109->60112 60113 e23972 SetWindowLongW 60112->60113 60114 e21193 60112->60114 60113->60114 60115 e23986 SetWindowPos 60113->60115 60114->60108 60115->60114 60116 e0247e 60145 e2bbea 60116->60145 60118 e02488 SendMessageW SendMessageW GetDC 60119 e29d45 49 API calls 60118->60119 60120 e024be 60119->60120 60121 e024f2 60120->60121 60122 e024c4 GetDeviceCaps ReleaseDC 60120->60122 60123 e2b100 3 API calls 60121->60123 60122->60121 60124 e024fe 60123->60124 60125 e2a72b 51 API calls 60124->60125 60126 e0250a GetWindowRect 60125->60126 60165 e2a0ac ScreenToClient ScreenToClient 60126->60165 60130 e02536 60175 e03ebc 60130->60175 60136 e0255c SendMessageW 60137 e2b0a3 SetWindowPos 60136->60137 60138 e0257d 60137->60138 60139 e2b0a3 SetWindowPos 60138->60139 60140 e0258f KiUserCallbackDispatcher 60139->60140 60141 e20997 50 API calls 60140->60141 60142 e0259b 60141->60142 60182 e1ff53 60142->60182 60144 e025a3 60146 e2bbf7 60145->60146 60147 e2bbff 60145->60147 60226 e1d42a 219 API calls 60146->60226 60227 e20871 223 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 60147->60227 60150 e2bbfd 60151 e2bc53 60150->60151 60205 e21087 60150->60205 60152 e2b935 2 API calls 60151->60152 60154 e2bc5c 60152->60154 60154->60118 60157 e2bc24 60157->60151 60158 e2bc28 60157->60158 60159 e2a72b 51 API calls 60158->60159 60160 e2bc34 60159->60160 60161 e2bc4e 60160->60161 60228 e2b2ef 49 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 60160->60228 60161->60118 60163 e2bc3f 60164 e2b152 ShowWindow 60163->60164 60164->60161 60267 e2a7a1 60165->60267 60167 e02522 60168 e03ee2 60167->60168 60169 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 60168->60169 60170 e03ef2 LoadImageW LoadImageW 60169->60170 60171 e0373f DestroyIcon 60170->60171 60172 e03f2d 60171->60172 60173 e03f34 GetIconInfo GetObjectW CopyImage DeleteObject DeleteObject 60172->60173 60174 e03f8a InvalidateRect 60172->60174 60173->60174 60174->60130 60176 e02541 60175->60176 60177 e03ece InvalidateRect 60175->60177 60178 e0336c 60176->60178 60177->60176 60179 e0254c 60178->60179 60180 e0337e InvalidateRect 60178->60180 60181 e02e09 SendMessageW 60179->60181 60180->60179 60181->60136 60183 e2ab5a GetWindowLongW 60182->60183 60184 e1ff73 60183->60184 60185 e1ff79 60184->60185 60187 e1ff97 GetWindow 60184->60187 60188 e1ff8c GetParent 60184->60188 60186 e1ffc2 GetWindowRect 60185->60186 60190 e20001 60186->60190 60191 e2008a GetParent GetClientRect GetClientRect MapWindowPoints 60186->60191 60189 e1ffa2 60187->60189 60188->60189 60189->60186 60192 e1ffaa SendMessageW 60189->60192 60193 e20020 60190->60193 60194 e20005 GetWindowLongW 60190->60194 60201 e200b9 60191->60201 60192->60186 60195 e1ffc0 60192->60195 60196 e2005b GetWindowRect MonitorFromWindow GetMonitorInfoW 60193->60196 60197 e2002b 60193->60197 60194->60193 60195->60186 60198 e2007a CopyRect 60196->60198 60199 e1f182 49 API calls 60197->60199 60198->60201 60200 e20030 MonitorFromWindow GetMonitorInfoW CopyRect 60199->60200 60200->60198 60203 e2b0a3 SetWindowPos 60201->60203 60204 e2013b __ehhandler$___std_fs_get_file_attributes_by_handle@8 60203->60204 60204->60144 60206 e21141 60205->60206 60207 e2109a 60205->60207 60220 e23219 60206->60220 60207->60206 60208 e210a4 IsWindow 60207->60208 60208->60206 60209 e210b5 60208->60209 60209->60206 60210 e1dddd Concurrency::details::ExternalContextBase::~ExternalContextBase 49 API calls 60209->60210 60211 e210d0 FindResourceW 60210->60211 60212 e21116 60211->60212 60213 e210ec SizeofResource LoadResource 60211->60213 60229 e2f3bc 96 API calls 2 library calls 60212->60229 60213->60206 60214 e2110a LockResource 60213->60214 60214->60212 60216 e21120 60217 e21136 60216->60217 60218 e2112f FreeResource 60216->60218 60217->60206 60230 e20e65 10 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 60217->60230 60218->60217 60221 e23225 __EH_prolog3_catch 60220->60221 60222 e1de31 43 API calls 60221->60222 60223 e2323c 60222->60223 60231 e0224a 60223->60231 60224 e23274 std::locale::_Locimp::_Locimp_dtor 60224->60157 60226->60150 60227->60150 60228->60163 60229->60216 60230->60206 60236 e1d39c 60231->60236 60233 e02264 60234 e1d39c 53 API calls 60233->60234 60235 e02278 60234->60235 60235->60224 60237 e1d3ec 60236->60237 60238 e1d3aa 60236->60238 60237->60233 60238->60237 60250 e2c670 60238->60250 60245 e1d3e5 60245->60237 60248 e1d403 GetParent 60245->60248 60246 e1d424 60264 e2908b RaiseException __CxxThrowException@8 60246->60264 60248->60237 60251 e2a765 GetDlgItem 60250->60251 60252 e2c688 60251->60252 60253 e1d3c3 60252->60253 60265 e2908b RaiseException __CxxThrowException@8 60252->60265 60256 e2a765 60253->60256 60257 e2a770 GetDlgItem 60256->60257 60258 e1d3d2 60256->60258 60257->60258 60258->60237 60259 e23173 60258->60259 60266 e1fe87 50 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 60259->60266 60261 e23181 60262 e231ab SetWindowLongW 60261->60262 60263 e1d3e1 60261->60263 60262->60263 60263->60245 60263->60246 60266->60261 60268 e2a7b6 60267->60268 60269 e2a7a9 GetWindowLongW 60267->60269 60268->60167 60269->60167

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 e72440-e724af call e44260 3 e724b6-e724ba 0->3 4 e724d6-e724d8 3->4 5 e724bc-e724be 3->5 8 e724db-e724dd 4->8 6 e724d2-e724d4 5->6 7 e724c0-e724c6 5->7 6->8 7->4 9 e724c8-e724d0 7->9 10 e72522-e725b2 call e154f0 InternetSetOptionA * 2 call e0eee0 8->10 11 e724df-e7251f call e0eee0 call e44138 8->11 9->3 9->6 20 e725b4-e725bd 10->20 21 e725cd-e725d5 10->21 22 e725c0-e725cb 20->22 23 e725d7-e725de 21->23 24 e725f3-e725f8 21->24 22->21 22->22 25 e725e0-e725eb 23->25 26 e72602-e72605 24->26 27 e725fa-e72600 24->27 25->25 28 e725ed 25->28 30 e72607-e7260d 26->30 31 e7260f-e72611 26->31 29 e72613-e72623 InternetOpenA 27->29 28->24 32 e72d61-e72d79 WSAGetLastError call e70f20 29->32 33 e72629-e72647 InternetSetOptionA 29->33 30->29 31->29 35 e72686-e7269c InternetSetOptionA 33->35 36 e72649-e72683 WSAGetLastError call e70f20 call e0eee0 33->36 39 e7269e-e726d8 WSAGetLastError call e70f20 call e0eee0 35->39 40 e726db-e726f1 InternetSetOptionA 35->40 36->35 39->40 43 e726f3-e7272d WSAGetLastError call e70f20 call e0eee0 40->43 44 e72730-e7278c call e0eee0 call e54c8c call e479b0 40->44 43->44 60 e72795 44->60 61 e7278e-e72793 44->61 62 e7279a-e727c4 call e07cd0 InternetConnectA 60->62 61->62 65 e727c6-e727de WSAGetLastError call e70f20 62->65 66 e72802-e72832 call e0eee0 62->66 73 e727e3-e727fa call e0eee0 65->73 71 e72834-e72839 66->71 72 e7283b 66->72 75 e7283d-e72858 HttpOpenRequestA 71->75 72->75 73->66 77 e7287c-e7289d call e0eee0 75->77 78 e7285a-e72877 WSAGetLastError call e70f20 75->78 83 e728a0-e7291f InternetQueryOptionA InternetSetOptionA 77->83 78->73 84 e72923-e72927 83->84 85 e72943-e72945 84->85 86 e72929-e7292b 84->86 89 e72948-e7294a 85->89 87 e7293f-e72941 86->87 88 e7292d-e72933 86->88 87->89 88->85 90 e72935-e7293d 88->90 91 e72990-e7299b HttpSendRequestA 89->91 92 e7294c-e72952 89->92 90->84 90->87 94 e729a1-e729a3 91->94 93 e72955-e7295a 92->93 93->93 95 e7295c-e72964 93->95 96 e729c7-e72a15 call e0eee0 HttpQueryInfoA 94->96 97 e729a5-e729bd WSAGetLastError call e70f20 94->97 99 e72967-e7296c 95->99 104 e72a17-e72a2f WSAGetLastError call e70f20 96->104 105 e72a39-e72a68 call e0eee0 96->105 97->96 99->99 103 e7296e-e7298e HttpSendRequestA 99->103 103->94 104->105 110 e72a75-e72a9a call e0eee0 105->110 111 e72a6a-e72a6f 105->111 116 e72aa0-e72abc InternetReadFile 110->116 111->110 112 e72b3e-e72b7b call e0eee0 111->112 119 e72b81-e72bb6 call e47160 112->119 120 e72d5a 112->120 116->116 118 e72abe-e72b00 call e0eee0 GetDesktopWindow InternetErrorDlg 116->118 118->112 125 e72b02-e72b39 WSAGetLastError call e70f20 call e0eee0 118->125 126 e72c77-e72c8d InternetReadFileExA 119->126 127 e72bbc-e72bbe 119->127 120->32 125->83 130 e72cb1-e72cb6 126->130 131 e72c8f-e72ca7 WSAGetLastError call e70f20 126->131 127->126 128 e72bc4-e72bc6 127->128 132 e72bcc-e72c00 InternetReadFile 128->132 133 e72c6b-e72c75 128->133 134 e72cbb-e72ccd call e0eee0 130->134 131->130 137 e72c02-e72c0a 132->137 138 e72c49-e72c61 WSAGetLastError call e70f20 132->138 133->134 143 e72cd2-e72cdb 134->143 137->138 142 e72c0c-e72c18 137->142 138->133 142->128 146 e72c1a-e72c44 call e0eee0 142->146 143->120 147 e72cdd-e72ceb call e472c0 143->147 146->128 147->120 153 e72ced-e72d10 call e0eee0 147->153 153->120
                                                          APIs
                                                          • InternetSetOptionA.WININET(00000000,00000049,0000000A,00000004), ref: 00E7254E
                                                          • InternetSetOptionA.WININET(00000000,0000004A,0000000A,00000004), ref: 00E72561
                                                          • InternetOpenA.WININET(Microsoft Internet Explorer,00000003,?,?,00000000), ref: 00E72618
                                                          • InternetSetOptionA.WININET(00000000,00000002,?), ref: 00E7263F
                                                          • WSAGetLastError.WS2_32 ref: 00E72649
                                                          • InternetSetOptionA.WININET(?,00000006,00015F90,00000004), ref: 00E72694
                                                          • WSAGetLastError.WS2_32 ref: 00E7269E
                                                          • InternetSetOptionA.WININET(?,00000005,00015F90,00000004), ref: 00E726E9
                                                          • WSAGetLastError.WS2_32 ref: 00E726F3
                                                          • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00E727B9
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000004), ref: 00E727C6
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • HttpOpenRequestA.WININET(?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00E7284D
                                                          • WSAGetLastError.WS2_32 ref: 00E7285A
                                                          • InternetQueryOptionA.WININET(?,0000001F,?,?), ref: 00E728CD
                                                          • InternetSetOptionA.WININET(?,0000001F,00003380,00000004), ref: 00E728EB
                                                          • HttpSendRequestA.WININET(?,?,?,?,?), ref: 00E72982
                                                          • HttpSendRequestA.WININET(?,00000000,00000000,00000000,00000000), ref: 00E7299B
                                                          • WSAGetLastError.WS2_32 ref: 00E729A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Internet$Option$ErrorLast$HttpRequest$CriticalOpenSectionSend$ConnectEnterLeaveQuery
                                                          • String ID: %s&rdm=%ld$%s?rdm=%ld$($127.0.0.1$Begin HR::DoRequest(), sIP = %s, iPort = %d, cPType=%c, sByPass=%s, sPAddress=%s, URL=%s$Conn lTimeout=%d, error code: %d, error: %s$HQ() failed error code: %d, error: %s$HR::DoRequest$HR::DoRequest succeeded! Read1 Completed!$HR::DoRequest succeeded! Read2 Completed!$HR::DoRequest succeeded! m_iExpectedReceiveSize = %d, m_bUseMinReadBuffer = %s$HSR failed. error code: %d, error: %s$HSR resend -- ERROR_INTERNET_FORCE_RETRY failed error code: %d, error: %s$I-Open failed error code: %d, error: %s$IRE() error code: %d, error: %s$InternetReadFile() iSizeToRead = %d$Invalid page returned: %s$Microsoft Internet Explorer$POST$Recv lTimeout=%d, error code: %d, error: %s$Send lTimeout=%d, error code: %d, error: %s$Skip 127.0.0.1$after HQI$after HQI troubled dwCode = %d$after HR$after HSR$after IC$after IRF$after ISO lTimeout = %d$c:\rhub2\code\hlib\hlib.cpp$failed to connect. error code: %d, error: %s$failed to open-r: error code: %d, error: %s
                                                          • API String ID: 157584972-963015178
                                                          • Opcode ID: 0e268485d21e8108889f99e99826fcbbb2767676cdcf1b0ba49dc8c5472e90fe
                                                          • Instruction ID: 4742bf8b5d77563e9bfa4c3f223709e1063d9d0ab9ce6d8bfb20cba1da955ea5
                                                          • Opcode Fuzzy Hash: 0e268485d21e8108889f99e99826fcbbb2767676cdcf1b0ba49dc8c5472e90fe
                                                          • Instruction Fuzzy Hash: D032F771A40305BFEB219F20DC06FFA7779AF15704F046194FA0DB62D2D7B26A898B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 496 e01596-e01605 call e44260 SetUnhandledExceptionFilter #17 call e264c7 call e2825b call e27c91 call e0edb0 507 e01617-e01623 call e0eda0 496->507 508 e01607 496->508 514 e01625-e0162a 507->514 515 e0162c-e0164b call e4a910 call e0e8e0 507->515 509 e0160c-e01612 call e01dc3 508->509 516 e01c27-e01c42 call e44138 509->516 514->509 523 e01654-e016be call e16bc0 call e16bb0 call e1dddd GetClassInfoW call e16680 call e1f2fc 515->523 524 e0164d-e01652 515->524 535 e016c0-e016de call e0eee0 523->535 536 e016e1-e016f7 call e1d982 523->536 524->509 535->536 541 e01703 536->541 542 e016f9-e016fc call e01f1a 536->542 544 e01705-e01764 WSAStartup call e47160 call e1d982 541->544 545 e01701 542->545 550 e01771 544->550 551 e01766-e0176f call e08100 544->551 545->544 552 e01773-e017e3 call e1dddd call e16610 call e0eee0 550->552 551->552 561 e017e5-e017f1 call e0ad00 552->561 562 e017f6-e0187c GetModuleFileNameW call e16610 call e0eee0 call e14040 552->562 567 e019a3-e019aa 561->567 579 e01882-e018a9 call e4aa10 call e11fc0 562->579 580 e01983-e019a0 call e0eee0 562->580 569 e019b0-e019c0 call e0a8e0 567->569 570 e01b68-e01b9b call e13080 call e4a880 567->570 569->570 578 e019c6-e01a8d call e47160 * 2 call e01486 GetModuleFileNameW call e16610 PathStripPathW call e16610 call e0eee0 call e472c0 569->578 588 e01b9d-e01bad 570->588 589 e01baf-e01bcf call e4a880 570->589 631 e01ada-e01ae9 578->631 632 e01a8f-e01aa6 call e472c0 578->632 601 e01950-e0195a 579->601 602 e018af-e0190c call e4aa10 call e01486 call e104a0 call e01d16 579->602 580->567 593 e01bdd-e01c1f LoadImageW SendMessageW call e0db40 call e0e580 588->593 603 e01bd1-e01bd6 589->603 604 e01bd8 589->604 656 e01c21 call e2b751 593->656 657 e01c21 call e20526 593->657 658 e01c21 call e2bd68 593->658 606 e0195f-e0197b call e0eee0 call e1d9ba 601->606 629 e01912-e0192f call e09f70 602->629 630 e01c43-e01c62 call e4405e PostMessageW 602->630 603->593 604->593 619 e01980-e01981 606->619 619->567 640 e01931-e0193b 629->640 641 e0193d-e0194e 629->641 631->630 638 e01aef-e01b63 call e4aa10 call e01d51 call e05590 call e0eee0 631->638 632->631 643 e01aa8-e01ac7 call e0eee0 632->643 650 e01aca-e01ad5 call e01d16 638->650 640->606 641->606 643->650 650->516 656->516 657->516 658->516
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00E01C65,904898A6,?,?,?,?,00E75578,000000FF), ref: 00E015CF
                                                          • #17.COMCTL32(?,?,?,?,00E75578,000000FF), ref: 00E015D5
                                                            • Part of subcall function 00E264C7: __EH_prolog3.LIBCMT ref: 00E264CE
                                                          • _wprintf.LEGACY_STDIO_DEFINITIONS ref: 00E0160C
                                                          • GetClassInfoW.USER32(?,#32770,?), ref: 00E01684
                                                          • WSAStartup.WS2_32(00000101,?), ref: 00E01728
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000200), ref: 00E01811
                                                          • _strlen.LIBCMT ref: 00E01894
                                                          • _strlen.LIBCMT ref: 00E018B4
                                                            • Part of subcall function 00E0AD00: _strstr.LIBCMT ref: 00E0AD50
                                                            • Part of subcall function 00E01486: _strlen.LIBCMT ref: 00E0149D
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000200,00E7B918), ref: 00E01A0C
                                                            • Part of subcall function 00E16610: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000000,00000000,?,00003829,?,?,00E017B0,?,00000000,00001000), ref: 00E16644
                                                            • Part of subcall function 00E16610: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,?,00000000,00000000,?,?,00E017B0,?,00000000,00001000,?,?), ref: 00E16661
                                                          • PathStripPathW.SHLWAPI(?), ref: 00E01A30
                                                          • _strstr.LIBCMT ref: 00E01A81
                                                          • _strstr.LIBCMT ref: 00E01A9B
                                                          • _strlen.LIBCMT ref: 00E01AF4
                                                          • LoadImageW.USER32(00000086,00000001,00000010,00000010,00008000), ref: 00E01BE3
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E01BFC
                                                          • PostMessageW.USER32(?,?,?,?), ref: 00E01C5B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strlen$_strstr$ByteCharCriticalFileMessageModuleMultiNamePathSectionWide$ClassEnterExceptionFilterH_prolog3ImageInfoLeaveLoadPostSendStartupStripUnhandled_wprintf
                                                          • String ID: #32770$1...$2...$3...$</__OEMId__>$<__OEMId__>$AfxRegisterClass failed for %s$CTMeeting$Failed to find parameters$Failed to open this exe file$Invalid setting$Local AppWizard-Generated Applications$No Meeting Parameter, sClientName = %s$PCSetupApp::InitInstance()$PK$Starter$TMSetup$TMSetup.txt$TMSetupWindow$V&&VI***DDDD111111###!!!!#####$$$%%@@@UUUU$Valid sSetting$Ymeetee$c:\rhub2\pcsetup\pcsetup.cpp$invalid sCurrentFileName = %s$m_lpCmdLine = %s$sCurrentFilePath = %s$sCurrentFilePath = %s, sCurrentFileName = %s$starter
                                                          • API String ID: 3870634492-1026966788
                                                          • Opcode ID: 544e5392850c0f7194d484608c3a2864bdad3f9786e36bbd825ed7ea6cad8d91
                                                          • Instruction ID: 020d59d1cfe2fac50b1f7c6e7ba5d00cf1dcdec659ed3ab25fb40951bb6cf293
                                                          • Opcode Fuzzy Hash: 544e5392850c0f7194d484608c3a2864bdad3f9786e36bbd825ed7ea6cad8d91
                                                          • Instruction Fuzzy Hash: 78029371940318AFDB24EB60DC8AFDA77B8AB04704F0454E9F519B71D2DBB09AC4CB64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 659 e70f20-e70f42 660 e713a3-e713aa 659->660 661 e70f48 659->661 662 e714b7-e714d1 call e44138 660->662 663 e713b0-e713b3 660->663 664 e70f4e-e70f57 661->664 665 e71388-e713a2 call e44138 661->665 669 e7149c-e714b6 call e44138 663->669 670 e713b9-e713bc 663->670 666 e713c2-e713fc call e47160 FormatMessageW 664->666 667 e70f5d-e70f64 664->667 790 e71400-e71409 666->790 672 e712e6-e71300 call e44138 667->672 673 e710e5-e710ff call e44138 667->673 674 e711a2-e711bc call e44138 667->674 675 e70fa1-e70fbb call e44138 667->675 676 e710af-e710c9 call e44138 667->676 677 e7116c-e71186 call e44138 667->677 678 e70f6b-e70f85 call e44138 667->678 679 e71229-e71243 call e44138 667->679 680 e71028-e71042 call e44138 667->680 681 e71337-e71351 call e44138 667->681 682 e71136-e71150 call e44138 667->682 683 e711f3-e7120d call e44138 667->683 684 e70ff2-e7100c call e44138 667->684 685 e712b0-e712ca call e44138 667->685 686 e711bd-e711d7 call e44138 667->686 687 e70fbc-e70fd6 call e44138 667->687 688 e7127a-e71294 call e44138 667->688 689 e71079-e71093 call e44138 667->689 690 e71187-e711a1 call e44138 667->690 691 e70f86-e70fa0 call e44138 667->691 692 e71244-e7125e call e44138 667->692 693 e71043-e7105d call e44138 667->693 694 e71301-e7131b call e44138 667->694 695 e71100-e7111a call e44138 667->695 696 e7120e-e71228 call e44138 667->696 697 e7100d-e71027 call e44138 667->697 698 e712cb-e712e5 call e44138 667->698 699 e710ca-e710e4 call e44138 667->699 700 e70fd7-e70ff1 call e44138 667->700 701 e71295-e712af call e44138 667->701 702 e71094-e710ae call e44138 667->702 703 e71151-e7116b call e44138 667->703 704 e7125f-e71279 call e44138 667->704 705 e7105e-e71078 call e44138 667->705 706 e7131c-e71336 call e44138 667->706 707 e7111b-e71135 call e44138 667->707 708 e711d8-e711f2 call e44138 667->708 670->666 711 e71481-e7149b call e44138 670->711 790->790 793 e7140b-e71437 WideCharToMultiByte 790->793 794 e71465-e71480 call e44138 793->794 795 e71439-e7145c WideCharToMultiByte 793->795 796 e714d2-e714d7 call e4405e 795->796 797 e7145e 795->797 797->794
                                                          APIs
                                                          • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,?,00000200,00000000,?,?,00000000), ref: 00E713EF
                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000200,00000000,00000000,00000000,00000000,004BEC50,?,?,00000000), ref: 00E71429
                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00EB0A00,00000000,00000000,00000000,?,?,00000000), ref: 00E71450
                                                          Strings
                                                          • Cannot assign requested address., xrefs: 00E7116C
                                                          • Winsock.dll version out of range., xrefs: 00E7131C
                                                          • Network is down., xrefs: 00E71187
                                                          • Too many open files., xrefs: 00E70FD7
                                                          • Operation now in progress., xrefs: 00E7100D
                                                          • Bad protocol option., xrefs: 00E710AF
                                                          • Too many processes., xrefs: 00E712E6
                                                          • Successful WSAStartup not yet performed., xrefs: 00E71337
                                                          • Network dropped connection on reset., xrefs: 00E711BD
                                                          • Interrupted function call., xrefs: 00E70F6B
                                                          • Invalid argument., xrefs: 00E70FBC
                                                          • Address already in use., xrefs: 00E71151
                                                          • Host is down., xrefs: 00E712B0
                                                          • Message too long., xrefs: 00E71079
                                                          • No buffer space available., xrefs: 00E7120E
                                                          • Permission denied., xrefs: 00E70F86
                                                          • Valid name, no data record of requested type., xrefs: 00E71481
                                                          • Protocol family not supported., xrefs: 00E7111B
                                                          • Operation already in progress., xrefs: 00E71028
                                                          • Connection reset by peer., xrefs: 00E711F3
                                                          • Connection timed out., xrefs: 00E7127A
                                                          • Protocol not supported., xrefs: 00E710CA
                                                          • Destination address required., xrefs: 00E7105E
                                                          • Cannot send after socket shutdown., xrefs: 00E7125F
                                                          • Bad address., xrefs: 00E70FA1
                                                          • MySocket operation on nonsocket., xrefs: 00E71043
                                                          • MySocket is not connected., xrefs: 00E71244
                                                          • Address family not supported by protocol family., xrefs: 00E71136
                                                          • MySocket is already connected., xrefs: 00E71229
                                                          • Connection refused., xrefs: 00E71295
                                                          • Software caused connection abort., xrefs: 00E711D8
                                                          • Nonauthoritative host not found., xrefs: 00E714BE
                                                          • Operation not supported., xrefs: 00E71100
                                                          • MySocket type not supported., xrefs: 00E710E5
                                                          • Protocol wrong type for socket., xrefs: 00E71094
                                                          • Network is unreachable., xrefs: 00E711A2
                                                          • No route to host., xrefs: 00E712CB
                                                          • Resource temporarily unavailable., xrefs: 00E70FF2
                                                          • This is a nonrecoverable error., xrefs: 00E7149C
                                                          • Network subsystem is unavailable., xrefs: 00E71301
                                                          • Host not found., xrefs: 00E71388
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$FormatMessage
                                                          • String ID: Address already in use.$Address family not supported by protocol family.$Bad address.$Bad protocol option.$Cannot assign requested address.$Cannot send after socket shutdown.$Connection refused.$Connection reset by peer.$Connection timed out.$Destination address required.$Host is down.$Host not found.$Interrupted function call.$Invalid argument.$Message too long.$MySocket is already connected.$MySocket is not connected.$MySocket operation on nonsocket.$MySocket type not supported.$Network dropped connection on reset.$Network is down.$Network is unreachable.$Network subsystem is unavailable.$No buffer space available.$No route to host.$Nonauthoritative host not found.$Operation already in progress.$Operation not supported.$Operation now in progress.$Permission denied.$Protocol family not supported.$Protocol not supported.$Protocol wrong type for socket.$Resource temporarily unavailable.$Software caused connection abort.$Successful WSAStartup not yet performed.$This is a nonrecoverable error.$Too many open files.$Too many processes.$Valid name, no data record of requested type.$Winsock.dll version out of range.
                                                          • API String ID: 928994880-24440330
                                                          • Opcode ID: bc4be27d0e6bec269580cad1c234d902d056fddadc3510a96ed5e7f1a807f92e
                                                          • Instruction ID: f6eb757624e0c77290343838ebcace48129e1cc1949e6c8e489eea5c4fbc2eeb
                                                          • Opcode Fuzzy Hash: bc4be27d0e6bec269580cad1c234d902d056fddadc3510a96ed5e7f1a807f92e
                                                          • Instruction Fuzzy Hash: F0C195E57005000BEF38E728E417BAE73D4BBD8704FC9545AA35EBA3D1E9789942C58E
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 802 e082a0-e082fe call e44260 call e0eee0 call e09920 809 e08300-e0830f 802->809 810 e0832f-e08336 802->810 811 e08311-e0831f 809->811 812 e08325-e0832c call e43caf 809->812 813 e084e5-e0854d call e0eee0 call e07cd0 call e16680 call e4fa5e 810->813 814 e0833c-e0836f GetTempPathW call e16610 810->814 811->812 816 e08a8a call e4a823 811->816 812->810 842 e0856c-e08594 call e0eee0 813->842 843 e0854f-e08562 call e0e2d0 call e4f88c 813->843 825 e08372-e08377 814->825 824 e08a8f-e08a94 call e4405e 816->824 825->825 826 e08379-e0837b 825->826 829 e0839b-e083e8 call e07cd0 call e16680 call e4fa5e 826->829 830 e0837d-e08385 826->830 851 e08407-e0842f call e0eee0 829->851 852 e083ea-e08405 call e0e2d0 call e4f88c 829->852 830->829 833 e08387-e0838e 830->833 833->824 836 e08394 833->836 836->829 850 e08597-e085b3 call e16680 842->850 857 e08567-e0856a 843->857 862 e085b9-e086a1 call e0eee0 call e07cd0 call e16680 call e07cd0 call e16680 CopyFileW call e07cd0 call e16680 call e4fa5e 850->862 863 e086ed-e08709 call e0eee0 850->863 861 e08432-e084e4 call e07cd0 call e146b0 call e14a40 Sleep call e0eee0 call e44138 851->861 852->861 857->850 935 e086c0-e086eb call e0eee0 862->935 936 e086a3-e086be call e0e2d0 call e4f88c 862->936 871 e0870e 863->871 872 e08711-e0871f 871->872 875 e08720-e08724 872->875 878 e08740-e08742 875->878 879 e08726-e08728 875->879 884 e08745-e08747 878->884 882 e0872a-e08730 879->882 883 e0873c-e0873e 879->883 882->878 887 e08732-e0873a 882->887 883->884 888 e088d6-e088db 884->888 889 e0874d-e0882d call e0eee0 call e07cd0 call e16680 call e13d20 call e13bd0 884->889 887->875 887->883 892 e088e0-e088e4 888->892 938 e0887c-e08883 call e13bd0 889->938 939 e0882f-e0883e ShellExecuteExW 889->939 896 e08900-e08902 892->896 897 e088e6-e088e8 892->897 902 e08905-e0890d 896->902 900 e088ea-e088f0 897->900 901 e088fc-e088fe 897->901 900->896 906 e088f2-e088fa 900->906 901->902 907 e08928-e08964 call e07cd0 call e16680 GetFileAttributesW 902->907 908 e0890f-e08923 call e07cd0 902->908 906->892 906->901 923 e089a8-e08a71 call e0eee0 call e16680 * 2 call e47160 call e07cd0 call e14a40 call e0eee0 907->923 930 e08966-e089a5 call e0eee0 call e07cd0 907->930 908->923 972 e08a76-e08a89 call e44138 923->972 930->923 935->872 936->872 957 e08885-e088a9 call e0eee0 938->957 958 e088ab-e088d3 GetLastError call e0eee0 938->958 939->938 944 e08840-e0887b call e0eee0 call e44138 939->944 957->888 958->888
                                                          APIs
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • GetTempPathW.KERNEL32(00000200,?), ref: 00E08348
                                                          • Sleep.KERNEL32(000007D0), ref: 00E08496
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 00E08659
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00E08836
                                                            • Part of subcall function 00E13BD0: GetVersionExW.KERNEL32(00000000), ref: 00E13C03
                                                            • Part of subcall function 00E13BD0: GetVersionExW.KERNEL32(00000000), ref: 00E13C18
                                                          • GetLastError.KERNEL32 ref: 00E088AB
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E0895B
                                                            • Part of subcall function 00E0EEE0: WSAGetLastError.WS2_32(?,?,?,?,?,?,?,Function: ,0000000B,?,?,?,00E7B918,00000000,?), ref: 00E0F484
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?), ref: 00E0F4B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$ErrorFileLastLeaveVersion$AttributesByteCharCopyEnterExecuteMultiPathShellSleepTempWide
                                                          • String ID: "%s" %s$"%s" %s %s %s$%s\%s$%s\%s.exe$%s\%s\%s$%s\WorkingDirectory.txt$--called_by_downloader$--client_name$<$<__WorkingDirectory__>%s</__WorkingDirectory__>$@$Failed to find sInstaller = %s$Failed to open file to write: %s$It is MXmeeting$It is XP$MXmeeting$SetupHandler::CallToInstall$ShellExecuteEx() InstallService.exe failed, GetLastError() = %d$ShellExecuteEx() sInstaller = %s$StartProcess(sStartProcess = %s, m_sSetupDirectory = %s)$TMInstaller$TMLauncher.exe$TMServiceCache.txt$TurboMeeting$\$c:\rhub2\code\setuphandler\setuphandler.cpp$m_bCalledByClientToSyncVersion is false$m_bCalledByClientToSyncVersion is true$m_bIsV4Client is false.$m_bIsV4Client is true. Exit now$m_sSetupDirectory: %s$open$rsp1024hcmd.txt$runas$sInstaller = %s
                                                          • API String ID: 2599472297-669430992
                                                          • Opcode ID: b7692abd5dd9a21913a86bbfb3da1d7f68efd8b5a439c350f6f15eb11222df2d
                                                          • Instruction ID: 02a4c5c5dd49cc4ec48dc09f17243af9f0b94cbb9870f714f948ba27a38d743f
                                                          • Opcode Fuzzy Hash: b7692abd5dd9a21913a86bbfb3da1d7f68efd8b5a439c350f6f15eb11222df2d
                                                          • Instruction Fuzzy Hash: B502F8B1A403187AD721EB60DD87FDA73AD9B09704F4064E1F74CB61C2EBB16AC48B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 975 e13110-e131a0 call e44260 978 e131f0-e1320c 975->978 979 e131a2-e131a9 975->979 980 e13210-e132e3 GetModuleFileNameW GetLongPathNameW call e16610 call e0eee0 call e146b0 GetUserNameW call e16610 978->980 981 e131b0-e131b4 979->981 999 e132e6-e132eb 980->999 983 e131d0-e131d2 981->983 984 e131b6-e131b8 981->984 988 e131d5-e131d7 983->988 986 e131ba-e131c0 984->986 987 e131cc-e131ce 984->987 986->983 991 e131c2-e131ca 986->991 987->988 988->978 989 e131d9-e131df 988->989 992 e131e1-e131ec 989->992 991->981 991->987 992->992 994 e131ee 992->994 994->980 999->999 1000 e132ed-e1330c call e154b0 999->1000 1003 e13313-e13317 1000->1003 1004 e13333-e13335 1003->1004 1005 e13319-e1331b 1003->1005 1008 e13338-e13340 1004->1008 1006 e1331d-e13323 1005->1006 1007 e1332f-e13331 1005->1007 1006->1004 1009 e13325-e1332d 1006->1009 1007->1008 1010 e13346-e13352 1008->1010 1011 e1346c-e13480 SHGetFolderPathW 1008->1011 1009->1003 1009->1007 1012 e13355-e13360 1010->1012 1013 e13482-e134aa call e0eee0 1011->1013 1014 e134ad-e134dd call e16610 call e0eee0 1011->1014 1012->1012 1017 e13362-e133b6 call e0eee0 call e07cd0 call e472c0 1012->1017 1013->1014 1023 e134e2 1014->1023 1032 e133b8-e133bb 1017->1032 1033 e1340d-e13420 call e472c0 1017->1033 1025 e134e5-e134ec 1023->1025 1027 e134f0-e134f4 1025->1027 1030 e13510-e13512 1027->1030 1031 e134f6-e134f8 1027->1031 1036 e13515-e13517 1030->1036 1034 e134fa-e13500 1031->1034 1035 e1350c-e1350e 1031->1035 1037 e133c0-e133c8 1032->1037 1033->1025 1048 e13426-e13429 1033->1048 1034->1030 1039 e13502-e1350a 1034->1039 1035->1036 1040 e135b8-e1362e GetTempPathW GetLongPathNameW call e16610 SHGetSpecialFolderPathW call e16610 1036->1040 1041 e1351d-e13524 call e13b40 1036->1041 1037->1037 1043 e133ca-e13408 call e0eee0 1037->1043 1039->1027 1039->1035 1057 e13630-e13634 1040->1057 1041->1040 1051 e1352a-e13560 SHGetFolderPathW call e16610 1041->1051 1043->1025 1053 e13430-e13438 1048->1053 1062 e13563-e13568 1051->1062 1053->1053 1056 e1343a-e1346a call e0eee0 1053->1056 1056->1025 1060 e13636-e13638 1057->1060 1061 e1367e-e13680 1057->1061 1064 e1363a-e13640 1060->1064 1065 e1364c-e1364e 1060->1065 1067 e13683-e13685 1061->1067 1062->1062 1066 e1356a-e13571 1062->1066 1064->1061 1068 e13642-e1364a 1064->1068 1065->1067 1069 e13593-e135b5 call e0eee0 1066->1069 1070 e13573-e13577 1066->1070 1071 e136a0-e136aa 1067->1071 1072 e13687-e1369a call e13b40 1067->1072 1068->1057 1068->1065 1069->1040 1074 e13580-e13588 1070->1074 1073 e136ac 1071->1073 1072->1073 1082 e1369c-e1369e 1072->1082 1077 e136ae-e136cf SHGetFolderPathW call e16610 1073->1077 1078 e13650-e13655 1074->1078 1079 e1358e-e13591 1074->1079 1089 e136d2-e136da 1077->1089 1084 e13983-e13988 call e4405e 1078->1084 1085 e1365b-e13679 call e07cd0 1078->1085 1079->1069 1079->1074 1082->1077 1085->1069 1089->1089 1092 e136dc-e136eb 1089->1092 1093 e136f0-e136f5 1092->1093 1093->1093 1094 e136f7-e136fc 1093->1094 1095 e13700-e13706 1094->1095 1095->1095 1096 e13708-e137a3 GetLongPathNameW * 2 call e16610 SHGetFolderPathW GetLongPathNameW call e16610 1095->1096 1101 e137a6-e137ab 1096->1101 1101->1101 1102 e137ad-e137af 1101->1102 1103 e137b1-e137b3 1102->1103 1104 e137dd-e137e3 1102->1104 1105 e137b6-e137bb 1103->1105 1106 e137e6-e137eb 1104->1106 1105->1105 1107 e137bd-e137c4 1105->1107 1106->1106 1108 e137ed-e137ef 1106->1108 1107->1104 1109 e137c6-e137cb 1107->1109 1110 e137f1-e137f3 1108->1110 1111 e1381d-e138ff call e0eee0 * 6 1108->1111 1113 e137d0-e137d5 1109->1113 1114 e137f6-e137fb 1110->1114 1131 e13901-e1390b 1111->1131 1132 e1390d-e13912 1111->1132 1113->1113 1116 e137d7-e137d9 1113->1116 1114->1114 1117 e137fd-e13804 1114->1117 1116->1104 1117->1111 1119 e13806-e1380b 1117->1119 1121 e13810-e13815 1119->1121 1121->1121 1122 e13817-e13819 1121->1122 1122->1111 1133 e13917-e13938 call e0eee0 1131->1133 1132->1133 1136 e13946-e1394b 1133->1136 1137 e1393a-e13944 1133->1137 1138 e13950-e13962 call e0eee0 1136->1138 1137->1138 1140 e13967-e13982 call e44138 1138->1140
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000200,?,?,?,?,00E09B9A,?,?,?,?,?,?,?,00000000), ref: 00E1321F
                                                          • GetLongPathNameW.KERNEL32(?,?,00000200), ref: 00E1323A
                                                          • GetUserNameW.ADVAPI32(?,00000200), ref: 00E132B9
                                                          • _strstr.LIBCMT ref: 00E133AC
                                                          • _strstr.LIBCMT ref: 00E13416
                                                          • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,?,00000000,?,?,?,?), ref: 00E1347C
                                                          • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,?), ref: 00E1353A
                                                          • GetTempPathW.KERNEL32(00000200,?), ref: 00E135C5
                                                          • GetLongPathNameW.KERNEL32(?,?,00000200), ref: 00E135E0
                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000005,00000000), ref: 00E1360A
                                                          • SHGetFolderPathW.SHELL32(00000000,00000002,00000000,00000000,?), ref: 00E136B0
                                                          • GetLongPathNameW.KERNEL32(00000000,00000010,00000000,00000000,?), ref: 00E13726
                                                          • GetLongPathNameW.KERNEL32(?,?,00000200), ref: 00E13743
                                                          • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,?), ref: 00E1376F
                                                          • GetLongPathNameW.KERNEL32(?,?,00000200), ref: 00E13786
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                            • Part of subcall function 00E4405E: ___report_securityfailure.LIBCMT ref: 00E44063
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Path$Name$FolderLong$CriticalSection_strstr$EnterFileLeaveModuleSpecialTempUser___report_securityfailure
                                                          • String ID: %s\%s$MXmeeting$SYSTEM$TurboMeeting$Utility::GetUserDirectory()$WebMeeting$\$\..$\..\..$bSystemUser = false$bSystemUser = false, sUserApplicationDirectory = %s$bSystemUser = true$bSystemUser = true, sUserApplicationDirectory = %s$bUserAppDirAccessable = false$bUserAppDirAccessable = true$c:\rhub2\code\utility\utility.cpp$from CSIDL_COMMON_DOCUMENTS, sUserApplicationDirectory = %s$sCurrentDirectory = %s$sCurrentFile = %s$sCurrentFilePath = %s$sDesktopDirectory = %s$sStartMenuDirectory = %s$sTempDirectory = %s$sUserApplicationDirectory = %s$user application directory does not exist
                                                          • API String ID: 1580760233-3861434914
                                                          • Opcode ID: fd7fc5da78346891ebe41445fa937cbb0f3b55d86e1c6788a098886e429f68e7
                                                          • Instruction ID: e1f14c4adca764fd5cfddfa8d737332d33d1d2a91808c850d19d36953c83e07c
                                                          • Opcode Fuzzy Hash: fd7fc5da78346891ebe41445fa937cbb0f3b55d86e1c6788a098886e429f68e7
                                                          • Instruction Fuzzy Hash: 7F220A70248381BED721DF20CC46FE77BD9AB45708F046869F588BB2D2D7B2A649C751
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1858 e14f80-e14fb2 1859 e15385 1858->1859 1860 e14fb8-e14fbb 1858->1860 1861 e15387-e153a1 call e44138 1859->1861 1860->1859 1862 e14fc1-e14fdc 1860->1862 1864 e14fe0-e14fe5 1862->1864 1864->1864 1865 e14fe7-e15050 call e01d51 call e153b0 call e0eee0 call e16680 CreateToolhelp32Snapshot 1864->1865 1875 e15052-e1506c GetLastError call e70f20 1865->1875 1876 e1506e-e15087 Process32FirstW 1865->1876 1888 e150aa-e150dc call e0eee0 call e014f2 1875->1888 1878 e150e1-e15107 GetCurrentThread OpenThreadToken 1876->1878 1879 e15089-e150a5 CloseHandle GetLastError call e70f20 1876->1879 1880 e1510d-e15114 GetLastError 1878->1880 1881 e1519e-e151a4 1878->1881 1879->1888 1886 e15116-e15120 ImpersonateSelf 1880->1886 1887 e1516e-e1517f GetLastError call e70f20 1880->1887 1884 e151a6-e151c6 LookupPrivilegeValueW 1881->1884 1885 e1520f-e15215 1881->1885 1884->1885 1892 e151c8-e15209 AdjustTokenPrivileges 1884->1892 1895 e15220-e15227 1885->1895 1893 e15122-e15138 GetLastError call e70f20 1886->1893 1894 e1513a-e15154 GetCurrentThread OpenThreadToken 1886->1894 1902 e15184-e1519b call e0eee0 1887->1902 1888->1861 1892->1885 1893->1902 1894->1881 1901 e15156-e1516c GetLastError call e70f20 1894->1901 1899 e15340-e15361 call e0eee0 1895->1899 1900 e1522d-e15244 OpenProcess 1895->1900 1915 e15364-e15383 CloseHandle call e014f2 1899->1915 1905 e15262-e1529f call e16610 1900->1905 1906 e15246-e1525c OpenProcess 1900->1906 1901->1902 1902->1881 1921 e152a0-e152a5 1905->1921 1906->1905 1912 e1531b-e15321 GetLastError 1906->1912 1917 e15323-e15338 Process32NextW 1912->1917 1915->1861 1917->1895 1920 e1533e 1917->1920 1920->1915 1921->1921 1922 e152a7-e152fc call e01d51 call e153b0 call e472c0 1921->1922 1930 e15307-e15319 CloseHandle call e014f2 1922->1930 1931 e152fe-e15301 TerminateProcess 1922->1931 1930->1917 1931->1930
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00E15040
                                                          • GetLastError.KERNEL32 ref: 00E15052
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E15080
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E1508A
                                                          • GetLastError.KERNEL32 ref: 00E15090
                                                          • GetCurrentThread.KERNEL32 ref: 00E150F2
                                                          • OpenThreadToken.ADVAPI32(00000000), ref: 00E150F9
                                                          • GetLastError.KERNEL32 ref: 00E1510D
                                                          • ImpersonateSelf.KERNELBASE(00000002), ref: 00E15118
                                                          • GetLastError.KERNEL32 ref: 00E15122
                                                          • GetCurrentThread.KERNEL32 ref: 00E15145
                                                          • OpenThreadToken.ADVAPI32(00000000), ref: 00E1514C
                                                          • GetLastError.KERNEL32 ref: 00E15156
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00E151BE
                                                          • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 00E15209
                                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00E1523A
                                                          • OpenProcess.KERNEL32(00000411,00000000,?), ref: 00E15252
                                                          • _strstr.LIBCMT ref: 00E152F2
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E15301
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E15308
                                                          • GetLastError.KERNEL32 ref: 00E15321
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • Process32NextW.KERNEL32(?,0000022C), ref: 00E15331
                                                          • CloseHandle.KERNEL32(?), ref: 00E15365
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$OpenThread$CloseHandleProcessToken$CriticalCurrentProcess32Section$AdjustCreateEnterFirstImpersonateLeaveLookupNextPrivilegePrivilegesSelfSnapshotTerminateToolhelp32Value_strstr
                                                          • String ID: !Process32First(): %d, %s$CRITICAL ISSUE: there is a dead loop. One TurboMeeting.exe cannot be removed!$ImpersonateSelf(SecurityImpersonation) failed: %d, %s$OpenThreadToken() failed: %d, %s$SeDebugPrivilege$Utility::TerminateProcessByName$c:\rhub2\code\utility\utility.cpp$hProcessSnap == INVALID_HANDLE_VALUE: %d, %s$sProcessName = %s
                                                          • API String ID: 1534570458-1312956877
                                                          • Opcode ID: 887c0a39d461297065d5d1f5ce928a5474f2c969012116430619d884ddf95497
                                                          • Instruction ID: 804a951d019e81e83f978afc0d7323753edc168aca9299617483e6fcb71f9353
                                                          • Opcode Fuzzy Hash: 887c0a39d461297065d5d1f5ce928a5474f2c969012116430619d884ddf95497
                                                          • Instruction Fuzzy Hash: AAA19F72A41628EEDB219B21DC05FEE7BB8AF45704F0451D5F809B72D2DBB19AC4CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E141A7
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00E141D2
                                                          • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E142D2
                                                          • _strstr.LIBCMT ref: 00E142F7
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E14310
                                                          • FindNextFileW.KERNEL32(00000000,?,00000000), ref: 00E1431C
                                                          • FindClose.KERNEL32(00000000), ref: 00E1432B
                                                          Strings
                                                          • Utility::RemoveAllFile, xrefs: 00E143C1
                                                          • c:\rhub2\code\utility\utility.cpp, xrefs: 00E143BA
                                                          • %s\%s, xrefs: 00E1429A
                                                          • %s\*, xrefs: 00E14172
                                                          • End of RemoveAllFile: path = %s, %s, error code: %d, error: %s, xrefs: 00E143B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: File$Find$AttributesByteCharCloseDeleteDirectoryFirstMultiNextRemoveWide_strstr
                                                          • String ID: %s\%s$%s\*$End of RemoveAllFile: path = %s, %s, error code: %d, error: %s$Utility::RemoveAllFile$c:\rhub2\code\utility\utility.cpp
                                                          • API String ID: 2053179335-2006491347
                                                          • Opcode ID: 90527ea70b5ab93ee0623372481797a41b32c52232ae164e7bf34dbc3842c29c
                                                          • Instruction ID: c11e2b8aa94f926f7bca31dcffbd0d299f4d51ee77eb36a74c440dacac364b79
                                                          • Opcode Fuzzy Hash: 90527ea70b5ab93ee0623372481797a41b32c52232ae164e7bf34dbc3842c29c
                                                          • Instruction Fuzzy Hash: D46193B2504344AAE720EB60EC46FEB73EDBF99704F445829F649E21D2EB3195C4C762
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch.LIBCMT ref: 00E2B758
                                                          • FindResourceW.KERNEL32(?,00000000,00000005), ref: 00E2B79C
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00E2B7A4
                                                            • Part of subcall function 00E1F386: UnhookWindowsHookEx.USER32(?), ref: 00E1F3B0
                                                          • LockResource.KERNEL32(?), ref: 00E2B7B4
                                                          • GetDesktopWindow.USER32 ref: 00E2B7EB
                                                          • IsWindowEnabled.USER32(00000000), ref: 00E2B7F6
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00E2B802
                                                            • Part of subcall function 00E2ACCC: IsWindowEnabled.USER32(?), ref: 00E2ACD7
                                                            • Part of subcall function 00E2A5EA: EnableWindow.USER32(?,00000000), ref: 00E2A5FB
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00E2B8E6
                                                          • GetActiveWindow.USER32 ref: 00E2B8F0
                                                          • SetActiveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00E2B8FC
                                                          • FreeResource.KERNEL32(?,?,?,?,?,00000000), ref: 00E2B926
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Resource$Enable$ActiveEnabled$DesktopFindFreeH_prolog3_catchHookLoadLockUnhookWindows
                                                          • String ID:
                                                          • API String ID: 964565984-0
                                                          • Opcode ID: 59c8e98d679f1d0f25b7c311e8e7bc9c2730e878e00819a21c32122ecef00ca7
                                                          • Instruction ID: 1af4de40228d78c9845d221a1e37354fb037395a17d7780f3fbd49689f5c9c78
                                                          • Opcode Fuzzy Hash: 59c8e98d679f1d0f25b7c311e8e7bc9c2730e878e00819a21c32122ecef00ca7
                                                          • Instruction Fuzzy Hash: A4517030E006259FCF15EF71E845BAEBBB9BF48715F046119E909B3292DB345C81CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00E624A7
                                                          • _free.LIBCMT ref: 00E624CB
                                                          • _free.LIBCMT ref: 00E62650
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E8A000), ref: 00E62662
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,W. Europe Standard Time,000000FF,00000000,0000003F,00000000,?,?), ref: 00E626DA
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,W. Europe Summer Time,000000FF,?,0000003F,00000000,?), ref: 00E62707
                                                          • _free.LIBCMT ref: 00E6281C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                          • API String ID: 314583886-690618308
                                                          • Opcode ID: 5d046ebfa06197e5c9cdd044dedd24e5f29023aa71c62e766a74d42d9560fd2d
                                                          • Instruction ID: 420274a9e023fdacfc592c08f39db24154c0922074914bdd6133062e6d8a0d34
                                                          • Opcode Fuzzy Hash: 5d046ebfa06197e5c9cdd044dedd24e5f29023aa71c62e766a74d42d9560fd2d
                                                          • Instruction Fuzzy Hash: 7DC15871980605AFDB349F38EC55AAB7BE8EF85394F14216EE691B7282DB309E01C750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F82D
                                                          • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00E2F83D
                                                          • EncodePointer.KERNEL32(00000000,?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F846
                                                          • DecodePointer.KERNEL32(150661E0,?,?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F854
                                                          • GetLocaleInfoEx.KERNEL32(?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F874
                                                          • GetLocaleInfoW.KERNEL32(00000000,00000004,?,00000003,?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F88B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: InfoLocalePointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: GetLocaleInfoEx$kernel32.dll
                                                          • API String ID: 3226634038-1547310189
                                                          • Opcode ID: d699d82227e50307e81b73a727c272e12e69cd663a9e5b72f95234c61a99e813
                                                          • Instruction ID: e603591127444fdf1009359033f0560c5eabceeb89a33dbcbba4561507c93d1d
                                                          • Opcode Fuzzy Hash: d699d82227e50307e81b73a727c272e12e69cd663a9e5b72f95234c61a99e813
                                                          • Instruction Fuzzy Hash: 03014B35500229BF8F0AAFB2FC088AA7B79FF087467005035FE09B6131CB31C8609B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0000E560), ref: 00E0E5A7
                                                          • SetThreadPriority.KERNEL32(?,0000000F), ref: 00E0E5BC
                                                          • WSAGetLastError.WS2_32 ref: 00E0E5C6
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • SetEvent.KERNEL32(?), ref: 00E0E603
                                                          • SetEvent.KERNEL32(?), ref: 00E0E60F
                                                          Strings
                                                          • c:\rhub2\code\utility\mythread.cpp, xrefs: 00E0E5E0
                                                          • SetThreadPriority() failed, error code: %d, error: %s, xrefs: 00E0E5D6
                                                          • MyThread::ThreadFunc(), xrefs: 00E0E5E7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalEventSection$EnterErrorExceptionFilterLastLeavePriorityThreadUnhandled
                                                          • String ID: MyThread::ThreadFunc()$SetThreadPriority() failed, error code: %d, error: %s$c:\rhub2\code\utility\mythread.cpp
                                                          • API String ID: 1290180407-840189773
                                                          • Opcode ID: 7eea6d014f57eb20ed574d8b6dafcf0fc819f3851cc3f20380543aa64f493b2e
                                                          • Instruction ID: b26cf41731fce04a986d7b4bf39ba78a38723c15fcb00f386e5b9d9d395dc55b
                                                          • Opcode Fuzzy Hash: 7eea6d014f57eb20ed574d8b6dafcf0fc819f3851cc3f20380543aa64f493b2e
                                                          • Instruction Fuzzy Hash: 4FF04F717402117FE7259B22EC0DF1A7FA5FF48754F049860F51DB22E2E760A895CA92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSystemTime.KERNEL32(?,904898A6,?), ref: 00E1239F
                                                            • Part of subcall function 00E01D16: _Deallocate.LIBCONCRT ref: 00E01D25
                                                          Strings
                                                          • Utility::GetIPAddressByName, xrefs: 00E12BC0
                                                          • getaddrinfo(%s) failed: Error Code = %d, Error = %s, xrefs: 00E12BAF
                                                          • c:\rhub2\code\utility\utility.cpp, xrefs: 00E12BB9
                                                          • %s%d, xrefs: 00E12416
                                                          • %d-%d-%d-%d, xrefs: 00E123CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: DeallocateSystemTime
                                                          • String ID: %d-%d-%d-%d$%s%d$Utility::GetIPAddressByName$c:\rhub2\code\utility\utility.cpp$getaddrinfo(%s) failed: Error Code = %d, Error = %s
                                                          • API String ID: 2177079487-2401621314
                                                          • Opcode ID: 93fe65e6c4b544f55116a80d24f45123872f65088f0cce9c41d5cbc1ea1dc2d6
                                                          • Instruction ID: 900ed846eda5f2655b38a32713107ac1d4810a7473f3e2f69f6934c1e43f6f2e
                                                          • Opcode Fuzzy Hash: 93fe65e6c4b544f55116a80d24f45123872f65088f0cce9c41d5cbc1ea1dc2d6
                                                          • Instruction Fuzzy Hash: F4F1F671A003189BDB24DF34CC85BDDB7B5EF85304F109A9CE549B7682EB74AAC88B51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,?,?,00E24F6F,?,00E9AA90,00000010,00E1F325,?), ref: 00E1D6A6
                                                          • GetLastError.KERNEL32(00E1F325,?,?,00E24F6F,?,00E9AA90,00000010,00E1F325,?), ref: 00E1D6DD
                                                          Strings
                                                          • IsolationAware function called after IsolationAwareCleanup, xrefs: 00E1D6A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: DebugErrorLastOutputString
                                                          • String ID: IsolationAware function called after IsolationAwareCleanup
                                                          • API String ID: 4132100945-2690750368
                                                          • Opcode ID: 49f0f8184600fc846f68e959667c8e76c73a301bbef2d52cd94716c1884cb516
                                                          • Instruction ID: 5d22154e27084a7ba71417019f35baea71873d6551945a9dec8fe4e24905d276
                                                          • Opcode Fuzzy Hash: 49f0f8184600fc846f68e959667c8e76c73a301bbef2d52cd94716c1884cb516
                                                          • Instruction Fuzzy Hash: 0EF0F63520D3148B4B3867AABC549EE3794AB0AB593242026F90EF19B1DA60DCD4CAE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(?,?,00E4FDB7,?,?,?,?), ref: 00E4FDDA
                                                          • TerminateProcess.KERNEL32(00000000,?,00E4FDB7,?,?,?,?), ref: 00E4FDE1
                                                          • ExitProcess.KERNEL32 ref: 00E4FDF3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 99281347af97009f4fdca36f90c2e92843fe67cdc7c889d2a85cdf4f4758e286
                                                          • Instruction ID: ce0f5e7fab33ddb62799b16498c3564f91b283160449aaab6cf386916ec7e813
                                                          • Opcode Fuzzy Hash: 99281347af97009f4fdca36f90c2e92843fe67cdc7c889d2a85cdf4f4758e286
                                                          • Instruction Fuzzy Hash: 0FE04631400548AFCF11AB65EC0CA293B79FF00742B050424F809AA132CB35DC86CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 14413e32b7d14194a941a5679042a3159b7c8edaaac67d7a848c1c4957b2fb9f
                                                          • Instruction ID: 943b3ec3cc0b7aaf2b9e51938ad86207eabae83d1e38bfb73ead67a62358bf58
                                                          • Opcode Fuzzy Hash: 14413e32b7d14194a941a5679042a3159b7c8edaaac67d7a848c1c4957b2fb9f
                                                          • Instruction Fuzzy Hash: 4451BD7130760057DBB88A6CB8557FF63CA9B16308F38390AE543F7682C719EE4A8365
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3890fd4f3637570803c2259bfffde9a55cd4efccbe05144b8a6f7e449aeb741b
                                                          • Instruction ID: 9a49365da57d6e7a53cd4bc5cdaee895346ef630874799257b40b97018106f02
                                                          • Opcode Fuzzy Hash: 3890fd4f3637570803c2259bfffde9a55cd4efccbe05144b8a6f7e449aeb741b
                                                          • Instruction Fuzzy Hash: ACF03031A553289BCB26CA4CD945B9A73FCEB44B62F1159A6F944E7250C670AE04C7C0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 156 e0c770-e0c7d5 call e44260 call e0eee0 call e0dd70 163 e0c7db-e0c828 call e07cd0 call e16680 call e14130 GetFileAttributesW 156->163 164 e0d1ae-e0d1c1 156->164 178 e0c885-e0c8d3 call e07cd0 call e16680 call e14130 GetFileAttributesW 163->178 179 e0c82a-e0c83b CreateDirectoryW 163->179 166 e0d1d0-e0d1d6 164->166 167 e0d1c3-e0d1ce 164->167 169 e0d1db-e0d24d call e07cd0 * 2 call e16680 * 2 call e4fa5e 166->169 167->169 197 e0d253-e0d284 call e0eee0 169->197 198 e0d366-e0d39b call e0e3b0 call e5014b call e4f88c 169->198 203 e0c8d5-e0c8e6 CreateDirectoryW 178->203 204 e0c8fe-e0c963 call e1b1a0 * 2 call e01d51 call e14410 178->204 179->178 181 e0c83d-e0c843 179->181 184 e0c848-e0c880 call e0eee0 GetActiveWindow MessageBoxW 181->184 193 e0da85-e0da9f call e44138 184->193 211 e0d293-e0d299 197->211 212 e0d286-e0d291 197->212 224 e0d3a1-e0d3c5 call e14130 GetFileAttributesW 198->224 225 e0da83 198->225 203->204 208 e0c8e8-e0c8f9 203->208 236 e0c965 204->236 237 e0c967-e0c9cc call e1b200 call e014f2 call e01d51 call e14410 204->237 208->184 215 e0d29e-e0d2c0 call e07cd0 211->215 212->215 222 e0d2c2-e0d2c7 215->222 223 e0d2c9 215->223 227 e0d2ce-e0d31d call e07cd0 call e16680 * 2 call e4fa5e 222->227 223->227 234 e0d3c7-e0d3d8 CreateDirectoryW 224->234 235 e0d3ef-e0d4e7 call e1b1a0 call e1b200 call e0eee0 call e07cd0 * 2 call e16680 * 2 CopyFileW call e0eee0 224->235 225->193 227->198 259 e0d31f-e0d361 call e0eee0 GetActiveWindow MessageBoxW 227->259 234->235 239 e0d3da-e0d3e5 234->239 280 e0d4ec-e0da0e call e01d51 call e07ec0 call e07e60 call e068a0 call e01d16 call e014f2 * 3 call e07ec0 call e07e60 call e068a0 call e07e60 call e068a0 call e01d16 call e014f2 * 5 call e07ec0 call e07e60 call e068a0 call e01d16 call e014f2 * 3 call e07ec0 call e07e60 call e068a0 * 3 call e01d16 call e014f2 * 5 call e07ec0 235->280 236->237 263 e0c9d0-e0ca80 call e1b200 call e014f2 call e0eee0 call e07cd0 call e16680 call e0eee0 GetFileAttributesW 237->263 264 e0c9ce 237->264 239->235 259->193 291 e0ca86-e0cadc call e47160 call e07cd0 call e16680 GetFileAttributesW 263->291 292 e0cbad-e0d0ca call e01d51 call e07ec0 call e07e60 call e068a0 call e01d16 call e014f2 * 3 call e07ec0 call e07e60 call e068a0 call e07e60 call e068a0 call e01d16 call e014f2 * 5 call e07ec0 call e07e60 call e068a0 call e01d16 call e014f2 * 3 call e07ec0 call e07e60 call e068a0 * 3 call e01d16 call e014f2 * 5 call e07ec0 263->292 264->263 459 e0da10-e0da3c call e01d16 280->459 460 e0da3f-e0da5e call e014f2 280->460 313 e0cb57-e0cbaa call e0eee0 call e11a00 call e16680 291->313 314 e0cade-e0cafc call e4fa5e 291->314 474 e0d0fb-e0d12d call e014f2 call e07ec0 292->474 475 e0d0cc-e0d0f8 call e01d16 292->475 313->292 326 e0cb2a-e0cb55 call e0eee0 314->326 327 e0cafe-e0cb25 call e0e2d0 call e4f88c 314->327 326->292 327->292 459->460 468 e0da60-e0da6b 460->468 468->468 469 e0da6d-e0da78 call e014f2 468->469 476 e0da7e call e1b1c0 469->476 484 e0d15e-e0d17f call e014f2 474->484 485 e0d12f-e0d15b call e01d16 474->485 475->474 476->225 490 e0d180-e0d18b 484->490 485->484 490->490 491 e0d18d-e0d1a9 call e014f2 call e1b1c0 490->491 491->476
                                                          APIs
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                            • Part of subcall function 00E0DD70: FindWindowW.USER32(TurboMeetingMainWindowClass,00000000), ref: 00E0DDB7
                                                            • Part of subcall function 00E0DD70: PostMessageW.USER32(00000000,000013A0,00000000,00000000), ref: 00E0DDC7
                                                            • Part of subcall function 00E0DD70: FindWindowW.USER32(TurboMeetingMainWindowClass,00000000), ref: 00E0DDDB
                                                            • Part of subcall function 00E0DD70: WSAGetLastError.WS2_32(?,?,?,?,?,00000000), ref: 00E0DDDF
                                                            • Part of subcall function 00E0DD70: Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E0DE2A
                                                            • Part of subcall function 00E0DD70: FindWindowW.USER32(TurboMeetingMainWindowClass,00000000), ref: 00E0DE37
                                                            • Part of subcall function 00E0DD70: WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E0DE49
                                                            • Part of subcall function 00E0DD70: PostMessageW.USER32(00000000,000013A0,00000000,00000000), ref: 00E0DE83
                                                            • Part of subcall function 00E0DD70: WSAGetLastError.WS2_32 ref: 00E0DE89
                                                            • Part of subcall function 00E0DD70: WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E0DEB9
                                                          • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00E762F5,000000FF,?,00E098B2), ref: 00E0C81F
                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00E762F5,000000FF), ref: 00E0C833
                                                          • GetActiveWindow.USER32 ref: 00E0C871
                                                          • MessageBoxW.USER32(00000000), ref: 00E0C878
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E0C8CA
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E0C8DE
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E0CA77
                                                          • MessageBoxW.USER32(00000000), ref: 00E0D359
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E0CAD3
                                                            • Part of subcall function 00E01D16: _Deallocate.LIBCONCRT ref: 00E01D25
                                                          • GetActiveWindow.USER32 ref: 00E0D352
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                            • Part of subcall function 00E14130: FindFirstFileW.KERNEL32(?,?), ref: 00E141A7
                                                            • Part of subcall function 00E14130: RemoveDirectoryW.KERNEL32(?), ref: 00E141D2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: FileWindow$AttributesErrorFindLastMessage$Directory$ActiveCreateCriticalPostSection$ByteCharDeallocateEnterFirstLeaveMultiRemoveSleepWide
                                                          • String ID: %s\%s$%s\%s.exe$%s\..\%s$%s\Accessory$%s\WorkingDirectory.txt$.zip$</__SetupConfigureFile__>$</__SetupDirectory__>$</__SetupFileName__>$</__SetupFile__>$<__NeedToRemoveSetup__>Y</__NeedToRemoveSetup__>$<__SetupConfigureFile__>$<__SetupDirectory__>$<__SetupFileName__>$<__SetupFile__>$<__WorkingDirectory__>%s\%s</__WorkingDirectory__>$Enter ...$Failed to open file to write: %s$Filed to create: %s$PCClient.zip$PCClientAccessory.zip$SetupHandler::ProcessDownloadedClient$TMDownload$TMInstaller$TMLauncher.exe$Unable to create a directory to install the downloaded software$Unable to save the download file$Uncompress %s into %s$Uncompress %s into %s and %s$c:\rhub2\code\setuphandler\setuphandler.cpp$copy sSourceFile = %s, sTargetFile = %s$sUserDefinedWorkingDirectory %s exists$sWorkingDirectoryFile: %s$starter.cfg$tm_starter_dir
                                                          • API String ID: 3132196403-3753240308
                                                          • Opcode ID: b1996b365485fda5f273dd52c688d96664aed0591a7a44fc24f31e18296539da
                                                          • Instruction ID: fa3ced68a0ac49a0a007d7289a9616c19ac34cd1120d25ef05afe0b6cf176af0
                                                          • Opcode Fuzzy Hash: b1996b365485fda5f273dd52c688d96664aed0591a7a44fc24f31e18296539da
                                                          • Instruction Fuzzy Hash: CEB2A571C04358BADB25EBA0CC49BDDB7B8AF15304F0056D9E509761D2EBB0ABC9CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1143 e72e40-e72ecb call e44260 1146 e72ed0-e72ed5 1143->1146 1146->1146 1147 e72ed7-e72f06 call e01d51 1146->1147 1150 e7360e-e73645 call e0eee0 1147->1150 1151 e72f0c-e72f0f 1147->1151 1157 e73647-e73656 1150->1157 1158 e73672 1150->1158 1151->1150 1152 e72f15-e72f52 call e10230 call e47160 call e154f0 1151->1152 1175 e72f54-e72f8f call e0eee0 1152->1175 1176 e72f91-e72fbb call e0eee0 1152->1176 1160 e73668-e7366f call e43caf 1157->1160 1161 e73658-e73666 1157->1161 1162 e73674-e7368f call e44138 1158->1162 1160->1158 1161->1160 1164 e73692-e736c2 call e4a823 inet_addr * 3 1161->1164 1173 e736c4-e736c7 1164->1173 1174 e736db-e736e1 1164->1174 1173->1174 1177 e736c9-e736cd 1173->1177 1183 e72fc3-e73009 call e47160 1175->1183 1182 e72fc0 1176->1182 1177->1174 1180 e736cf-e736d8 1177->1180 1182->1183 1186 e73010-e73015 1183->1186 1186->1186 1187 e73017-e730b6 call e01d51 call e13c70 call e0eee0 1186->1187 1194 e730bd-e730bf 1187->1194 1195 e730b8-e730bb 1187->1195 1196 e730c0-e730d5 call e73a90 1194->1196 1195->1196 1198 e730da-e730e9 1196->1198 1199 e730f2-e730f7 1198->1199 1200 e730eb-e730ec InternetCloseHandle 1198->1200 1201 e73100-e73105 1199->1201 1202 e730f9-e730fa InternetCloseHandle 1199->1202 1200->1199 1203 e73107-e73108 InternetCloseHandle 1201->1203 1204 e7310e-e7312a 1201->1204 1202->1201 1203->1204 1205 e73130-e73175 InternetOpenA 1204->1205 1206 e733ce-e733dc 1204->1206 1207 e73177-e73186 InternetOpenA 1205->1207 1208 e7318c-e731dd InternetConnectA HttpOpenRequestA 1205->1208 1209 e735e2-e7360c call e014f2 * 2 1206->1209 1210 e733e2-e73432 call e0eee0 1206->1210 1207->1208 1211 e731e0-e731e5 1208->1211 1209->1162 1220 e734ec-e734fe call e07cd0 1210->1220 1221 e73438-e7344c call e07cd0 1210->1221 1211->1211 1215 e731e7-e7320b HttpSendRequestA 1211->1215 1218 e73451-e73498 WSAGetLastError call e70f20 call e0eee0 1215->1218 1219 e73211-e7325d call e47160 1215->1219 1241 e733aa-e733c8 InternetCloseHandle * 3 1218->1241 1233 e732e6-e732ff InternetReadFileExA 1219->1233 1234 e73263-e73268 1219->1234 1231 e73501-e73549 call e158e0 1220->1231 1221->1231 1250 e735d5 1231->1250 1251 e7354f-e73557 1231->1251 1236 e73346-e7334b 1233->1236 1237 e73301-e73325 WSAGetLastError call e70f20 1233->1237 1234->1233 1239 e7326a 1234->1239 1244 e733a7 1236->1244 1245 e7334d-e73350 1236->1245 1255 e7332a-e7333f call e0eee0 1237->1255 1240 e73270-e732a1 InternetReadFile 1239->1240 1247 e732a3-e732ab 1240->1247 1248 e732bb-e732e4 WSAGetLastError call e70f20 1240->1248 1241->1206 1244->1241 1245->1244 1246 e73352-e73360 call e472c0 1245->1246 1246->1244 1263 e73362-e733a0 WSAGetLastError call e70f20 call e0eee0 1246->1263 1247->1248 1253 e732ad-e732b4 1247->1253 1248->1255 1256 e735db 1250->1256 1251->1256 1257 e7355d-e7357e call e46660 call e1d9ba 1251->1257 1253->1240 1259 e732b6 1253->1259 1255->1236 1256->1209 1270 e73580-e73583 1257->1270 1271 e735cc-e735d3 1257->1271 1259->1236 1263->1244 1270->1271 1273 e73585-e73596 call e472c0 1270->1273 1271->1209 1273->1271 1277 e73598-e735c9 WSAGetLastError call e70f20 call e0eee0 1273->1277 1277->1271
                                                          APIs
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                            • Part of subcall function 00E73A90: EnterCriticalSection.KERNEL32(?,904898A6,?,00E7B918,?,?,?,00E7860A,000000FF,?,00E730DA,?,?), ref: 00E73B10
                                                          • InternetCloseHandle.WININET(?), ref: 00E730EC
                                                          • InternetCloseHandle.WININET(?), ref: 00E730FA
                                                          • InternetCloseHandle.WININET(?), ref: 00E73108
                                                          • InternetOpenA.WININET(Internet Explorer,00000003,00000000,00000000,00000000), ref: 00E73167
                                                          • InternetOpenA.WININET(Internet Explorer,00000000,00000000,00000000,00000000), ref: 00E73180
                                                          • InternetConnectA.WININET(00000000,00000001,00E7B918,00000000,00000000,00000003,00000000,00000001), ref: 00E7319E
                                                          • HttpOpenRequestA.WININET(00000000,GET,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00E731C0
                                                          • HttpSendRequestA.WININET(00000000,?,?,00000000,00000000), ref: 00E731FA
                                                          • InternetReadFile.WININET(?,?,00003800,00000000), ref: 00E73299
                                                          • WSAGetLastError.WS2_32 ref: 00E732BB
                                                          • InternetReadFileExA.WININET(?,00000028,00000004,00000000), ref: 00E732F7
                                                          • WSAGetLastError.WS2_32 ref: 00E73301
                                                          • _strstr.LIBCMT ref: 00E73356
                                                          • WSAGetLastError.WS2_32(?,?,00000000,GET,00E7B918), ref: 00E73362
                                                          • InternetCloseHandle.WININET(?), ref: 00E733B0
                                                          • InternetCloseHandle.WININET(?), ref: 00E733BC
                                                          • InternetCloseHandle.WININET(?), ref: 00E733C8
                                                          • WSAGetLastError.WS2_32(00000000), ref: 00E73451
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseHandle$ErrorLast$CriticalOpenSection$EnterFileHttpReadRequest$ConnectLeaveSend_strstr
                                                          • String ID: ($Empty IP, iPort = %d, URL = %s, m_iExpectedReceiveSize = %d$GET$HLib::GetPage$HR::GetPage$HSR() failed, error code: %d, error: %s$HTTP fialed. Now try TCP for URL = %s$IRE() error code: %d, error: %s$IRE() failed, error code: %d, error: %s$Internet Explorer$No keyword, error code: %d, error: %s$bIsSystemUser = %s, g_oMyConfigure is NULL = %s, bHTTPFailed = %s$c:\rhub2\code\hlib\hlib.cpp$http://%s%s$http://%s:%d%s$sIP = %s, iPort = %d, URL = %s, m_iExpectedReceiveSize = %d$sIP = %s, iPort = %d, sURL = %s, iMaxLength = %d, sKeyInReturn = %s, m_iExpectedReceiveSize = %d
                                                          • API String ID: 1181822904-774248845
                                                          • Opcode ID: dee27f61bccd32c452c214762312b3362a5b0d34a9e4452f227d1c892810aaa9
                                                          • Instruction ID: 442d68be4b590ed89b46f8fe8c886af89238b28daeabe93bd6df1c5a0cec1866
                                                          • Opcode Fuzzy Hash: dee27f61bccd32c452c214762312b3362a5b0d34a9e4452f227d1c892810aaa9
                                                          • Instruction Fuzzy Hash: A822C071A00719AFEF219B24DC85FDABBB9EB05704F005194F80CB6292D7B1AEA4DF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1282 e1b200-e1b280 call e44260 call e0eee0 1287 e1b292-e1b2f0 GetTempPathW call e54c8c call e02ee7 call e16680 call e4fa5e 1282->1287 1288 e1b282-e1b28b call e4f88c 1282->1288 1299 e1b2f2-e1b34f WSAGetLastError call e70f20 call e0eee0 * 2 1287->1299 1300 e1b354-e1b374 call e55c28 1287->1300 1288->1287 1320 e1ba51-e1ba6b call e44138 1299->1320 1306 e1b37a 1300->1306 1307 e1b9ff-e1ba23 call e4f88c DeleteFileW 1300->1307 1310 e1b380-e1b39c call e55c28 1306->1310 1315 e1ba25-e1ba49 call e4f88c ShellExecuteW 1307->1315 1316 e1ba4f 1307->1316 1318 e1bd60-e1bdc6 WSAGetLastError call e70f20 call e0eee0 * 2 call e4f88c 1310->1318 1319 e1b3a2-e1b3c5 1310->1319 1315->1316 1316->1320 1318->1320 1323 e1b3c8-e1b3cd 1319->1323 1323->1323 1326 e1b3cf-e1b404 call e01d51 1323->1326 1333 e1b406-e1b413 call e068a0 1326->1333 1334 e1b418-e1b41e 1326->1334 1333->1334 1337 e1b421-e1b426 1334->1337 1337->1337 1339 e1b428-e1b459 call e068a0 1337->1339 1344 e1b45b-e1b46b 1339->1344 1345 e1b47e 1339->1345 1347 e1b47a-e1b47c 1344->1347 1348 e1b46d 1344->1348 1346 e1b481-e1b4a3 1345->1346 1349 e1b4a9-e1b4fa call e01d51 1346->1349 1350 e1b5ac-e1b5ce call e55c28 1346->1350 1347->1346 1351 e1b470-e1b472 1348->1351 1359 e1b52b-e1b551 1349->1359 1360 e1b4fc-e1b50b 1349->1360 1357 e1bc51-e1bc87 WSAGetLastError call e70f20 call e0eee0 1350->1357 1358 e1b5d4-e1b5f6 call e55c28 1350->1358 1351->1345 1354 e1b474-e1b478 1351->1354 1354->1347 1354->1351 1383 e1bc8c-e1bcb9 call e0eee0 call e4f88c 1357->1383 1373 e1bc14-e1bc4f WSAGetLastError call e70f20 call e0eee0 1358->1373 1374 e1b5fc-e1b63a call e16680 call e4fa5e 1358->1374 1359->1350 1364 e1b553-e1b556 1359->1364 1362 e1b521-e1b528 call e43caf 1360->1362 1363 e1b50d-e1b51b 1360->1363 1362->1359 1363->1362 1367 e1bdcb call e4a823 1363->1367 1364->1350 1369 e1b558-e1b59a call e16680 SHCreateDirectoryExW 1364->1369 1378 e1bdd0-e1bdd5 call e4a823 1367->1378 1369->1350 1382 e1b59c-e1b59f 1369->1382 1373->1383 1398 e1b640-e1b6af WSAGetLastError call e70f20 call e0eee0 * 2 1374->1398 1399 e1b70e-e1b76e call e6e570 1374->1399 1382->1350 1387 e1b5a1-e1b5a6 1382->1387 1405 e1bcbb-e1bcc1 call e4f88c 1383->1405 1406 e1bcca-e1bcd3 1383->1406 1387->1350 1392 e1ba6e-e1baed WSAGetLastError call e70f20 call e0eee0 * 2 call e4f88c 1387->1392 1429 e1bcc7 1392->1429 1441 e1b6e1-e1b6f3 call e1bde0 1398->1441 1442 e1b6b1-e1b6ca call e4fa5e 1398->1442 1410 e1b774-e1b776 1399->1410 1405->1429 1413 e1bcd5-e1bce4 1406->1413 1414 e1bd04-e1bd28 1406->1414 1418 e1b778-e1b78c 1410->1418 1419 e1b7cd-e1b7ef call e6d010 1410->1419 1422 e1bce6-e1bcf4 1413->1422 1423 e1bcfa-e1bd01 call e43caf 1413->1423 1416 e1bd59-e1bd5b 1414->1416 1417 e1bd2a-e1bd39 1414->1417 1416->1320 1425 e1bd3b-e1bd49 1417->1425 1426 e1bd4f-e1bd56 call e43caf 1417->1426 1427 e1b792-e1b79c 1418->1427 1428 e1b865-e1b887 call e6d010 1418->1428 1447 e1b7f1-e1b7f5 1419->1447 1448 e1b850-e1b852 1419->1448 1422->1367 1422->1423 1423->1414 1425->1378 1425->1426 1426->1416 1436 e1b7a5 1427->1436 1437 e1b79e-e1b7a3 1427->1437 1453 e1b908-e1b91c call e6e440 call e4f88c 1428->1453 1454 e1b88d 1428->1454 1429->1406 1444 e1b7a6-e1b7af call e55c28 1436->1444 1437->1444 1464 e1b6f6-e1b709 call e55f8c 1441->1464 1442->1464 1465 e1b6cc-e1b6df call e1bde0 1442->1465 1460 e1b7b4-e1b7c7 1444->1460 1455 e1b834-e1b846 1447->1455 1456 e1b7f7 1447->1456 1448->1428 1450 e1b854-e1b860 1448->1450 1450->1410 1479 e1b921-e1b932 1453->1479 1462 e1b890-e1b894 1454->1462 1455->1448 1457 e1b800-e1b818 call e5014b 1456->1457 1469 e1b81d-e1b822 1457->1469 1460->1419 1460->1428 1467 e1b896-e1b8b8 call e5014b 1462->1467 1468 e1b8ca-e1b8e2 1462->1468 1482 e1b93d-e1b94a 1464->1482 1465->1441 1465->1464 1483 e1bb6e-e1bba9 WSAGetLastError call e70f20 call e0eee0 1467->1483 1484 e1b8be-e1b8c2 1467->1484 1468->1453 1470 e1b8e4-e1b906 call e6d010 1468->1470 1475 e1baf2-e1bb28 WSAGetLastError call e70f20 call e0eee0 1469->1475 1476 e1b828-e1b82c 1469->1476 1470->1453 1470->1462 1511 e1bb2d-e1bb69 call e0eee0 call e4f88c * 2 1475->1511 1476->1457 1485 e1b82e 1476->1485 1479->1482 1487 e1b934-e1b937 1479->1487 1493 e1b97b-e1b9a6 1482->1493 1494 e1b94c-e1b95b 1482->1494 1483->1511 1484->1467 1490 e1b8c4 1484->1490 1485->1455 1487->1482 1492 e1bbab-e1bc0f WSAGetLastError call e70f20 call e0eee0 * 2 call e4f88c 1487->1492 1490->1468 1492->1406 1497 e1b9d7-e1b9ef call e55c28 1493->1497 1498 e1b9a8-e1b9b7 1493->1498 1500 e1b971-e1b978 call e43caf 1494->1500 1501 e1b95d-e1b96b 1494->1501 1513 e1b9f4-e1b9f9 1497->1513 1505 e1b9b9-e1b9c7 1498->1505 1506 e1b9cd-e1b9d4 call e43caf 1498->1506 1500->1493 1501->1367 1501->1500 1505->1367 1505->1506 1506->1497 1511->1429 1513->1307 1513->1310
                                                          APIs
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • GetTempPathW.KERNEL32(00000104,?,?,?,00E76BE6,000000FF,?,00E0D414,?,?), ref: 00E1B29E
                                                          • __swprintf.LEGACY_STDIO_DEFINITIONS ref: 00E1B2C0
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,00E76BE6,000000FF), ref: 00E1B2F2
                                                          • __fread_nolock.LIBCMT ref: 00E1B36A
                                                          • __fread_nolock.LIBCMT ref: 00E1B392
                                                          • SHCreateDirectoryExW.SHELL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00E1B58C
                                                          • __fread_nolock.LIBCMT ref: 00E1B5C4
                                                          • __fread_nolock.LIBCMT ref: 00E1B5EC
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,00000001), ref: 00E1B640
                                                          • __fread_nolock.LIBCMT ref: 00E1B7AF
                                                          • __fread_nolock.LIBCMT ref: 00E1B9EF
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000001,00000000), ref: 00E1BA18
                                                          • ShellExecuteW.SHELL32(00000000,Open,?,00000000,00000000,00000001), ref: 00E1BA49
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00E1BA6E
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000038), ref: 00E1BAF2
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,00000001,00000000), ref: 00E1BD60
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,00000038), ref: 00E1BB6E
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,00000038), ref: 00E1BBAB
                                                          • WSAGetLastError.WS2_32(?,?,?,00000001,?,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00E1BC14
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 00E1BC51
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__fread_nolock$CriticalSection$ByteCharCreateDeleteDirectoryEnterExecuteFileLeaveMultiPathShellTempWide__swprintf
                                                          • String ID: %s$%sTM%d.txt$1.2.1$CCZLib::UnZip$CZLib::UnZip$Error code: %d, error: %s$Open$SHCreateDirectoryEx error: %s, error code = %d$The following files failed to copy to the destination:$c:\rhub2\code\utility\zlibpp.cpp$can't create file %s, skip to the next one.$can't open %s$enter %s to %s$fread error$fread iFileMask error$fread lFileLength error$fwrite error$iErr != Z_OK && iErr != Z_STREAM_END
                                                          • API String ID: 2892380473-3998357332
                                                          • Opcode ID: a464299973019e150ff2bfd50b0d37012f717da90b3f1d2e65443a70d5fd6ad4
                                                          • Instruction ID: 024ded744e4e81c3ab8218102a98d0cb316c5fc7c579bc217facc28d4d221c0d
                                                          • Opcode Fuzzy Hash: a464299973019e150ff2bfd50b0d37012f717da90b3f1d2e65443a70d5fd6ad4
                                                          • Instruction Fuzzy Hash: B652A271A40319AFDB24AF64CC4ABDABBB9AF04704F005595F90CB62D1E7B19AC9CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,904898A6,?,00E7B918,?,?,?,00E7860A,000000FF,?,00E730DA,?,?), ref: 00E73B10
                                                            • Part of subcall function 00E154F0: _strstr.LIBCMT ref: 00E154FC
                                                            • Part of subcall function 00E154F0: _strstr.LIBCMT ref: 00E15510
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                            • Part of subcall function 00E16C30: EnterCriticalSection.KERNEL32(00EA97FC,00000000,00E7B918,?,00000000), ref: 00E16C83
                                                            • Part of subcall function 00E16C30: CreateMutexW.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 00E16CA9
                                                            • Part of subcall function 00E16C30: WaitForSingleObject.KERNEL32(00000000,00001388,?,?,00000000), ref: 00E16CB7
                                                            • Part of subcall function 00E16C30: WSAGetLastError.WS2_32(?,?,00000000), ref: 00E16CC1
                                                            • Part of subcall function 00E16C30: ReleaseMutex.KERNEL32(00000000,?,?,?,?,00000000), ref: 00E16D0D
                                                            • Part of subcall function 00E16C30: LeaveCriticalSection.KERNEL32(00EA97FC,?,?,?,?,00000000), ref: 00E16D18
                                                          • InternetQueryOptionA.WININET ref: 00E7434D
                                                          • GetLastError.KERNEL32 ref: 00E7435B
                                                            • Part of subcall function 00E749B0: _strstr.LIBCMT ref: 00E74A36
                                                            • Part of subcall function 00E749B0: _strncpy.LIBCMT ref: 00E74A57
                                                          • GlobalFree.KERNEL32(?), ref: 00E74876
                                                          • GlobalFree.KERNEL32(?), ref: 00E74883
                                                          • GlobalFree.KERNEL32(?), ref: 00E74890
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00E748DF
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00E74937
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$EnterFreeGlobal_strstr$ErrorLastMutex$CreateInternetObjectOptionQueryReleaseSingleWait_strncpy
                                                          • String ID: %s after auto URL$%s after auto detect$</__SERVER_ACCESS_SETTING1__>$<__SERVER_ACCESS_SETTING1__>$After SetOptionR() bConnectionSucceeded = %s$Failed to InternetQueryOption %d$Failed with aServerAccessSetting[i] = %s, URL = %s$HR::DP$HR::SendRequest$HR::SendRequest NEW session for sIP = %s on iPort = %d$HR::SendRequest failed! %s, %s, %d$HR::SendRequest succeeded! m_sServerAccessSetting = %s$NULL$No valid/matched aServerAccessSetting$OK with aServerAccessSetting[i] = %s, URL = %s$Option[0]$Option[2], PROXY_TYPE_AUTO_DETECT$Option[2], PROXY_TYPE_AUTO_PROXY_URL$Option[2].Value.dwValue = %d, bConnectionSucceeded = %s$Option[3]$Option[4]$Using aServerAccessSetting[%d] = %s$WPADLocation = %s, bConnectionSucceeded = %s$c:\rhub2\code\hlib\hlib.cpp$empty after auto URL$empty after auto detect
                                                          • API String ID: 3734629825-2834147483
                                                          • Opcode ID: 1fedd52476e8e767139d47ebb0d7ae23e2373239ea0e0736f208c1da0dc96d2c
                                                          • Instruction ID: 645ae903de2b2f417ff343e11e937008bd4efdaf2ac4a6155ff515ef2cc11595
                                                          • Opcode Fuzzy Hash: 1fedd52476e8e767139d47ebb0d7ae23e2373239ea0e0736f208c1da0dc96d2c
                                                          • Instruction Fuzzy Hash: 0B82EFB1A00259AFDF25DB24CC89B9ABBB5AB01304F04A0D8E54D7B2D2C7715EC9CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • FindWindowW.USER32(TurboMeetingMainWindowClass,00000000), ref: 00E0DDB7
                                                          • PostMessageW.USER32(00000000,000013A0,00000000,00000000), ref: 00E0DDC7
                                                            • Part of subcall function 00E14F80: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00E15040
                                                            • Part of subcall function 00E14F80: GetLastError.KERNEL32 ref: 00E15052
                                                          • FindWindowW.USER32(TurboMeetingMainWindowClass,00000000), ref: 00E0DDDB
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,00000000), ref: 00E0DDDF
                                                          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E0DE2A
                                                          • FindWindowW.USER32(TurboMeetingMainWindowClass,00000000), ref: 00E0DE37
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E0DE49
                                                          • PostMessageW.USER32(00000000,000013A0,00000000,00000000), ref: 00E0DE83
                                                          • WSAGetLastError.WS2_32 ref: 00E0DE89
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E0DEB9
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,00000000), ref: 00E0DF03
                                                          • WSAGetLastError.WS2_32 ref: 00E0DF55
                                                            • Part of subcall function 00E14F80: Process32FirstW.KERNEL32(00000000,?), ref: 00E15080
                                                            • Part of subcall function 00E14F80: CloseHandle.KERNEL32(00000000), ref: 00E1508A
                                                            • Part of subcall function 00E14F80: GetLastError.KERNEL32 ref: 00E15090
                                                            • Part of subcall function 00E14F80: GetCurrentThread.KERNEL32 ref: 00E150F2
                                                            • Part of subcall function 00E14F80: OpenThreadToken.ADVAPI32(00000000), ref: 00E150F9
                                                            • Part of subcall function 00E14F80: GetLastError.KERNEL32 ref: 00E1510D
                                                            • Part of subcall function 00E14F80: ImpersonateSelf.KERNELBASE(00000002), ref: 00E15118
                                                            • Part of subcall function 00E14F80: GetLastError.KERNEL32 ref: 00E15122
                                                            • Part of subcall function 00E14F80: LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00E151BE
                                                            • Part of subcall function 00E14F80: AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 00E15209
                                                            • Part of subcall function 00E14F80: OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00E1523A
                                                            • Part of subcall function 00E14F80: OpenProcess.KERNEL32(00000411,00000000,?), ref: 00E15252
                                                          • WSAGetLastError.WS2_32 ref: 00E0DFA7
                                                            • Part of subcall function 00E14F80: GetCurrentThread.KERNEL32 ref: 00E15145
                                                            • Part of subcall function 00E14F80: OpenThreadToken.ADVAPI32(00000000), ref: 00E1514C
                                                            • Part of subcall function 00E14F80: GetLastError.KERNEL32 ref: 00E15156
                                                            • Part of subcall function 00E14F80: _strstr.LIBCMT ref: 00E152F2
                                                            • Part of subcall function 00E14F80: TerminateProcess.KERNEL32(00000000,00000000), ref: 00E15301
                                                            • Part of subcall function 00E14F80: CloseHandle.KERNEL32(00000000), ref: 00E15308
                                                            • Part of subcall function 00E14F80: Process32NextW.KERNEL32(?,0000022C), ref: 00E15331
                                                            • Part of subcall function 00E14F80: CloseHandle.KERNEL32(?), ref: 00E15365
                                                          • WSAGetLastError.WS2_32 ref: 00E0DFF9
                                                            • Part of subcall function 00E13A80: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00E13AB9
                                                            • Part of subcall function 00E13A80: Process32FirstW.KERNEL32(00000000,00000002), ref: 00E13AD3
                                                            • Part of subcall function 00E13A80: Process32NextW.KERNEL32(00000000,?), ref: 00E13B07
                                                            • Part of subcall function 00E13A80: CloseHandle.KERNEL32(00000000,00000002,00000000,?,00000000,75C95D50), ref: 00E13B15
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CloseHandleOpenProcess32Thread$FindProcessTokenWindow$CreateCriticalCurrentFirstMessageNextPostSectionSnapshotToolhelp32$AdjustEnterImpersonateLeaveLookupPrivilegePrivilegesSelfSleepTerminateValue_strstr
                                                          • String ID: "%s.ex"$"%s.exe"$1error code: %d, error: %s$2Failed to close TurboMeetingMainWindowClass, error code: %d, error: %s$2error code: %d, error: %s$3Failed to close TurboMeetingMainWindowClass, error code: %d, error: %s$3error code: %d, error: %s$4Failed to close TurboMeetingMainWindowClass, error code: %d, error: %s$Enter ...$Failed to close TurboMeetingMainWindowClass, error code: %d, error: %s$Has stopped %s.exe and %s.exe, error code: %d, error: %s$SetupHandler::StopProcess$SetupHandler:StopProcess()$TMInstaller$TMService.exe$TurboMeeting$TurboMeetingMainWindowClass$bServiceModeRunning is false$bServiceModeRunning is true$c:\rhub2\code\setuphandler\setuphandler.cpp
                                                          • API String ID: 1275666833-3803541513
                                                          • Opcode ID: 32df0453fa3bdfb664982c1a08c7c67b45698a32d1ca7c08e43e6b768fc2d9ef
                                                          • Instruction ID: 82f29e7ff9ed206c4975bf6b9b6336e1d4833665c5e17e6e0c7e38b5212fcaa4
                                                          • Opcode Fuzzy Hash: 32df0453fa3bdfb664982c1a08c7c67b45698a32d1ca7c08e43e6b768fc2d9ef
                                                          • Instruction Fuzzy Hash: 245176717C03147EE62077619C4BF6F259DDB1DB44F10A4A0FA0CBA2D3EAE06D858669
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1934 e09040-e090a6 call e44260 call e0eee0 1939 e090a8-e090d5 call e0eee0 call e0c770 1934->1939 1940 e090da-e091e1 call e1d9bf call e07cd0 call e01596 call e715f0 call e01d51 call e07cd0 call e0eee0 call e72e40 1934->1940 1949 e098cc-e098e7 call e44138 1939->1949 1963 e091e3-e09217 call e47160 call e13080 1940->1963 1964 e09246-e0924e 1940->1964 1979 e09219-e0922d call e4f79e 1963->1979 1980 e0922f-e0923d call e4f79e 1963->1980 1965 e09400-e0945c call e0eee0 call e1d9bf call e07cd0 call e01596 1964->1965 1966 e09254-e0925a 1964->1966 2000 e09466-e09477 1965->2000 1968 e0925c-e0926b 1966->1968 1969 e0926d-e09277 1966->1969 1972 e0927c-e092ad call e72e40 1968->1972 1969->1972 1983 e09303-e09305 1972->1983 1984 e092af-e092ea call e47160 call e13080 1972->1984 1992 e09243 1979->1992 1980->1992 1983->1965 1988 e0930b-e09314 1983->1988 2008 e092f2-e092fd call e4f79e 1984->2008 2009 e092ec 1984->2009 1993 e0931a-e09356 call e72e40 1988->1993 1994 e093ac-e093ae 1988->1994 1992->1964 1993->1994 2007 e09358-e09393 call e47160 call e13080 1993->2007 1994->1965 1997 e093b0-e093fb call e0eee0 call e014f2 call e71650 1994->1997 1997->1949 2004 e09479-e09486 2000->2004 2005 e0949d-e094b9 2000->2005 2011 e09488 2004->2011 2012 e0948e-e0949b 2004->2012 2014 e094bf-e094e2 call e07cd0 2005->2014 2027 e09395 2007->2027 2028 e0939b-e093a6 call e4f79e 2007->2028 2008->1983 2009->2008 2011->2012 2012->2014 2024 e094e5-e094f1 2014->2024 2024->2024 2026 e094f3-e09589 call e0e580 call e12fc0 Sleep call e54c8c 2024->2026 2037 e09744-e0979a call e12fc0 call e44290 call e1d9bf call e0e3b0 2026->2037 2038 e0958f 2026->2038 2027->2028 2028->1994 2060 e097a0-e0980d call e0e3b0 call e0eee0 call e07cd0 Sleep call e1d982 2037->2060 2061 e09838-e098ad call e0e3b0 call e0eee0 call e44290 call e07cd0 call e01596 call e0c770 2037->2061 2040 e09590-e095c2 call e0e3b0 2038->2040 2046 e095c8-e09623 call e12fc0 call e44290 * 2 2040->2046 2047 e0966d-e096cb call e1d9bf call e07cd0 call e01596 Sleep call e54c8c 2040->2047 2070 e09625-e09641 2046->2070 2071 e09647-e09663 2046->2071 2072 e096d0-e096e2 2047->2072 2102 e09827-e09833 2060->2102 2103 e0980f-e09822 call e0e330 2060->2103 2104 e098b2-e098ca call e014f2 call e71650 2061->2104 2070->2071 2071->2047 2075 e09702-e09714 2072->2075 2076 e096e4 2072->2076 2081 e098e8-e09914 call e0eee0 call e4ff23 2075->2081 2082 e0971a-e0973b call e0eee0 2075->2082 2079 e096e6-e096eb 2076->2079 2080 e096ed-e096fa 2076->2080 2079->2075 2079->2080 2080->2040 2086 e09700 2080->2086 2091 e0973e 2082->2091 2086->2091 2091->2037 2102->2000 2103->2000 2104->1949
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$ActiveAttributesCreateDirectoryEnterFileLeaveMessageWindow
                                                          • String ID: %d,%d,%d$%s?client_type=%d&client=%s$%s?client_type=%d&xml_format=Y&client=%s$/as/wapi/auto_download$/as/wapi/get_client$/as/wapi/get_client_size$</__ClientSize__>$<__ClientSize__>$Connecting ...$Download experiences timeout$Download has exchaused manay failed tries: iNumberOfTry = %d. Now exits$Download is completed: iExpectedDownloadSize = %d, actual received = %d$Download is incomplete. Please try it again$Download is not needed$Downloading %s ...$Failed to download client from: %s:%d, iDownloadSize = %d, sDownloadSize = %s$Filed to complete download: iExpectedDownloadSize = %d, actual received = %d$In Download: m_sClientDirectory = %s$Setup %s ...Summary - average speed: %d kbps, total time: %d seconds$SetupHandler::Download$c:\rhub2\code\setuphandler\setuphandler.cpp$iDownloadSize = %d$sTempURL = %s
                                                          • API String ID: 272441001-948411225
                                                          • Opcode ID: 9d538a29006b2c905ccee900795ed6cdc30de5c28e3b0549bbbf2f26181774c2
                                                          • Instruction ID: 7bf75ead49e523272ac4b220a17d175d209ec671a98f6a1dabb89e255a9142fa
                                                          • Opcode Fuzzy Hash: 9d538a29006b2c905ccee900795ed6cdc30de5c28e3b0549bbbf2f26181774c2
                                                          • Instruction Fuzzy Hash: 7322BF71B41218ABDB24DF64CC86FE9B7B8AF09704F0051A9F50DB76C2D7B06A848F91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(00EA97FC,00EB2C08,?,00EB2C08), ref: 00E16E41
                                                          • CreateMutexW.KERNEL32(00000000,00000000,?), ref: 00E16E67
                                                          • WaitForSingleObject.KERNEL32(00000000,00001388), ref: 00E16E79
                                                          • WSAGetLastError.WS2_32 ref: 00E16E83
                                                          • ReleaseMutex.KERNEL32(00000000), ref: 00E16ED2
                                                          • LeaveCriticalSection.KERNEL32(00EA97FC), ref: 00E16EDD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalMutexSection$CreateEnterErrorLastLeaveObjectReleaseSingleWait
                                                          • String ID: </__CACHE__>$</__Configure__>$MyConfigure::WriteConfigure$TMCacheFileMutex$c:\rhub2\code\utility\myconfigure.cpp$failed to WaitForSingleObject(CACHE_FILE_MUTEX) error code: %d, error: %s$failed to open %s$failed to open %s for writing
                                                          • API String ID: 239197533-1363001921
                                                          • Opcode ID: 661e475ba5cac80e78267845e16357a17dbb72af1893eb39d91336f155c856d8
                                                          • Instruction ID: b250f68e807d587c63d83246574aad0e1c1796e70319723bd59793c5844869d6
                                                          • Opcode Fuzzy Hash: 661e475ba5cac80e78267845e16357a17dbb72af1893eb39d91336f155c856d8
                                                          • Instruction Fuzzy Hash: A9613971644300BFD720AF60DC46FAF37E8AF59B05F042428F94CB6293D7B599898762
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2184 e0e8e0-e0e925 2185 e0e927-e0e92b 2184->2185 2186 e0e947-e0e949 2185->2186 2187 e0e92d-e0e92f 2185->2187 2190 e0e94c-e0e94e 2186->2190 2188 e0e931-e0e937 2187->2188 2189 e0e943-e0e945 2187->2189 2188->2186 2191 e0e939-e0e941 2188->2191 2189->2190 2192 e0e950-e0e961 2190->2192 2193 e0e963-e0e966 2190->2193 2191->2185 2191->2189 2194 e0e98e-e0e99d 2192->2194 2193->2194 2195 e0e968-e0e989 GetTempPathW call e0ee50 2193->2195 2197 e0e9a0-e0e9a4 2194->2197 2195->2194 2198 e0e9c0-e0e9c2 2197->2198 2199 e0e9a6-e0e9a8 2197->2199 2202 e0e9c5-e0e9cd 2198->2202 2200 e0e9aa-e0e9b0 2199->2200 2201 e0e9bc-e0e9be 2199->2201 2200->2198 2203 e0e9b2-e0e9ba 2200->2203 2201->2202 2204 e0ea4a-e0ea4d 2202->2204 2205 e0e9cf-e0ea1a call e07cd0 * 3 2202->2205 2203->2197 2203->2201 2206 e0ea93-e0eaaf call e07cd0 2204->2206 2207 e0ea4f-e0ea91 call e07cd0 * 3 2204->2207 2224 e0ea20-e0ea2b 2205->2224 2217 e0eab1-e0eabe 2206->2217 2229 e0eae1-e0eaea 2207->2229 2217->2217 2218 e0eac0-e0eade call e07cd0 * 2 2217->2218 2218->2229 2224->2224 2227 e0ea2d-e0ea45 call e07cd0 2224->2227 2235 e0eb15-e0ebb0 call e07cd0 call e0eec0 * 5 GetFileAttributesW 2227->2235 2232 e0eaf0-e0eafb 2229->2232 2232->2232 2234 e0eafd-e0eb10 call e07cd0 2232->2234 2234->2235 2250 e0ebb2-e0ebc2 CopyFileW 2235->2250 2251 e0ebc8-e0ebd8 GetFileAttributesW 2235->2251 2250->2251 2252 e0ebf0-e0ec0c call e4fa5e 2251->2252 2253 e0ebda-e0ebea CopyFileW 2251->2253 2256 e0ec88-e0ec89 call e4f88c 2252->2256 2257 e0ec0e-e0ec40 WSAGetLastError call e70f20 call e07cd0 2252->2257 2253->2252 2260 e0ec8e-e0ec91 2256->2260 2263 e0ec93-e0ecae call e44138 2257->2263 2260->2263
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000200,?,904898A6,?,?,00000000), ref: 00E0E974
                                                          • GetFileAttributesW.KERNEL32(004C049C,004BFE9C,004C109C,00000200,004BFC9C,004C0C9C,00000200,004BF050,004C089C,00000200,004BEE50,004C049C,00000200,004BEC50,004C009C,00000200), ref: 00E0EBA7
                                                          • CopyFileW.KERNEL32(004C049C,004C089C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,904898A6), ref: 00E0EBC2
                                                          • GetFileAttributesW.KERNEL32(004C009C,?,?,?,?,?,?,?,?,?,?,?,?,904898A6), ref: 00E0EBCF
                                                          • CopyFileW.KERNEL32(004C009C,004C049C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,904898A6), ref: 00E0EBEA
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,904898A6), ref: 00E0EC18
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCopy$ErrorLastPathTemp
                                                          • String ID: %s%s$%s%s.bak$%s%s.bak.bak$%s%s.txt$%s.bak$%s.bak.bak$%sClientMemoryLog.bak$%sClientMemoryLog.txt$%sServerMemoryLog.bak$%sServerMemoryLog.txt$C:\Users\user~1\AppData\Local\Temp\TMSetup.txt$RunServerLog$Server$failed to create log file %s in MyLog::GetWorkingDirectory(), %d$rsp1024h
                                                          • API String ID: 523701895-2386378874
                                                          • Opcode ID: e156fdbf5ac3d35a003c117d35492cad9fbec0f6a88f9a9001a9f3beb6711c83
                                                          • Instruction ID: 795bbfff1a9ed57784a782c5f0510df9a94ef96f7263a576f36d9baae045184c
                                                          • Opcode Fuzzy Hash: e156fdbf5ac3d35a003c117d35492cad9fbec0f6a88f9a9001a9f3beb6711c83
                                                          • Instruction Fuzzy Hash: CC9105756003446AE7209B708C46FE7BBEDEF89704F0858A9F59AF73C2E631B5448761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00E01D16: _Deallocate.LIBCONCRT ref: 00E01D25
                                                          • _strstr.LIBCMT ref: 00E14BDC
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 00E14CC5
                                                          • GetLastError.KERNEL32(?), ref: 00E14D01
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • GetLastError.KERNEL32 ref: 00E14DB3
                                                          • ShellExecuteW.SHELL32(00000000,open,?,?,?,00000000), ref: 00E14EB0
                                                          • GetLastError.KERNEL32 ref: 00E14EBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CriticalSection$ByteCharCreateDeallocateEnterExecuteLeaveMultiProcessShellWide_strstr
                                                          • String ID: .exe$ShellExecute(): iHinstance = %d, iErrorCode = %d, Error = %s, sExecutable = %s, sParameter = %s$TurboMeeting$UTF8ToUTF16 is OK$Utility::StartProcess$c:\rhub2\code\utility\utility.cpp$iErrorCode = %d, Error = %s$open$sCommandLine = %s$sCommandLine = %s, sWorkingDirectory = %s$succeeded.
                                                          • API String ID: 2865379995-3469969007
                                                          • Opcode ID: 27f52485ec42877b9ad0210ed75d680f73fb5ed50877c47a619d5d97b8787682
                                                          • Instruction ID: f4fa1f20718030b5ce947990b605b5f882bfdaa2f1d620c0776b86688ce60af5
                                                          • Opcode Fuzzy Hash: 27f52485ec42877b9ad0210ed75d680f73fb5ed50877c47a619d5d97b8787682
                                                          • Instruction Fuzzy Hash: 97D171B1A40758AADB20DB20CC46FEF76B8AF08705F0455D5F54CB62D2DBB46AC88F94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2349 e1ff53-e1ff77 call e2ab5a 2352 e1ff84-e1ff8a 2349->2352 2353 e1ff79-e1ff82 2349->2353 2355 e1ff97-e1ff9c GetWindow 2352->2355 2356 e1ff8c-e1ff95 GetParent 2352->2356 2354 e1ffc2-e1fffb GetWindowRect 2353->2354 2358 e20001-e20003 2354->2358 2359 e2008a-e200b3 GetParent GetClientRect * 2 MapWindowPoints 2354->2359 2357 e1ffa2-e1ffa8 2355->2357 2356->2357 2357->2354 2361 e1ffaa-e1ffbe SendMessageW 2357->2361 2362 e20020-e20029 2358->2362 2363 e20005-e2001e GetWindowLongW 2358->2363 2360 e200b9-e200fb 2359->2360 2364 e20106-e20109 2360->2364 2365 e200fd-e20103 2360->2365 2361->2354 2366 e1ffc0 2361->2366 2367 e2005b-e20074 GetWindowRect MonitorFromWindow GetMonitorInfoW 2362->2367 2368 e2002b-e20032 call e1f182 2362->2368 2363->2362 2370 e2010b 2364->2370 2371 e2010e-e20116 2364->2371 2365->2364 2366->2354 2369 e2007a-e20088 CopyRect 2367->2369 2378 e20037-e20059 MonitorFromWindow GetMonitorInfoW CopyRect 2368->2378 2379 e20034 2368->2379 2369->2360 2370->2371 2373 e20121-e20124 2371->2373 2374 e20118-e2011e 2371->2374 2376 e20126 2373->2376 2377 e20129-e20136 call e2b0a3 2373->2377 2374->2373 2376->2377 2381 e2013b-e20149 call e44138 2377->2381 2378->2369 2379->2378
                                                          APIs
                                                            • Part of subcall function 00E2AB5A: GetWindowLongW.USER32(?,000000F0), ref: 00E2AB67
                                                          • GetParent.USER32(00000000), ref: 00E1FF8F
                                                          • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 00E1FFB4
                                                          • GetWindowRect.USER32(00000000,00000000), ref: 00E1FFD9
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E20008
                                                          • MonitorFromWindow.USER32(00000000,00000001), ref: 00E2003E
                                                          • GetMonitorInfoW.USER32(00000000), ref: 00E20045
                                                          • CopyRect.USER32(?,?), ref: 00E20053
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E20060
                                                          • MonitorFromWindow.USER32(00000000,00000002), ref: 00E2006D
                                                          • GetMonitorInfoW.USER32(00000000), ref: 00E20074
                                                          • CopyRect.USER32(?,?), ref: 00E20082
                                                          • GetParent.USER32(00000000), ref: 00E2008D
                                                          • GetClientRect.USER32(00000000,?), ref: 00E2009A
                                                          • GetClientRect.USER32(00000000,?), ref: 00E200A5
                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00E200B3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Rect$Monitor$ClientCopyFromInfoLongParent$MessagePointsSend
                                                          • String ID: ($<:
                                                          • API String ID: 3610148278-1920419900
                                                          • Opcode ID: 352fffc4f04617703235f6d4e02a7ce5b4714a114bcd5b28ff9a55b52d9ebbdc
                                                          • Instruction ID: aaa61ab860443f8751f5d19a6b7ea1efadda25416a7d258b245f76501de62abc
                                                          • Opcode Fuzzy Hash: 352fffc4f04617703235f6d4e02a7ce5b4714a114bcd5b28ff9a55b52d9ebbdc
                                                          • Instruction Fuzzy Hash: A3616B72A00229AFDB01CFA8DD88BEEBBB9FF48315F150125E905F7291D734A945CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E235A8
                                                            • Part of subcall function 00E2D29E: __EH_prolog3.LIBCMT ref: 00E2D2A5
                                                          • CallNextHookEx.USER32(?,?,?,?), ref: 00E235E6
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E23686
                                                          • GetWindowLongW.USER32(?,000000FC), ref: 00E236C5
                                                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 00E236DB
                                                          • SetPropW.USER32(?,AfxOldWndProc423,00000000), ref: 00E236F0
                                                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 00E236FC
                                                          • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 00E2370F
                                                          • SetWindowLongW.USER32(?,000000FC,Function_00023437), ref: 00E2371D
                                                          • CallNextHookEx.USER32(?,00000003,?,?), ref: 00E237A6
                                                          • UnhookWindowsHookEx.USER32(?), ref: 00E237BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: HookProp$CallLongNextWindow$AtomClassGlobalH_prolog3H_prolog3_NameUnhookWindows
                                                          • String ID: #32768$AfxOldWndProc423
                                                          • API String ID: 3603175632-2141921550
                                                          • Opcode ID: e72a6651afec260fb8c1216c464b70c07873803b9339f07b344a8c0740835e2a
                                                          • Instruction ID: 7233ee6585d8489fdc2b1a87e1e30d501144e3ebfcff366d405af8b4298c599d
                                                          • Opcode Fuzzy Hash: e72a6651afec260fb8c1216c464b70c07873803b9339f07b344a8c0740835e2a
                                                          • Instruction Fuzzy Hash: 2E51B275940228AFCF21AF61EC8DBAA3B74BF54715F101195F819B72A2DB348E85CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(00EA97FC,00000000,00E7B918,?,00000000), ref: 00E16C83
                                                          • CreateMutexW.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 00E16CA9
                                                          • WaitForSingleObject.KERNEL32(00000000,00001388,?,?,00000000), ref: 00E16CB7
                                                          • WSAGetLastError.WS2_32(?,?,00000000), ref: 00E16CC1
                                                          • ReleaseMutex.KERNEL32(00000000,?,?,?,?,00000000), ref: 00E16D0D
                                                          • LeaveCriticalSection.KERNEL32(00EA97FC,?,?,?,?,00000000), ref: 00E16D18
                                                          • __fread_nolock.LIBCMT ref: 00E16D6A
                                                            • Part of subcall function 00E13080: _strstr.LIBCMT ref: 00E130AD
                                                            • Part of subcall function 00E13080: _strstr.LIBCMT ref: 00E130BD
                                                          • ReleaseMutex.KERNEL32(00000000), ref: 00E16D9B
                                                          • LeaveCriticalSection.KERNEL32(00EA97FC), ref: 00E16DA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalMutexSection$LeaveRelease_strstr$CreateEnterErrorLastObjectSingleWait__fread_nolock
                                                          • String ID: MyConfigure::ReadConfigure$TMCacheFileMutex$c:\rhub2\code\utility\myconfigure.cpp$failed to WaitForSingleObject(CACHE_FILE_MUTEX) error code: %d, error: %s$failed to open %s
                                                          • API String ID: 3965872043-1612011626
                                                          • Opcode ID: 0e054e2b5acaa14b0daf09188819fca3b54d9f4780e7e10c90b1009bbf02a8d6
                                                          • Instruction ID: 25a28d3035cd5986cc017344f36e6661578618ea66fd170ca5634b6a117028b7
                                                          • Opcode Fuzzy Hash: 0e054e2b5acaa14b0daf09188819fca3b54d9f4780e7e10c90b1009bbf02a8d6
                                                          • Instruction Fuzzy Hash: ED41A5B1644300BFD710EB60AC82FAF77E8EF5A701F045429FA4CF6292D6B194898767
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5673C: CreateFileW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00E56759
                                                          • GetLastError.KERNEL32 ref: 00E56B82
                                                          • __dosmaperr.LIBCMT ref: 00E56B89
                                                          • GetFileType.KERNEL32(00000000), ref: 00E56B95
                                                          • GetLastError.KERNEL32 ref: 00E56B9F
                                                          • __dosmaperr.LIBCMT ref: 00E56BA8
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E56BC8
                                                          • CloseHandle.KERNEL32(?), ref: 00E56D12
                                                          • GetLastError.KERNEL32 ref: 00E56D44
                                                          • __dosmaperr.LIBCMT ref: 00E56D4B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 366870a08e759327ae273939fed507c38e0c336ff7dd09fb9095686aab409466
                                                          • Instruction ID: 1cee45edb384ebbabea4b66743b8327af6febde47176879bdf50e64beac2b2d6
                                                          • Opcode Fuzzy Hash: 366870a08e759327ae273939fed507c38e0c336ff7dd09fb9095686aab409466
                                                          • Instruction Fuzzy Hash: BCA12432A001449FCF19EF68D8457AE7BE0EB46325F141659EC11FB392DB319D1ACB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          • Line: , xrefs: 00E0F25F
                                                          • failed to create log file %s in MyLog::GetWorkingDirectory(), xrefs: 00E0EF66
                                                          • Message: , xrefs: 00E0F2E6
                                                          • failed to create log file %s in MyLog::GetWorkingDirectory(), %d, xrefs: 00E0F498
                                                          • Function: , xrefs: 00E0F0D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave
                                                          • String ID: Function: $Line: $Message: $failed to create log file %s in MyLog::GetWorkingDirectory()$failed to create log file %s in MyLog::GetWorkingDirectory(), %d
                                                          • API String ID: 3168844106-992174833
                                                          • Opcode ID: b0193f7ea514c6b98491f346255dd6c82e375800393c81a44dcd98f39e2fae3c
                                                          • Instruction ID: dde7bd254df423191ef004f4cca19f49b8528072aa2c61d186ff581247208d4d
                                                          • Opcode Fuzzy Hash: b0193f7ea514c6b98491f346255dd6c82e375800393c81a44dcd98f39e2fae3c
                                                          • Instruction Fuzzy Hash: 250201B19002088FDB25DB24CC84BDEB7B9EF45304F0096E8E519BB292D775AAD88B55
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 00E2343E
                                                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 00E23455
                                                          • CallWindowProcW.USER32(?,?,00000110,?,?), ref: 00E234B9
                                                            • Part of subcall function 00E239A1: GetWindowRect.USER32(?,?), ref: 00E239E2
                                                            • Part of subcall function 00E239A1: GetWindow.USER32(?,00000004), ref: 00E239FF
                                                          • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00E234D9
                                                          • RemovePropW.USER32(?,AfxOldWndProc423), ref: 00E234E6
                                                          • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 00E234ED
                                                          • GlobalDeleteAtom.KERNEL32(?), ref: 00E234F7
                                                            • Part of subcall function 00E23A4C: GetWindowRect.USER32(?,00000360), ref: 00E23A59
                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 00E2354E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prolog3_catch_LongRemove
                                                          • String ID: AfxOldWndProc423
                                                          • API String ID: 3351853316-1060338832
                                                          • Opcode ID: ace630ec3c8654fa4ce6a7f2f8dd9bf0916e356e8951b776ca3a87ced2d1732b
                                                          • Instruction ID: 887f61b3ad0c5d795ae0cf215825ed362d5fbf11cf1e4b12342a055b3a0aa968
                                                          • Opcode Fuzzy Hash: ace630ec3c8654fa4ce6a7f2f8dd9bf0916e356e8951b776ca3a87ced2d1732b
                                                          • Instruction Fuzzy Hash: C9315271900228AFDF05EFB5EC498BEBBB9BF48710B006519F51AB2152DA398E449F60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 00E0249F
                                                          • SendMessageW.USER32(?,00000080,00000000,?), ref: 00E024AD
                                                          • GetDC.USER32(?), ref: 00E024B2
                                                          • GetDeviceCaps.GDI32(?,00000058), ref: 00E024C9
                                                          • ReleaseDC.USER32(?,?), ref: 00E024EC
                                                          • GetWindowRect.USER32(?,?), ref: 00E02514
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E02569
                                                          • KiUserCallbackDispatcher.NTDLL(00EAF330,00000000,00000000,00000000,00000000,00000053,00EAF430,00000000,00000000,00000000,00000000,00000053), ref: 00E0258F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CallbackCapsDeviceDispatcherRectReleaseUserWindow
                                                          • String ID: PCSetup
                                                          • API String ID: 682895369-361480226
                                                          • Opcode ID: 1d1c4af1dbd13d6ea06dbb11d680652bc8a2f931cbf778804b0547775d9861ef
                                                          • Instruction ID: bd209fdc125f48a3417f9633391c26e04b0f910a2342609255e23b3baf47eba0
                                                          • Opcode Fuzzy Hash: 1d1c4af1dbd13d6ea06dbb11d680652bc8a2f931cbf778804b0547775d9861ef
                                                          • Instruction Fuzzy Hash: D031F1313016217BDA266771DC4AFEFBE6ABF4A750F005214B20D760E2CFA06896D7D0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(0000001C,?,?,00000000), ref: 00E2CFA3
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,00000000), ref: 00E2CFFE
                                                          • GlobalHandle.KERNEL32(00000010), ref: 00E2D008
                                                          • GlobalUnlock.KERNEL32(00000000,?,?,00000000), ref: 00E2D011
                                                          • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 00E2D02B
                                                          • GlobalLock.KERNEL32(00000000,?,?,00000000), ref: 00E2D036
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 00E2D080
                                                          • GlobalHandle.KERNEL32(00000010), ref: 00E2D094
                                                          • GlobalLock.KERNEL32(00000000,?,?,00000000), ref: 00E2D09B
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 00E2D0A5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                          • String ID:
                                                          • API String ID: 2667261700-0
                                                          • Opcode ID: fd1397aeb6edb3efe9766c22829964390aa7318cb182e967f8b154ef4e18429b
                                                          • Instruction ID: 80c7bee6b6aa25389a45af586ac0bbb26b584e9c0f9b2c79d55007f506fafd87
                                                          • Opcode Fuzzy Hash: fd1397aeb6edb3efe9766c22829964390aa7318cb182e967f8b154ef4e18429b
                                                          • Instruction Fuzzy Hash: D741F271600324AFDB24DF64EC89F9977FAEF44304F104469E446E72A1DB70AD89CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E03056
                                                            • Part of subcall function 00E297CE: __EH_prolog3.LIBCMT ref: 00E297D5
                                                            • Part of subcall function 00E297CE: BeginPaint.USER32(?,?,00000004,00E02671,?,00000088), ref: 00E29801
                                                          • GetWindowRect.USER32(?,?), ref: 00E03080
                                                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 00E030A0
                                                          • GetClientRect.USER32(?,?), ref: 00E030A9
                                                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 00E030C3
                                                            • Part of subcall function 00E2C0A5: SetBkColor.GDI32(00000000,?), ref: 00E2C0C1
                                                            • Part of subcall function 00E2C0A5: ExtTextOutW.GDI32(00000000,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 00E2C0D6
                                                            • Part of subcall function 00E2AB5A: GetWindowLongW.USER32(?,000000F0), ref: 00E2AB67
                                                          • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00E03125
                                                          • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00E03184
                                                            • Part of subcall function 00E2C256: SendMessageW.USER32(?,00000407,00000000,?), ref: 00E2C269
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Rect$MessageSend$Window$BeginClientColorH_prolog3H_prolog3_LongPaintText
                                                          • String ID: 06@
                                                          • API String ID: 2614379232-619375719
                                                          • Opcode ID: 8d02aeebae9b0410085271c1eaf82fdd3531c9591b4a4f0646d61fd7bdc0a7f8
                                                          • Instruction ID: 5c5afba05db0dedbaea330b9f19d5211735ffa207daa05bda72e71279831408a
                                                          • Opcode Fuzzy Hash: 8d02aeebae9b0410085271c1eaf82fdd3531c9591b4a4f0646d61fd7bdc0a7f8
                                                          • Instruction Fuzzy Hash: 5F41F972E00129AFDF14DFB4DD85EEEB7B9BF59300F105159E609F6192DA70AA84CB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryW.KERNEL32(Comctl32.dll,00000000,00000000,00000002,Comctl32.dll,00000040), ref: 00E1D947
                                                            • Part of subcall function 00E1D70D: GetProcAddress.KERNEL32(00000000,O), ref: 00E1D73B
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000105,?,00E24F6F,?,00E9AA90,00000010,00E1F325,?), ref: 00E1D861
                                                          • SetLastError.KERNEL32(0000006F,?,00E24F6F,?,00E9AA90,00000010,00E1F325,?), ref: 00E1D875
                                                          • GetLastError.KERNEL32(00000020), ref: 00E1D8CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$AddressFileLibraryLoadModuleNameProc
                                                          • String ID: $@$Comctl32.dll$GetModuleHandleExW
                                                          • API String ID: 3640817601-4183358198
                                                          • Opcode ID: 23bbc1de5c9d777e056f3a00c37efedae51e285d3fc654a67aa4ddc4cc45a958
                                                          • Instruction ID: 7cb3e074069b3a89bfe1332319442018512ee1a68d5817944d3088f82929f493
                                                          • Opcode Fuzzy Hash: 23bbc1de5c9d777e056f3a00c37efedae51e285d3fc654a67aa4ddc4cc45a958
                                                          • Instruction Fuzzy Hash: A341B471908314AAEF249B65DC89BED73B8EB89714F1412A7E518F21D0DBB49EC4CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2e0d2fa3ce26d103eb2240007e2bd711b6a0184f408eb11acaa38fd1e0738ed5
                                                          • Instruction ID: 0a153056c48343e0130351fe9713cf88de45db30549d35c6c84d57c1fabb5cae
                                                          • Opcode Fuzzy Hash: 2e0d2fa3ce26d103eb2240007e2bd711b6a0184f408eb11acaa38fd1e0738ed5
                                                          • Instruction Fuzzy Hash: 59B14570E442459FCB16DFA9E885BAEBBF0BF49344F181188E801BB392C7309D01CB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Delete_strstr$EnterLeaveValue___report_securityfailure
                                                          • String ID: https=$socks=
                                                          • API String ID: 1360646552-2412867611
                                                          • Opcode ID: 061407e054fae78ddc6365bc24bd678bd9d1ec7d38fa94ef98d13cb1e60f909d
                                                          • Instruction ID: 2f2920af2067cae2d9f27f0417941234bd59c1581b5da9d42083c5519aa18ea9
                                                          • Opcode Fuzzy Hash: 061407e054fae78ddc6365bc24bd678bd9d1ec7d38fa94ef98d13cb1e60f909d
                                                          • Instruction Fuzzy Hash: B1717DB1A40349ABDF11DF90DC05EEE7BBAEF55308F04A014FA19BB291D7329915DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E8A000), ref: 00E62662
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,W. Europe Standard Time,000000FF,00000000,0000003F,00000000,?,?), ref: 00E626DA
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,W. Europe Summer Time,000000FF,?,0000003F,00000000,?), ref: 00E62707
                                                          • _free.LIBCMT ref: 00E62650
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          • _free.LIBCMT ref: 00E6281C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                          • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                          • API String ID: 1286116820-690618308
                                                          • Opcode ID: 6dfbb2cdc69ea31b9f6f81e56f9d58a50a64ed3056bd4bd16cd8cab93853a235
                                                          • Instruction ID: 1120d307e592b37c8943d35f22381f4e2c18fa7e76ab30816eaef61ba2ac475d
                                                          • Opcode Fuzzy Hash: 6dfbb2cdc69ea31b9f6f81e56f9d58a50a64ed3056bd4bd16cd8cab93853a235
                                                          • Instruction Fuzzy Hash: F0513B71940609AFDB20DF75EC859AF77F8EF84390B10226EE654B3192DB30AE45DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(shell32.dll,00000000,00E1F2E7,?,?,?,?,00E2B4BF,000FC000,00000010,00000040,00E2B6C4,?,?,?), ref: 00E2FA59
                                                          • GetProcAddress.KERNEL32(00000000,InitNetworkAddressControl), ref: 00E2FA69
                                                          • EncodePointer.KERNEL32(00000000,?,?,?,?,00E2B4BF,000FC000,00000010,00000040,00E2B6C4,?,?,?,?,?,00E2B696), ref: 00E2FA72
                                                          • DecodePointer.KERNEL32(14DBB410,00000000,00E1F2E7,?,?,?,?,00E2B4BF,000FC000,00000010,00000040,00E2B6C4,?,?,?), ref: 00E2FA80
                                                          • InitNetworkAddressControl.SHELL32(?,?,?,?,00E2B4BF,000FC000,00000010,00000040,00E2B6C4,?,?,?,?,?,00E2B696,00000000), ref: 00E2FA94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressPointer$ControlDecodeEncodeHandleInitModuleNetworkProc
                                                          • String ID: InitNetworkAddressControl$shell32.dll
                                                          • API String ID: 3303222225-1950653938
                                                          • Opcode ID: f68eb1947f622e5c0f1bccc4a5263bb4d93d9f57ccd8b8c827e332a92033a79c
                                                          • Instruction ID: 32b7587574342028650edae284e72ba4ac045b79ed74c3cb58190d0e330b9b39
                                                          • Opcode Fuzzy Hash: f68eb1947f622e5c0f1bccc4a5263bb4d93d9f57ccd8b8c827e332a92033a79c
                                                          • Instruction Fuzzy Hash: 62E01271E01632AF9B20EBB2BD0CDA937B8EF157423051575FD0EF6265EB248C458790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E028C7
                                                          • __swprintf.LEGACY_STDIO_DEFINITIONS ref: 00E02A1E
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E02A4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3_MessageSend__swprintf
                                                          • String ID:
                                                          • API String ID: 1693283446-0
                                                          • Opcode ID: 8f98e0e01925c2cd98ebaea7b88a3d9fd21163424e5f6b0a6357c66ab2d72dd0
                                                          • Instruction ID: c90b10b99418a9a595d84054d7f90e1f319546b7b77d1f7130aa48e8c7759680
                                                          • Opcode Fuzzy Hash: 8f98e0e01925c2cd98ebaea7b88a3d9fd21163424e5f6b0a6357c66ab2d72dd0
                                                          • Instruction Fuzzy Hash: 7B616F71910228AAEB25EB74CC96FDEB7B9AF44300F1016E9E60977182DEB05EC5CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00E2E05F
                                                          • GetSystemMetrics.USER32(0000000C), ref: 00E2E06A
                                                          • GetSystemMetrics.USER32(00000002), ref: 00E2E075
                                                          • GetSystemMetrics.USER32(00000003), ref: 00E2E083
                                                          • GetDC.USER32(00000000), ref: 00E2E091
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E2E09C
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E2E0A8
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E2E0B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
                                                          • String ID:
                                                          • API String ID: 1031845853-0
                                                          • Opcode ID: 01c4b2bc4eb5d6fab6bd686315a2561b1d6283c043e8a42186d80b48ce083f53
                                                          • Instruction ID: e3f46cf6879c79fe4a919e45ada3f6da9871a248d9d995bbcb474ea9409d59fb
                                                          • Opcode Fuzzy Hash: 01c4b2bc4eb5d6fab6bd686315a2561b1d6283c043e8a42186d80b48ce083f53
                                                          • Instruction Fuzzy Hash: A9F0F9B1A40720AFE7119FF2BC0DB867B64FF49712F004525F70AEA191DBB584898FA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileType.KERNEL32(\O,?,00000000,00000000), ref: 00E55050
                                                          • GetFileInformationByHandle.KERNEL32(\O,?), ref: 00E550AA
                                                            • Part of subcall function 00E55361: __dosmaperr.LIBCMT ref: 00E553A4
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00E54F5C,?,000000FF,00000000), ref: 00E55139
                                                          • __dosmaperr.LIBCMT ref: 00E55140
                                                          • PeekNamedPipe.KERNEL32(\O,00000000,00000000,00000000,?,00000000), ref: 00E5517D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                          • String ID: \O
                                                          • API String ID: 1206951868-2357557095
                                                          • Opcode ID: 0d40c0482b9729b72419164c4bd48de0c0d5aa2966ed258f7ba4535edfdc087e
                                                          • Instruction ID: 46bcc3ab1ad1aae60c117f3e02e153a27fa64414aae43b0056ddc27313dba43b
                                                          • Opcode Fuzzy Hash: 0d40c0482b9729b72419164c4bd48de0c0d5aa2966ed258f7ba4535edfdc087e
                                                          • Instruction Fuzzy Hash: 47415E76901A04AFCB24DFB5DD55AAFBBF9EF88301B10591DF856E3610EB309844CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(?), ref: 00E22E41
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00E22E65
                                                          • UpdateWindow.USER32(?), ref: 00E22E7F
                                                          • SendMessageW.USER32(?,00000121,?,?), ref: 00E22EA2
                                                          • SendMessageW.USER32(?,0000036A,00000000,?), ref: 00E22EB9
                                                          • UpdateWindow.USER32(?), ref: 00E22F0A
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00E22F53
                                                            • Part of subcall function 00E2AB5A: GetWindowLongW.USER32(?,000000F0), ref: 00E2AB67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Message$Window$PeekSendUpdate$LongParent
                                                          • String ID:
                                                          • API String ID: 2853195852-0
                                                          • Opcode ID: 9f016db03184fb3e2f1ef736d75c28961223cf35c8cbfe26e1059a6de80c9219
                                                          • Instruction ID: d94465763f779731efb5892636860cdb5c57cab2e42cbf8b5a9a73e0ec015164
                                                          • Opcode Fuzzy Hash: 9f016db03184fb3e2f1ef736d75c28961223cf35c8cbfe26e1059a6de80c9219
                                                          • Instruction Fuzzy Hash: AB41A431B00225BBEB269FA5ED49BAD7BB4BF04718F15506CF605B61D1C7B0AD40EB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: api-ms-$ext-ms-
                                                          • API String ID: 0-537541572
                                                          • Opcode ID: 196223b5798cec548c631cf156c5345504eaac9d1ad4c97f98e4ce8acf9918cc
                                                          • Instruction ID: faa23287353f91e914fbc07278b43ae329f080a0fcf9de5b2740ab48cdb3728c
                                                          • Opcode Fuzzy Hash: 196223b5798cec548c631cf156c5345504eaac9d1ad4c97f98e4ce8acf9918cc
                                                          • Instruction Fuzzy Hash: C421EE31E09315EFCB319B259C40BAA3758DF41765F151E20FC1AB72A1D630DC08C6D2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E02661
                                                            • Part of subcall function 00E297CE: __EH_prolog3.LIBCMT ref: 00E297D5
                                                            • Part of subcall function 00E297CE: BeginPaint.USER32(?,?,00000004,00E02671,?,00000088), ref: 00E29801
                                                          • GetClientRect.USER32(?,?), ref: 00E02684
                                                          • CreateRoundRectRgn.GDI32(?,?,?,?,00000002,00000002), ref: 00E026BC
                                                          • CreateRoundRectRgn.GDI32(?,?,?,?,00000002,00000002), ref: 00E026DE
                                                            • Part of subcall function 00E29721: __EH_prolog3.LIBCMT ref: 00E29728
                                                            • Part of subcall function 00E29721: CreateSolidBrush.GDI32(?), ref: 00E29743
                                                          • FrameRgn.GDI32(?,?,?,00000001,00000001), ref: 00E02712
                                                          • FrameRgn.GDI32(?,?,?,00000001,00000001), ref: 00E02732
                                                            • Part of subcall function 00E29958: EndPaint.USER32(?,?,904898A6,?,?,00E75970,000000FF), ref: 00E2998A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateRect$FrameH_prolog3PaintRound$BeginBrushClientH_prolog3_Solid
                                                          • String ID:
                                                          • API String ID: 2703551133-0
                                                          • Opcode ID: 26f427f573bdfade5f884ca8be918927a2ca0e69604af12aed775f5a016ddfb6
                                                          • Instruction ID: 4f788a3d7c8f56e9e4ecec0230ec3459fa676d66dec59ab888bdbf9d5c3992d7
                                                          • Opcode Fuzzy Hash: 26f427f573bdfade5f884ca8be918927a2ca0e69604af12aed775f5a016ddfb6
                                                          • Instruction Fuzzy Hash: 5F31E470D00128AADF25EBA5DC46EEEBBB4FF54300F50909AE549B3292DB701E85DF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00000000,?), ref: 00E3F2AE
                                                          • PathFindExtensionW.SHLWAPI(?,?,00000000,?), ref: 00E3F2C8
                                                            • Part of subcall function 00E29071: __CxxThrowException@8.LIBVCRUNTIME ref: 00E29085
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Exception@8ExtensionFileFindModuleNamePathThrow
                                                          • String ID: .CHM$.HLP$.INI
                                                          • API String ID: 1938139466-4017452060
                                                          • Opcode ID: 7e12b13aa0289e8b9b479fc2de24471c9d8191dded5065d238fd082df85ad8b2
                                                          • Instruction ID: 714b1440c6ea7463ca61864b077fc7ff982e080d580b50a841206631cab9cbf2
                                                          • Opcode Fuzzy Hash: 7e12b13aa0289e8b9b479fc2de24471c9d8191dded5065d238fd082df85ad8b2
                                                          • Instruction Fuzzy Hash: FE4181B1A007199ADB20EB74CD49B9BB7ECAF44314F54687AE545F3682EF70D984CB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch.LIBCMT ref: 00E2B478
                                                          • GlobalLock.KERNEL32(00000000,?,?), ref: 00E2B57D
                                                          • DestroyWindow.USER32(?,?,?,?,00E2B2A3,00000000), ref: 00E2B64E
                                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,00E2B2A3,00000000), ref: 00E2B65B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00E2B662
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Global$DestroyFreeH_prolog3_catchLockUnlockWindow
                                                          • String ID:
                                                          • API String ID: 571947920-0
                                                          • Opcode ID: 9639383249bc9d28e012d7f0750ff528b0277437e727a75fdb67be2afc1a455a
                                                          • Instruction ID: 908a54b62d6f571632a73f30292cf6c63138eba245f0a652f4769d941dbe55fa
                                                          • Opcode Fuzzy Hash: 9639383249bc9d28e012d7f0750ff528b0277437e727a75fdb67be2afc1a455a
                                                          • Instruction Fuzzy Hash: D4517F31E00229DFCF15EFA4D885AEEBBB5BF08304F145159E911B72A2DB749E45CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • TlsFree.KERNEL32(?,904898A6,?,?,?,00E773AE,000000FF), ref: 00E2CE95
                                                          • GlobalHandle.KERNEL32(00000000), ref: 00E2CEA4
                                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,00E773AE,000000FF), ref: 00E2CEAD
                                                          • GlobalFree.KERNEL32(00000000), ref: 00E2CEB4
                                                          • DeleteCriticalSection.KERNEL32(?,904898A6,?,?,?,00E773AE,000000FF), ref: 00E2CEBE
                                                            • Part of subcall function 00E2D0B1: EnterCriticalSection.KERNEL32(?,00000001,00000000,00000010,?,?,00000000), ref: 00E2D12C
                                                            • Part of subcall function 00E2D0B1: LeaveCriticalSection.KERNEL32(?,?,?,?,00000000), ref: 00E2D13F
                                                            • Part of subcall function 00E2D0B1: LocalFree.KERNEL32(?,?,?,00000000), ref: 00E2D148
                                                            • Part of subcall function 00E2D0B1: TlsSetValue.KERNEL32(?,00000000,?,?,00000000), ref: 00E2D164
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                                                          • String ID:
                                                          • API String ID: 1549993015-0
                                                          • Opcode ID: 12f4f33ae25ebc26ba9f27ed5e1b50d69197867cad9f8b904877586771eeb4d3
                                                          • Instruction ID: 75651e8f37694f9c1d96c1de83f5fc92269ddca6f64a02e26651db0dc1b46b94
                                                          • Opcode Fuzzy Hash: 12f4f33ae25ebc26ba9f27ed5e1b50d69197867cad9f8b904877586771eeb4d3
                                                          • Instruction Fuzzy Hash: DE01CC31600616EFCB20DF25EC08B6ABBA8FF05724F110225F816A32A0CB30A855CA90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExW.KERNEL32(80000001,00E81920,00000000,00000001,00000000), ref: 00E26E83
                                                          • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000004), ref: 00E26EA4
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E26EE8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: g
                                                          • API String ID: 3677997916-3113042404
                                                          • Opcode ID: ec825e316a188a9402c789f237c8b1be3daf17d371d0e84144d9e25f44a3f803
                                                          • Instruction ID: 83acfd02b4cb492218d165598a8043397aeb3b5fda263c4c76bfc82a8dfbaf80
                                                          • Opcode Fuzzy Hash: ec825e316a188a9402c789f237c8b1be3daf17d371d0e84144d9e25f44a3f803
                                                          • Instruction Fuzzy Hash: F8215E76A10214FFEF10CF91DC85BAEB7B4FF1131AF119558E415B6080E7B4AA48CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00E13AB9
                                                          • Process32FirstW.KERNEL32(00000000,00000002), ref: 00E13AD3
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00E13B07
                                                          • CloseHandle.KERNEL32(00000000,00000002,00000000,?,00000000,75C95D50), ref: 00E13B15
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Process32$ByteCharCloseCreateFirstHandleMultiNextSnapshotToolhelp32Wide
                                                          • String ID:
                                                          • API String ID: 4013288513-0
                                                          • Opcode ID: e6cb993f169d0530de7c7f72b325021fcd1c7abcbebdacbc51f68b6469a3fc0e
                                                          • Instruction ID: bf989f1dfd7d81e560f18627b265b336b23af9048115f0bbc13b10c4921a7f31
                                                          • Opcode Fuzzy Hash: e6cb993f169d0530de7c7f72b325021fcd1c7abcbebdacbc51f68b6469a3fc0e
                                                          • Instruction Fuzzy Hash: 9E11CC712066016BD620FB30EC45FEFB7ED9F95354F445519F848A3283E6359A48C7A2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00E265AA
                                                          • PathFindExtensionW.SHLWAPI(?), ref: 00E265C0
                                                            • Part of subcall function 00E25F1E: __EH_prolog3_GS.LIBCMT ref: 00E25F28
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ExtensionFileFindH_prolog3_ModuleNamePath
                                                          • String ID: %Ts%Ts.dll
                                                          • API String ID: 3433622546-1896370695
                                                          • Opcode ID: a741856caa96f46ad79c550cf50c5771f4dd7d203d643a90ec1a6978e0445568
                                                          • Instruction ID: 201cfc2c6020064884a8e9dfb9753a147622107de0d0d88fc9576cbffdf01a2e
                                                          • Opcode Fuzzy Hash: a741856caa96f46ad79c550cf50c5771f4dd7d203d643a90ec1a6978e0445568
                                                          • Instruction Fuzzy Hash: 2C018671A00118ABDB11EBA4ED49AEF77FCEF09710F4105A6A505F7180EB70EA498B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,?,00E33278,00000000,?,00E32FEE,904898A6,00000000), ref: 00E3F21B
                                                          • SetErrorMode.KERNEL32(00000000,?,?,00000000,?,?,00000000,?,00E33278,00000000,?,00E32FEE,904898A6,00000000), ref: 00E3F227
                                                            • Part of subcall function 00E3F273: GetModuleFileNameW.KERNEL32(?,?,00000104,?,00000000,?), ref: 00E3F2AE
                                                            • Part of subcall function 00E3F273: PathFindExtensionW.SHLWAPI(?,?,00000000,?), ref: 00E3F2C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ExtensionFileFindModuleNamePath
                                                          • String ID: /
                                                          • API String ID: 1764437154-3878498614
                                                          • Opcode ID: 0f6b1c6484e43afb12cb9e24e86d88b2e142e4c279b1f918ee3b5a6e9a5ab973
                                                          • Instruction ID: 6cc1724e77c9237142919a8042277dce932681116d002e86d14b9145fc8764f6
                                                          • Opcode Fuzzy Hash: 0f6b1c6484e43afb12cb9e24e86d88b2e142e4c279b1f918ee3b5a6e9a5ab973
                                                          • Instruction Fuzzy Hash: C3F09A719157048FDB10FF69E80DB4A7FE8AF04314F019069F448AB2A3D731C892CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 94385a803544b6f4d2c7acc46b861d148ea30a69bf4c964601eaf25aae200948
                                                          • Instruction ID: 3753009a598c1aeaca1a5eebb05fb3e2a4002bb5458b3fb54289d914e2912fec
                                                          • Opcode Fuzzy Hash: 94385a803544b6f4d2c7acc46b861d148ea30a69bf4c964601eaf25aae200948
                                                          • Instruction Fuzzy Hash: 4E61D271E4022AAFDB21DFA8E845BEFB7B8FF49394F046551E401B7292D770AD008B61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00E627C6
                                                          • _free.LIBCMT ref: 00E6281C
                                                            • Part of subcall function 00E625F8: _free.LIBCMT ref: 00E62650
                                                            • Part of subcall function 00E625F8: GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E8A000), ref: 00E62662
                                                            • Part of subcall function 00E625F8: WideCharToMultiByte.KERNEL32(00000000,00000000,W. Europe Standard Time,000000FF,00000000,0000003F,00000000,?,?), ref: 00E626DA
                                                            • Part of subcall function 00E625F8: WideCharToMultiByte.KERNEL32(00000000,00000000,W. Europe Summer Time,000000FF,?,0000003F,00000000,?), ref: 00E62707
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 314583886-0
                                                          • Opcode ID: 6b2e8287ad0fa79e67b28fb59ad436f76cff913eb128affb717b3a35b72ebed9
                                                          • Instruction ID: f838aa0169aba1a44d28ac9f6db75bdf87bff0afbe48e96d4db281356a76e096
                                                          • Opcode Fuzzy Hash: 6b2e8287ad0fa79e67b28fb59ad436f76cff913eb128affb717b3a35b72ebed9
                                                          • Instruction Fuzzy Hash: 78218132C4451A5BD7349735AC89EEF73B8DB813E0F10225EEA94731C0EF306D8596A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindCloseChangeNotification.KERNEL32(00000000,00000000,00E0EC8E,?,00E57A19,00E0EC8E,00E9D560,0000000C,00E57AC1,00E9D360), ref: 00E57B39
                                                          • GetLastError.KERNEL32(?,00E57A19,00E0EC8E,00E9D560,0000000C,00E57AC1,00E9D360), ref: 00E57B43
                                                          • __dosmaperr.LIBCMT ref: 00E57B6E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                          • String ID:
                                                          • API String ID: 490808831-0
                                                          • Opcode ID: 36b51cdfdea4612aa5676bd08d63cf56e55a6290eeef364b4b491fdcd0ce5b16
                                                          • Instruction ID: 1220ca06b9a4cb677ea14209a499ec43ec061c7a198ab2f6edba7856e8abf411
                                                          • Opcode Fuzzy Hash: 36b51cdfdea4612aa5676bd08d63cf56e55a6290eeef364b4b491fdcd0ce5b16
                                                          • Instruction Fuzzy Hash: 1701893271C5301AC6645234B889B7F678A4BC2B3AF292F58FC48FB1D3DA608CD98190
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateThread.KERNEL32(00E01C1D,?,Function_00054CCE,00000000,?,00E01C1D), ref: 00E54E75
                                                          • GetLastError.KERNEL32(?,?,?,?,00E0E598,00000000,00000000,VWh`,?,00000000), ref: 00E54E81
                                                          • __dosmaperr.LIBCMT ref: 00E54E88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorLastThread__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2744730728-0
                                                          • Opcode ID: 8e85b6cd57cd34fd09f0158ca9dbcfc7f71550c13fca160dd9ada4f2a701d074
                                                          • Instruction ID: 5cb385e0975659a5b483c71589c71e85767840fa4f20d5dff8d0b2c81344d92a
                                                          • Opcode Fuzzy Hash: 8e85b6cd57cd34fd09f0158ca9dbcfc7f71550c13fca160dd9ada4f2a701d074
                                                          • Instruction Fuzzy Hash: BE0180B2500219AFDF159FA1DC0A9AE7BB4FF0036AF105458FC05AA2D0DB319994D790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetFilePointerEx.KERNEL32(00000000,004BEC50,00000002,00E0EC8E,00000000,004BEC50,00E0EC8E,00E9D360,00E9D360,?,00E61FB9,00E0EC8E,004BEC50,00000002,00000000), ref: 00E61F43
                                                          • GetLastError.KERNEL32(?,00E61FB9,00E0EC8E,004BEC50,00000002,00000000,?,00E604D6,00E0EC8E,00000000,00000000,00000002,004BEC50,00E0EC8E,00E0EC8E,00E4F84C), ref: 00E61F4D
                                                          • __dosmaperr.LIBCMT ref: 00E61F54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastPointer__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2336955059-0
                                                          • Opcode ID: 73abca1e18cdcc6ac56b54add3931bd0c7bc893921b4e83b9375d0df6e10d0f0
                                                          • Instruction ID: 6d926b62e9fccb6acc7e69a915837c4a346f0c46d2636c43f3c7bf19867d9de3
                                                          • Opcode Fuzzy Hash: 73abca1e18cdcc6ac56b54add3931bd0c7bc893921b4e83b9375d0df6e10d0f0
                                                          • Instruction Fuzzy Hash: F2012D327101146FCB059F99FC058AE376AFF853607281248F815B7291E731DD509790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • KiUserCallbackDispatcher.NTDLL(00000030,00000000,00000000,00000000), ref: 00E252C5
                                                          • TranslateMessage.USER32(00000030), ref: 00E252E4
                                                          • DispatchMessageW.USER32(00000030), ref: 00E252EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Message$CallbackDispatchDispatcherTranslateUser
                                                          • String ID:
                                                          • API String ID: 2960505505-0
                                                          • Opcode ID: bf40450ab14273e080768b6c4230e6e01653560e8bff61f7821e87e08bb86ad0
                                                          • Instruction ID: f3cc60062a81c6db05144f6595ff72282ad49bd36ec697af88fe86b11bbcbfb9
                                                          • Opcode Fuzzy Hash: bf40450ab14273e080768b6c4230e6e01653560e8bff61f7821e87e08bb86ad0
                                                          • Instruction Fuzzy Hash: EFF04F33311831AB8712AB39BE448FE67ADFF863623452026F805F7155DB34DD869AA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E01F21
                                                          • LoadIconW.USER32(?,00000080), ref: 00E01FA4
                                                          • CreateSolidBrush.GDI32(00403630), ref: 00E01FB5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: BrushCreateH_prolog3IconLoadSolid
                                                          • String ID:
                                                          • API String ID: 2092048932-0
                                                          • Opcode ID: 7783d09f9e3e2aad122a73b391c0e93c8ae419d92a75b0a0406b8d6f9753446a
                                                          • Instruction ID: 4857db159f8780e5486ee34e344307dee4d594a6ee6aa5e3e3012e0eca8c98e6
                                                          • Opcode Fuzzy Hash: 7783d09f9e3e2aad122a73b391c0e93c8ae419d92a75b0a0406b8d6f9753446a
                                                          • Instruction Fuzzy Hash: 08113CB0A01706BEC705EFB5988A7C9FBE0BF18300F50961DE11C67382CB716264CB95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CF9F: GetLastError.KERNEL32(?,?,?,00E4EA47,00E5D11B,?,?,00E5B4AC,?,?), ref: 00E5CFA4
                                                            • Part of subcall function 00E5CF9F: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E5B4AC,?,?), ref: 00E5CFCA
                                                          • ExitThread.KERNEL32 ref: 00E54D95
                                                          • CloseHandle.KERNEL32(?,?,?,00E54EBE,?,?,00E54D2C,00000000), ref: 00E54DBD
                                                          • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,00E54EBE,?,?,00E54D2C,00000000), ref: 00E54DD3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                          • String ID:
                                                          • API String ID: 1991824761-0
                                                          • Opcode ID: fa1c2380381cfc5795960469db52b3820b752242a686c93fdbb5c080b3c76129
                                                          • Instruction ID: 200379179835fb4e2f78de7b5dc311c74af2960d9856100c3261697f11340b3f
                                                          • Opcode Fuzzy Hash: fa1c2380381cfc5795960469db52b3820b752242a686c93fdbb5c080b3c76129
                                                          • Instruction Fuzzy Hash: 69F03AB05006016BCB255B35C848A5A3AA9AF4036EF599F14FD29F25E1D720DCC98790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • __fread_nolock.LIBCMT ref: 00E140E0
                                                          Strings
                                                          • c:\rhub2\pcsetup\pcsetup.cpp, xrefs: 00E14072
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__fread_nolock
                                                          • String ID: c:\rhub2\pcsetup\pcsetup.cpp
                                                          • API String ID: 3992567027-158182345
                                                          • Opcode ID: 9ab7083b22afa4722539bda65e3c6b927f8c0650307a896f9e8d24ac3ce12047
                                                          • Instruction ID: 4d9f02ac2744357211e11b6daa9229e9f533f18f4f3b404f6bb8587d43903cfe
                                                          • Opcode Fuzzy Hash: 9ab7083b22afa4722539bda65e3c6b927f8c0650307a896f9e8d24ac3ce12047
                                                          • Instruction Fuzzy Hash: 6F1172F26043106BD720EB24DC82FDAB3D8AF99701F515829F744B7281E774544587A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __snprintf_s.LIBCMT ref: 00E26D78
                                                            • Part of subcall function 00E24FEC: __vsnwprintf_s_l.LEGACY_STDIO_DEFINITIONS ref: 00E25001
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: __snprintf_s__vsnwprintf_s_l
                                                          • String ID: LOC
                                                          • API String ID: 3877413697-519433814
                                                          • Opcode ID: 72ef61d20eae3fae72d43415dc8c08b7dc2b9204a176c82bf92eedaf82d3776a
                                                          • Instruction ID: 0d24a8b5ecf92ec16bf3653ff6f7a2d8339af3a75e99488f0796bba81e171f1b
                                                          • Opcode Fuzzy Hash: 72ef61d20eae3fae72d43415dc8c08b7dc2b9204a176c82bf92eedaf82d3776a
                                                          • Instruction Fuzzy Hash: 0B117072701328BADB10BB74FC46BDE33A8BB45724F4026A1F505BB1D2EB30AD549760
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E25F28
                                                            • Part of subcall function 00E25951: __EH_prolog3.LIBCMT ref: 00E25958
                                                            • Part of subcall function 00E2F894: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,?,00000108,00E265EA,?,?), ref: 00E2F8C7
                                                            • Part of subcall function 00E2F894: GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 00E2F8D7
                                                            • Part of subcall function 00E2F894: EncodePointer.KERNEL32(00000000,?,?,?,00000108,00E265EA,?,?), ref: 00E2F8E0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressEncodeH_prolog3H_prolog3_HandleModulePointerProc
                                                          • String ID: y
                                                          • API String ID: 2515442129-4225443349
                                                          • Opcode ID: 89b6f93147aafd883489329966dbff24d9abe22bd7bb105255f97eff5498defb
                                                          • Instruction ID: c14b7cfe48407d94ba37580801f79c9ad1ba208660ef50f88b854d0705769ecf
                                                          • Opcode Fuzzy Hash: 89b6f93147aafd883489329966dbff24d9abe22bd7bb105255f97eff5498defb
                                                          • Instruction Fuzzy Hash: CF218E72D055389BDB35EB60DE42BDDB3B8AF25320F1052D4E68476281DBB09EC48F90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,904898A6), ref: 00E13C97
                                                            • Part of subcall function 00E16610: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000000,00000000,?,00003829,?,?,00E017B0,?,00000000,00001000), ref: 00E16644
                                                            • Part of subcall function 00E16610: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,?,00000000,00000000,?,?,00E017B0,?,00000000,00001000,?,?), ref: 00E16661
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$NameUser
                                                          • String ID: SYSTEM
                                                          • API String ID: 3721927898-968218125
                                                          • Opcode ID: 45c02d13a65118c0cc7ec87d0be5008c220be628953efa988f337cbe5b79c49e
                                                          • Instruction ID: fd1e421ae59efadb4d3aee556ebc0af5521d7c2dd8de56f795c4d6fe41f093ec
                                                          • Opcode Fuzzy Hash: 45c02d13a65118c0cc7ec87d0be5008c220be628953efa988f337cbe5b79c49e
                                                          • Instruction Fuzzy Hash: 381129B55083405ACB21DF30D896AEB7BEEAF96304F445819D4C5E7142EB37D64CC791
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateActCtxWWorker.KERNEL32(?,00E1D8C1,00000020), ref: 00E1D5FC
                                                            • Part of subcall function 00E1D70D: GetProcAddress.KERNEL32(00000000,O), ref: 00E1D73B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressCreateProcWorker
                                                          • String ID: CreateActCtxW
                                                          • API String ID: 1321444865-1163823230
                                                          • Opcode ID: 318270073b1070af5ea85d743001340173875a018b661a699c6b160e8320771b
                                                          • Instruction ID: 93e86ce0216887baf14a4019daf249738a2250856e3dce43c6a5a74d35fdd47a
                                                          • Opcode Fuzzy Hash: 318270073b1070af5ea85d743001340173875a018b661a699c6b160e8320771b
                                                          • Instruction Fuzzy Hash: 9FE08631A58738AB46322B555C018D97A199B16BB53021212F8197B6E0CA60AC84C7E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3
                                                          • String ID:
                                                          • API String ID: 431132790-0
                                                          • Opcode ID: 9fde6f490cc3563719b5885168da24d83d06867adeed9e3ebe81a8ad4ec4ec62
                                                          • Instruction ID: c53e1cc16420233d8c63cba31bd48d5c053e93dd9f8285da557fd3892cd49203
                                                          • Opcode Fuzzy Hash: 9fde6f490cc3563719b5885168da24d83d06867adeed9e3ebe81a8ad4ec4ec62
                                                          • Instruction Fuzzy Hash: DFF17A71A00229EFDF18DF64D880AAE77B5BF48314F14556DEA16BB292CB349D41CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 087cc973212cb0434a4738f5a436c782a63363d12caa1caacf8551cbf649e143
                                                          • Instruction ID: 2c81eeafe253f650c0e67ff305ef3dfd6bcd4333ab086b691a641e130022ea23
                                                          • Opcode Fuzzy Hash: 087cc973212cb0434a4738f5a436c782a63363d12caa1caacf8551cbf649e143
                                                          • Instruction Fuzzy Hash: 9221F7719052087BEB106B68EC41FAE37A9EF41339F102711FD283B2C1DB705D4996B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WriteFile.KERNEL32(?,?,?,?,00000000,?,00E0EC8E,00E0EC8E,?,00E60582,00E4F84C,00E0EC8E,00E0EC8E,?,004BEC50,00E0EC8E), ref: 00E600DC
                                                          • GetLastError.KERNEL32(?,00E60582,00E4F84C,00E0EC8E,00E0EC8E,?,004BEC50,00E0EC8E,00E0EC8E,00E4F84C,00E0EC8E,004BEC50,?,?,00E4F8DE,?), ref: 00E60105
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastWrite
                                                          • String ID:
                                                          • API String ID: 442123175-0
                                                          • Opcode ID: 0b1c9bdc70714c18b9693ca26110de5d9ffd90a275d8f42b54993b315fccf300
                                                          • Instruction ID: d5c86af5bbc8fc81e6226ddeb28539f6ca00e790f0c5e5e862b1e072bf87d095
                                                          • Opcode Fuzzy Hash: 0b1c9bdc70714c18b9693ca26110de5d9ffd90a275d8f42b54993b315fccf300
                                                          • Instruction Fuzzy Hash: AC21A6756002199FCB14CF59DC80BEAB3F8FB49351F1054A9E546E7251D770AE85CF20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E23373
                                                            • Part of subcall function 00E229B1: SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00E229EB
                                                            • Part of subcall function 00E229B1: SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00E22A15
                                                            • Part of subcall function 00E229B1: GetCapture.USER32 ref: 00E22A2B
                                                            • Part of subcall function 00E229B1: SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 00E22A3A
                                                          • WinHelpW.USER32(?,?,?,?), ref: 00E233B1
                                                            • Part of subcall function 00E2D82F: __EH_prolog3.LIBCMT ref: 00E2D836
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$H_prolog3$CaptureHelp
                                                          • String ID:
                                                          • API String ID: 3232900797-0
                                                          • Opcode ID: 4a3a81a4b79acea1b9ccd61335a43ad788e5c3333953384357f8a3afa05f0bd6
                                                          • Instruction ID: e75fadf04a2c39f3993c63ae3baa8c23d3af2b5d25fe55bea6e42025b98b6d53
                                                          • Opcode Fuzzy Hash: 4a3a81a4b79acea1b9ccd61335a43ad788e5c3333953384357f8a3afa05f0bd6
                                                          • Instruction Fuzzy Hash: 50219D75600228BBCF05AF61DC06AED7BAAEF44320F049055FD15772A1DB359A90DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2D29E: __EH_prolog3.LIBCMT ref: 00E2D2A5
                                                          • UnhookWindowsHookEx.USER32(?), ref: 00E1F3B0
                                                          • DefWindowProcW.USER32(?,00000360,?,?,?,00000000,?,00E1DEA6,?,00E2B628,?,?,?,00E2B2A3,00000000), ref: 00E1F413
                                                            • Part of subcall function 00E1ED31: __EH_prolog3_catch_GS.LIBCMT ref: 00E1ED38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3H_prolog3_catch_HookProcUnhookWindowWindows
                                                          • String ID:
                                                          • API String ID: 2533299859-0
                                                          • Opcode ID: a2c98341af50a541812dbb5561ed4a26e21edd262cd03541ed0048928619add8
                                                          • Instruction ID: 554e13af2ab4c972d523720eadbef7811bcff6f08d3249b5476713a4aabbff58
                                                          • Opcode Fuzzy Hash: a2c98341af50a541812dbb5561ed4a26e21edd262cd03541ed0048928619add8
                                                          • Instruction Fuzzy Hash: 2C11C232405615EBDF22AF60AC08BEB3BA4BF04325F006835F92671062D734D9D0DBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 27f44611ecca9d47660a8f1e6acd2977a5360482cb74621c3dd1f7c6878825dc
                                                          • Instruction ID: dcd0bc73f060c2cc27751f0658cd92d47e6f7c0693da65e1da5f4e247120dd3a
                                                          • Opcode Fuzzy Hash: 27f44611ecca9d47660a8f1e6acd2977a5360482cb74621c3dd1f7c6878825dc
                                                          • Instruction Fuzzy Hash: 6501F5377046119F9B25CE6AEC4495E33E6EBC53357289520FE11FB194DA30F809C640
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FileTimeToSystemTime.KERNEL32(00000000,?,?,?,?,00E550D5,?,?,00000000,00000000), ref: 00E551CF
                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?,?,00E550D5,?,?,00000000,00000000), ref: 00E551E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Time$System$FileLocalSpecific
                                                          • String ID:
                                                          • API String ID: 1707611234-0
                                                          • Opcode ID: af04f865326f2c6c2ebe49cc8678c9661c55041de4c165f792506b01e7c013d7
                                                          • Instruction ID: 5091dd11d7d11820ce435a8599780ff093025b6f98d43a482d38011727708fc6
                                                          • Opcode Fuzzy Hash: af04f865326f2c6c2ebe49cc8678c9661c55041de4c165f792506b01e7c013d7
                                                          • Instruction Fuzzy Hash: 7C111C7690060CABDB00DFA5D944ADFB7BCAF08311F505666E916F2190EB30EA48CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(00E9D440,00000010), ref: 00E54CE1
                                                          • ExitThread.KERNEL32 ref: 00E54CE8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorExitLastThread
                                                          • String ID:
                                                          • API String ID: 1611280651-0
                                                          • Opcode ID: 23283bef3bd51d42d500c7a6d7de5690e744b245d98bbbffd67baf4a3a5c713f
                                                          • Instruction ID: dddb86d39ecb4e9c73713f471785cd27f2a0c1c132d7ec04788688e038869619
                                                          • Opcode Fuzzy Hash: 23283bef3bd51d42d500c7a6d7de5690e744b245d98bbbffd67baf4a3a5c713f
                                                          • Instruction Fuzzy Hash: 85F0A4B0940214AFDB15AB70C84AAAD77B4FF44312F201849F805B7292CB345998DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 00E204D3
                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 00E204DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ProcWindow$Call
                                                          • String ID:
                                                          • API String ID: 2316559721-0
                                                          • Opcode ID: 71c9134277d0ae8f4a8829be8dc6e2c5685183b2e881bac03c21865600e86f0e
                                                          • Instruction ID: 1db132d6aa555c34cc787f0d11d6319010eebe8c3feeeef10f84279c35e54cfe
                                                          • Opcode Fuzzy Hash: 71c9134277d0ae8f4a8829be8dc6e2c5685183b2e881bac03c21865600e86f0e
                                                          • Instruction Fuzzy Hash: 65F06D3620011AFFCF069FA5DC08DA9BB7AFF48311B048016FA18A2562D731D860EB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2D29E: __EH_prolog3.LIBCMT ref: 00E2D2A5
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E1F216
                                                          • SetWindowsHookExW.USER32(00000005,00E2359E,00000000,00000000), ref: 00E1F226
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CurrentH_prolog3HookThreadWindows
                                                          • String ID:
                                                          • API String ID: 841563119-0
                                                          • Opcode ID: 1083135cffde51276f64174c5e90d5f48505dd156d386102db2d68a1c4bff857
                                                          • Instruction ID: 20d72b2db846c21d0900599db2d03cb6c5edfc641a188e260109c0aeee15aa75
                                                          • Opcode Fuzzy Hash: 1083135cffde51276f64174c5e90d5f48505dd156d386102db2d68a1c4bff857
                                                          • Instruction Fuzzy Hash: 4AF02E755407159FD3306B926C05B9677E8EF85B11F102039F60575561DA30D881C7F1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindow.USER32(?), ref: 00E2B10E
                                                          • SetWindowTextW.USER32(?,000003E8), ref: 00E2B12A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Text
                                                          • String ID:
                                                          • API String ID: 848690642-0
                                                          • Opcode ID: c38ffd74a45fb162628a38c2b29fb283593fce33144b9b357b6f17e7b1c44ee4
                                                          • Instruction ID: 0716c34050bf595c619b3e2110389ca63c053f6669dd16d33a91228dad2cc656
                                                          • Opcode Fuzzy Hash: c38ffd74a45fb162628a38c2b29fb283593fce33144b9b357b6f17e7b1c44ee4
                                                          • Instruction Fuzzy Hash: 72F027326016258FCB329F21EC1892ABBB5FF44B51B041029E549B3221EF31AC20DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E297D5
                                                          • BeginPaint.USER32(?,?,00000004,00E02671,?,00000088), ref: 00E29801
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: BeginH_prolog3Paint
                                                          • String ID:
                                                          • API String ID: 697162482-0
                                                          • Opcode ID: cf83227517ea8cbe0498aeb5e8be3e56f82ece41f3e56200417e587fd4cda695
                                                          • Instruction ID: 68ef74b58d4a02891706acdd90725f2f382b913c36b6b6961f44e01021a7db61
                                                          • Opcode Fuzzy Hash: cf83227517ea8cbe0498aeb5e8be3e56f82ece41f3e56200417e587fd4cda695
                                                          • Instruction Fuzzy Hash: 23F0FEF0A017159FC764DF78E501A5A7AE4AF48700B00A92DF5ADE7741E730D940CB95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E2518C
                                                          • SetWindowsHookExW.USER32(000000FF,Function_00025834,00000000,00000000), ref: 00E2519C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CurrentHookThreadWindows
                                                          • String ID:
                                                          • API String ID: 1904029216-0
                                                          • Opcode ID: 1886f2338617e1a660557355305985dadb1fda2f4acdb98e559a0ebd20046651
                                                          • Instruction ID: 9de8e43cac8e5b8ff764b2ddd3c107dcc30524fbcf1f06807f2733d201a6029f
                                                          • Opcode Fuzzy Hash: 1886f2338617e1a660557355305985dadb1fda2f4acdb98e559a0ebd20046651
                                                          • Instruction Fuzzy Hash: CCD0A732C49B603EEF20AB707C0DB593AA49F01324F041354F420791E2D67084C2CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7e35e109573b083247c3283fe904b6db35e320a111c9956abdfe383872c3be30
                                                          • Instruction ID: 56e92949f9d069de509ce2654bf31bff63dddeddaae2a17f43720f04af1599c3
                                                          • Opcode Fuzzy Hash: 7e35e109573b083247c3283fe904b6db35e320a111c9956abdfe383872c3be30
                                                          • Instruction Fuzzy Hash: B4412970A08104AFDB10CF58DC41AAA7BF1EF85365F289568FC88BB391D2319D5AC790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                            • Part of subcall function 00E2A72B: GetDlgItem.USER32(?,?), ref: 00E2A73C
                                                            • Part of subcall function 00E2B152: ShowWindow.USER32(?,000003E8,?,?,00E027E3,000003E8,00000005), ref: 00E2B163
                                                            • Part of subcall function 00E2AE75: MoveWindow.USER32(?,?,?,?,?,?,?,?,00E023E7,?,?,?,?,?), ref: 00E2AE92
                                                            • Part of subcall function 00E2B100: IsWindow.USER32(?), ref: 00E2B10E
                                                            • Part of subcall function 00E2B100: SetWindowTextW.USER32(?,000003E8), ref: 00E2B12A
                                                          • InvalidateRect.USER32(?,00000000,00000001,000003EC,000003EC,?,000003EC,00000000,00000000,?,00000000,00000001,000003F1,00000000,000003F0,00000000), ref: 00E02CDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$ByteCharInvalidateItemMoveMultiRectShowTextWide
                                                          • String ID:
                                                          • API String ID: 2459327819-0
                                                          • Opcode ID: e268abb0f38f367255f77b6afdc50f2b31a5b1ad50ba703d7160a2468697e187
                                                          • Instruction ID: e8c124a51deccf73046a40abea854c73e712b2e61f3d929077c86ffa302d7daf
                                                          • Opcode Fuzzy Hash: e268abb0f38f367255f77b6afdc50f2b31a5b1ad50ba703d7160a2468697e187
                                                          • Instruction Fuzzy Hash: 9A4127717006282BEA06B3316C92E7F63EEAF84740F046639B346BB2D2EF645D814755
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 00E1ED38
                                                            • Part of subcall function 00E2D29E: __EH_prolog3.LIBCMT ref: 00E2D2A5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3H_prolog3_catch_
                                                          • String ID:
                                                          • API String ID: 863784098-0
                                                          • Opcode ID: 2b64f5be92f74d596fb210e9c79f3aaef5267fcdffc14bf55bcdf982b29a668a
                                                          • Instruction ID: 07925a770014446f71df78241add67cf3a34f432a1be1d3786200c3132b50db1
                                                          • Opcode Fuzzy Hash: 2b64f5be92f74d596fb210e9c79f3aaef5267fcdffc14bf55bcdf982b29a668a
                                                          • Instruction Fuzzy Hash: 8631E276E00219DBCF05DFA9D8819DEBBB5BF88310F14546AEA11BB351C770A985CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2F81B: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F82D
                                                            • Part of subcall function 00E2F81B: GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00E2F83D
                                                            • Part of subcall function 00E2F81B: EncodePointer.KERNEL32(00000000,?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F846
                                                            • Part of subcall function 00E2F81B: GetLocaleInfoEx.KERNEL32(?,00E26C60,00E25FB2,00000003,?,00000004,00000000,00E25FB2), ref: 00E2F874
                                                          • __snprintf_s.LIBCMT ref: 00E26C94
                                                            • Part of subcall function 00E24FEC: __vsnwprintf_s_l.LEGACY_STDIO_DEFINITIONS ref: 00E25001
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressEncodeHandleInfoLocaleModulePointerProc__snprintf_s__vsnwprintf_s_l
                                                          • String ID:
                                                          • API String ID: 1585518483-0
                                                          • Opcode ID: 152f28b9e1476c70caa71e5b1109547e68a791728fb6a34fd4edaacec6804104
                                                          • Instruction ID: ef1afe964070d0aaef0876e44e93cf35e23133bce40c9a7aa5304708fffb09c1
                                                          • Opcode Fuzzy Hash: 152f28b9e1476c70caa71e5b1109547e68a791728fb6a34fd4edaacec6804104
                                                          • Instruction Fuzzy Hash: 24117271A10228ABDB14BB64ED57FDE73E8FB04714F041195F511B71D2EA34AA048760
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: __cftof
                                                          • String ID:
                                                          • API String ID: 1622813385-0
                                                          • Opcode ID: 0f3f70081d1b00d8696b4bd126fef16f4e87e397386ddcdf862d1c643b9a349d
                                                          • Instruction ID: 35a9b4f128161de9818a65465c262b321d173ab769b484fc0081bf0692be9ac5
                                                          • Opcode Fuzzy Hash: 0f3f70081d1b00d8696b4bd126fef16f4e87e397386ddcdf862d1c643b9a349d
                                                          • Instruction Fuzzy Hash: 76216F715007099ED721DF51D981ABBB7F8FB04314B501A2AE552A7651EB30F945CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Parent
                                                          • String ID:
                                                          • API String ID: 975332729-0
                                                          • Opcode ID: 427a727a25649ca603b18e144f35af56b4a167495f92dd675fd6b6c29988290a
                                                          • Instruction ID: 92469d07aca41fb18ebad1bf4634c4051853739633bdcc5a301032d1a7c64d1c
                                                          • Opcode Fuzzy Hash: 427a727a25649ca603b18e144f35af56b4a167495f92dd675fd6b6c29988290a
                                                          • Instruction Fuzzy Hash: 7E11903160022AABCF109F66ED44DAB7BBDEF84354B045429FC02B3266DB31DC10DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 00E26441
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 6f5a35e0f3d17d134815013f3a7c165a9ec989cc986c13f8f859c50f6555e6dd
                                                          • Instruction ID: 9456191e53030172cfe0c860a415ce7978bb1229ac0d17a1d1d60d1b6e2a974a
                                                          • Opcode Fuzzy Hash: 6f5a35e0f3d17d134815013f3a7c165a9ec989cc986c13f8f859c50f6555e6dd
                                                          • Instruction Fuzzy Hash: 9911B235700625AFCB08AF66EC4486DBBA9FF89321704413AF959E7311DB30AC108F90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,?,00E2C1BA,904898A6,?,00000000,00E75970,000000FF,?,00E0210F,?,00E021C9), ref: 00E2056B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CallbackDispatcherUser
                                                          • String ID:
                                                          • API String ID: 2492992576-0
                                                          • Opcode ID: c316031a15d809fe2871827efeed4e5d8a19b57343794f870e80a5f45f1a6862
                                                          • Instruction ID: 9908b0c402af0656079083f8c331320afcf4d84ddcb30689a6687abdde5e777f
                                                          • Opcode Fuzzy Hash: c316031a15d809fe2871827efeed4e5d8a19b57343794f870e80a5f45f1a6862
                                                          • Instruction Fuzzy Hash: 4C11E5363405369B8B25DB25F80096ABBE9FF847657151026ED04F3792DB20ED41DFC0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3
                                                          • String ID:
                                                          • API String ID: 431132790-0
                                                          • Opcode ID: 6fa60ec1eea4f849b0a4b2f099bf50cf5e57f12348e3654fb61cf6462fca4144
                                                          • Instruction ID: 2396762f5102b97175a47255b52fa8062c6e634cb5de824efca11211fae683e0
                                                          • Opcode Fuzzy Hash: 6fa60ec1eea4f849b0a4b2f099bf50cf5e57f12348e3654fb61cf6462fca4144
                                                          • Instruction Fuzzy Hash: BF112C35B106258FCF08EF65985476C37A5BF49711F0514AAE80ABB396CF34AC45CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2A765: GetDlgItem.USER32(00000000,?), ref: 00E2A776
                                                            • Part of subcall function 00E23173: SetWindowLongW.USER32(00000000,000000FC,00E1F3D3), ref: 00E231B7
                                                          • GetParent.USER32(00000000), ref: 00E1D409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ItemLongParentWindow
                                                          • String ID:
                                                          • API String ID: 869538736-0
                                                          • Opcode ID: 668c0b1cc8335bc1e5acbdf9e086f4b2932025e832b130f239efcd2e80753d73
                                                          • Instruction ID: 9d548e333461c0a52315aa4070d5d8b8969a378d104af9978544a7093e1e1bb9
                                                          • Opcode Fuzzy Hash: 668c0b1cc8335bc1e5acbdf9e086f4b2932025e832b130f239efcd2e80753d73
                                                          • Instruction Fuzzy Hash: 10118E31300119ABCF10AF21DD01AAEB7AABF94714F04A028F82AB2551EB30FE51DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: d1d37627c6de93388be355cad8a94492baad7960fbb02d902057998029954ed1
                                                          • Instruction ID: 009677484510601564bceceb97c24a3795472d2b0afcede38492f55ef756cf35
                                                          • Opcode Fuzzy Hash: d1d37627c6de93388be355cad8a94492baad7960fbb02d902057998029954ed1
                                                          • Instruction Fuzzy Hash: 0E1106B190410AAFCF05DF58E94199A7BF9EF48315F1044A9FC08AB211D631EA158BA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7b4ffa6159747971b9d251a9f36a7f6700f78132360cb475c8dde5537a0a3df6
                                                          • Instruction ID: 81518da4ed2fad51ef944083c77ccdd95d8a4873875847fc4b84a8cfb28d5a60
                                                          • Opcode Fuzzy Hash: 7b4ffa6159747971b9d251a9f36a7f6700f78132360cb475c8dde5537a0a3df6
                                                          • Instruction Fuzzy Hash: 09F02D32900B1056D639367AFC05B9A33D8DF56735F142B35F964B72D2CB70D50686E1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E2D2A5
                                                            • Part of subcall function 00E2CDBB: TlsAlloc.KERNEL32(?,00E2D2D1,00000004,00E1DDEC,00E1DEA6,00E25C04,904898A6), ref: 00E2CDDA
                                                            • Part of subcall function 00E2CDBB: InitializeCriticalSection.KERNEL32(00EAF7E4,?,00E2D2D1,00000004,00E1DDEC,00E1DEA6,00E25C04,904898A6), ref: 00E2CDEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AllocCriticalH_prolog3InitializeSection
                                                          • String ID:
                                                          • API String ID: 2369468792-0
                                                          • Opcode ID: 254da8b090a4eb46f0bc6a5dfde2b077c8dc2e4bcec748e0a65af1b40859c2c8
                                                          • Instruction ID: bb69be915edba6cf3370360f04f9ab02141f7f486d9f5d549e44ad26f6e53bdb
                                                          • Opcode Fuzzy Hash: 254da8b090a4eb46f0bc6a5dfde2b077c8dc2e4bcec748e0a65af1b40859c2c8
                                                          • Instruction Fuzzy Hash: 0D015E70A142269BDB24EFB5EC0565D3AE4EF04354B106139FA91FB291DB30DD40CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5DEBD: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          • _free.LIBCMT ref: 00E61FDE
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Heap$AllocateErrorFreeLast_free
                                                          • String ID:
                                                          • API String ID: 314386986-0
                                                          • Opcode ID: bef16a4f3639cc9212fcd3d4d8a6f2f8b5e028ab84505a114cfea6b337d66911
                                                          • Instruction ID: da8edc5ca64c6a734f6394e80f35995dfa575b74a9bf1723818a7a5e2c2e4562
                                                          • Opcode Fuzzy Hash: bef16a4f3639cc9212fcd3d4d8a6f2f8b5e028ab84505a114cfea6b337d66911
                                                          • Instruction Fuzzy Hash: CCF062710057048FE3349F00D845753B7F8EB04715F10882EE69AABA91CBB4F448CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateDialogIndirectParamW.USER32(?,?,?,?,?), ref: 00E2BEA6
                                                            • Part of subcall function 00E1D692: OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,?,?,00E24F6F,?,00E9AA90,00000010,00E1F325,?), ref: 00E1D6A6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateDebugDialogIndirectOutputParamString
                                                          • String ID:
                                                          • API String ID: 3066322445-0
                                                          • Opcode ID: e6d07e52935988ccbbdc7b63ba99025f6bd669de712f9c80400ace1b30a8b51d
                                                          • Instruction ID: a67c4a8d6279f336433a6dfd1a831b47c5f2e91bb921bc274efb27556ea8f139
                                                          • Opcode Fuzzy Hash: e6d07e52935988ccbbdc7b63ba99025f6bd669de712f9c80400ace1b30a8b51d
                                                          • Instruction Fuzzy Hash: 4501647290421DEFDF149FA4EC05BED77B0FB48326F01912AE612B2191C3B98998DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(?,?,?,00E9AA50,00000010,00E1FE13,?,00000000,00000800,?,00000000), ref: 00E24E19
                                                            • Part of subcall function 00E1D692: OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,?,?,00E24F6F,?,00E9AA90,00000010,00E1F325,?), ref: 00E1D6A6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: DebugLibraryLoadOutputString
                                                          • String ID:
                                                          • API String ID: 137895185-0
                                                          • Opcode ID: c2fe9415486422fe3534f9df39ac770db631bf74ea919b249908f061c727f1eb
                                                          • Instruction ID: 492a5bc4a55b02817666b0fd862f4897d045cde75acf81460fb464d622dcceef
                                                          • Opcode Fuzzy Hash: c2fe9415486422fe3534f9df39ac770db631bf74ea919b249908f061c727f1eb
                                                          • Instruction Fuzzy Hash: 2BF0AFB2904318DFEF149F90EC05BAC77B0FB08325F006119E422B65D1C7B88944CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3_catch
                                                          • String ID:
                                                          • API String ID: 3886170330-0
                                                          • Opcode ID: 9be9dff370c677c169dbee0b302fc99e2a705dc3d080668c5b28f9a091f397ef
                                                          • Instruction ID: 3ded4b535dce3066f96461d68c20c411c979445caa4d554efd42087a0748787c
                                                          • Opcode Fuzzy Hash: 9be9dff370c677c169dbee0b302fc99e2a705dc3d080668c5b28f9a091f397ef
                                                          • Instruction Fuzzy Hash: 4701EFB5E116199BCB04DFA5D481BEDB7F0BF18302F10912AE80AB7381CB746A40CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 2ed8182f331214b71dd8337c77fde3f4802c10b770f5dde98a0b22a574068448
                                                          • Instruction ID: f9506edbcf7897e13edb5527f74974f9c2cc0ee8644c2cad42a6451f5bdf0a8e
                                                          • Opcode Fuzzy Hash: 2ed8182f331214b71dd8337c77fde3f4802c10b770f5dde98a0b22a574068448
                                                          • Instruction Fuzzy Hash: A8E02B3191D21266DA3136369C0275B768CEF923B7F042D24EC49BB5D1DF20CC0882A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Item
                                                          • String ID:
                                                          • API String ID: 3207170592-0
                                                          • Opcode ID: e61e3fecb8f2d6ce0ebad7d65a48e986b60d76fc70cebc1466483129ccb27ca8
                                                          • Instruction ID: 6cc7452f831699c813def59c9fcecc0e5c0a212c2231af0a949f4a1cd91cd042
                                                          • Opcode Fuzzy Hash: e61e3fecb8f2d6ce0ebad7d65a48e986b60d76fc70cebc1466483129ccb27ca8
                                                          • Instruction Fuzzy Hash: 94E04836200118AB8B015F55E84495D7F7AFFD4762314402AF905A7222DB31D852DB95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(?,000003E8,?,?,00E027E3,000003E8,00000005), ref: 00E2B163
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 33b76cf4bf17980b48da073ad94a4e10c881cd143b6d46e65928990c55b22c04
                                                          • Instruction ID: 6ce5adc9b79d1a47952261d023435b77a4d7a77479c636ae4340339b7d64c69a
                                                          • Opcode Fuzzy Hash: 33b76cf4bf17980b48da073ad94a4e10c881cd143b6d46e65928990c55b22c04
                                                          • Instruction Fuzzy Hash: ADE04836300118AFCA019F55D8149A97F79FF853A17140065E90957221C7319861DBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Dialog
                                                          • String ID:
                                                          • API String ID: 1120787796-0
                                                          • Opcode ID: 8d42ebeb6da00db8a7dcff07c9b919a73306307d0c50de5d015c3b5e8a2e1c84
                                                          • Instruction ID: 8d3c0ea144ea2089821285e168457c76a88f4cb4094ab52d848296db519e5e58
                                                          • Opcode Fuzzy Hash: 8d42ebeb6da00db8a7dcff07c9b919a73306307d0c50de5d015c3b5e8a2e1c84
                                                          • Instruction Fuzzy Hash: 47E04835200619EBCB059F56D808EDDBF79FF85361F044026E94857761DB715864DFD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindResourceW.KERNEL32(00000000,?,00000006,?,00E26630,00000000,?,?,?,?,00E3E83A,00000000,?,?,00000000,00000004), ref: 00E260A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: FindResource
                                                          • String ID:
                                                          • API String ID: 1635176832-0
                                                          • Opcode ID: 2a036ccff5ca44ee1ef623adf0f625238f041c11e528207cd07dd2fcc128d6a7
                                                          • Instruction ID: 8d2d094522eded73c44c6bdd4e42517154ac3dcb3e9c2849564dd4bec603f090
                                                          • Opcode Fuzzy Hash: 2a036ccff5ca44ee1ef623adf0f625238f041c11e528207cd07dd2fcc128d6a7
                                                          • Instruction Fuzzy Hash: C0D0177120015CBBEF012E45FC01DBA3B9DEB80658F008160FD0C98171E632DDA1AA50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E03CE6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: LongWindow
                                                          • String ID:
                                                          • API String ID: 1378638983-0
                                                          • Opcode ID: 0c3ba8e91f490fdded7f73099df23ba510333bc2dbb1b58dc716303fdb1a1afa
                                                          • Instruction ID: abd0ddff56499c0dcc4a979e5447aa20f90738f5df30a4f5de23f29ae972f7ce
                                                          • Opcode Fuzzy Hash: 0c3ba8e91f490fdded7f73099df23ba510333bc2dbb1b58dc716303fdb1a1afa
                                                          • Instruction Fuzzy Hash: DDE086312417205BF72917348C2BBAA7590FB08715F101A3DF25BEB2D2EAB428404744
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00E20848
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 5dbc481f08c9962be9fe25729d5972cc3960dd7fe733ad34fb66ad25225369fa
                                                          • Instruction ID: 705a82a96fdf579095916885d16f0030a1149dbb54c12799007b569f0fce5b6b
                                                          • Opcode Fuzzy Hash: 5dbc481f08c9962be9fe25729d5972cc3960dd7fe733ad34fb66ad25225369fa
                                                          • Instruction Fuzzy Hash: F0D067F2510208AFA704EF68DC4597637ADFB146287144269B858DA2A2E732EC52DA50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00E56759
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 12e72227cc6a2817515612e34c2b870032dace5127ccf49c801997517b50b6a1
                                                          • Instruction ID: 291f86725aa9050d8bf65449992672e1b1f84cf373c1b20a02d98557a9a7b18e
                                                          • Opcode Fuzzy Hash: 12e72227cc6a2817515612e34c2b870032dace5127ccf49c801997517b50b6a1
                                                          • Instruction Fuzzy Hash: 62D06C3200010DBFDF028F85DC06EDA3BAAFB48714F018000BA1C66061C732E861AB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00E4E9BF
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast_free
                                                          • String ID:
                                                          • API String ID: 1353095263-0
                                                          • Opcode ID: 432ba72ec766bbaa9b01fb95f8e39ff391bf78a0cb1e7f168574295de3ab8502
                                                          • Instruction ID: c97ec3bc97c5af0c5d0a64baef918008c9a0e709b596986f56911153325fb038
                                                          • Opcode Fuzzy Hash: 432ba72ec766bbaa9b01fb95f8e39ff391bf78a0cb1e7f168574295de3ab8502
                                                          • Instruction Fuzzy Hash: 5CC08C3140820CFBCB20DF89EC0AA5EBBB9DB80320F200188FC0C17240DE72AE1196C0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00E17323
                                                          • GetVersionExW.KERNEL32(0000011C), ref: 00E1733A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Version
                                                          • String ID: %s (Build %d)$A$Advanced Server $DataCenter Server $LANMANNT$Microsoft Win32s $Microsoft Windows 2000 $Microsoft Windows 95 $Microsoft Windows 98 $Microsoft Windows Me $Microsoft Windows NT $Microsoft Windows Vista $Microsoft Windows XP $OSR2 $Personal $ProductType$Professional $SE $SERVERNT$SYSTEM\CurrentControlSet\Control\ProductOptions$Server $WINNT$Windows Server 2003 family $version %d.%d %s (Build %d)
                                                          • API String ID: 1889659487-2477365438
                                                          • Opcode ID: 5b976ddde3ab5e5300d42897492e0bce3916d01149457b14a60ce084db98dc55
                                                          • Instruction ID: 5422c1736405b26a921a5e6695875075c10a5414b7ba17058a5421d8d8a516b1
                                                          • Opcode Fuzzy Hash: 5b976ddde3ab5e5300d42897492e0bce3916d01149457b14a60ce084db98dc55
                                                          • Instruction Fuzzy Hash: DB1230785083418FCB14CF29D440AA5BBF1FB59708B2495AED89DAB352E733D98BCB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 00E13D59
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00E13D60
                                                          • GetLastError.KERNEL32 ref: 00E13D6A
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,00000008,?,?), ref: 00E13DC5
                                                          • GetLastError.KERNEL32(?,?), ref: 00E13DD1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalErrorLastProcessSectionToken$CurrentEnterInformationLeaveOpen
                                                          • String ID: AllocateAndInitializeSid Error %u$GetTokenInformation Error %u$OpenProcessToken Error %u$The group SID is a deny-only SID.$The group SID is enabled.$The group SID is not enabled.$Utility::IsUserAdmin()$c:\rhub2\code\utility\utility.cpp
                                                          • API String ID: 2828058356-2557394127
                                                          • Opcode ID: 99072452a8972b09b1ced266d3f6eb7c2fd8a886756ad2607e621ad698617cd0
                                                          • Instruction ID: 8711433ec8db3cf73904207c577262540106d87f7dfdca6edf39169f625a4633
                                                          • Opcode Fuzzy Hash: 99072452a8972b09b1ced266d3f6eb7c2fd8a886756ad2607e621ad698617cd0
                                                          • Instruction Fuzzy Hash: 9751F971744304BFEB20AF21DC06FEB77E8AF48704F405429FA48B61E2D6B19989CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000206), ref: 00E180B6
                                                          • lstrcpyW.KERNEL32(?,Unknown), ref: 00E180D0
                                                          • lstrcpyW.KERNEL32(?,00000000), ref: 00E180EA
                                                          • lstrcpyW.KERNEL32(00000000,ERRORLOG.TXT), ref: 00E1810D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,80000080,00000000), ref: 00E18126
                                                          • OutputDebugStringW.KERNEL32(Error creating exception report), ref: 00E18138
                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00E1815F
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E18185
                                                          • lstrcpyW.KERNEL32(00000000,CRASH.DMP), ref: 00E18191
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,80000080,00000000), ref: 00E181AA
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E181C5
                                                          • IsDebuggerPresent.KERNEL32 ref: 00E181CB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Filelstrcpy$CloseCreateHandle$DebugDebuggerModuleNameOutputPointerPresentString
                                                          • String ID: ===== [end of %s] =====$CRASH.DMP$ERRORLOG.TXT$Error creating exception report$Unknown
                                                          • API String ID: 2562258883-4078883516
                                                          • Opcode ID: e3e09f131447fd99dd9d63a019f57c9f5949d89e1bde9432b02f0ea19a73c676
                                                          • Instruction ID: 1ecf38069cf749bc4607f451026678fda48512b9d17a05e4d02d53e116c208ba
                                                          • Opcode Fuzzy Hash: e3e09f131447fd99dd9d63a019f57c9f5949d89e1bde9432b02f0ea19a73c676
                                                          • Instruction Fuzzy Hash: 304116B26443007BD620E731EC0AFDB73D8AF49714F045525FA49B21D2EE74A58887A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strstr
                                                          • String ID: </__SERVER_ACCESS_SETTING1__>$<__SERVER_ACCESS_SETTING1__>$Do not cache this setting sByPass = %s$Do not cache this setting sProxyAddress = %s$HR::AddCache$Too long: iByPassLength = %d, iProxyAddressLength = %d, iServerAccessSettingLength = %d$c:\rhub2\code\hlib\hlib.cpp
                                                          • API String ID: 2882301372-2211000319
                                                          • Opcode ID: 33d3212909c989c4120618fb6d472ae06d244aa96b65780c28f0620fba966193
                                                          • Instruction ID: 8d6e6cb61811b965ee81782157c121416cd2799de4d4f35db2b48508852b8db4
                                                          • Opcode Fuzzy Hash: 33d3212909c989c4120618fb6d472ae06d244aa96b65780c28f0620fba966193
                                                          • Instruction Fuzzy Hash: DD0234719003599BDF24DF28CC81BEABBB5AF55304F0891D8E84DBB282D7719E99CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00E2E880
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Initialize
                                                          • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                                          • API String ID: 2538663250-1403614551
                                                          • Opcode ID: cfa4e04487f3a69e68ee0ee823b1af62d14690290835550e4fe67daec1fcaf40
                                                          • Instruction ID: bf968ee6297f4d5a5c7f451b5611d3534deafc687b3cd35a85dc727826c0731a
                                                          • Opcode Fuzzy Hash: cfa4e04487f3a69e68ee0ee823b1af62d14690290835550e4fe67daec1fcaf40
                                                          • Instruction Fuzzy Hash: 4021A171250725AFDB28AF72EC45B2676A8FF80755F04553EF54EB1290EB70E844CB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E3C8DC
                                                          • VariantClear.OLEAUT32(?), ref: 00E3CCAD
                                                            • Part of subcall function 00E3E0E6: VariantChangeType.OLEAUT32(?,?,00000000,?), ref: 00E3E103
                                                          • VariantClear.OLEAUT32(?), ref: 00E3CCCD
                                                          • VariantClear.OLEAUT32(?), ref: 00E3CE68
                                                          • VariantClear.OLEAUT32(?), ref: 00E3CE76
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeH_prolog3Type
                                                          • String ID: 0
                                                          • API String ID: 3567832691-4108050209
                                                          • Opcode ID: 6d5ce9460891511d033185ea73f46c3702c5d01c8c43f2607885a80299815d65
                                                          • Instruction ID: d022292ab700b4d4fdc4adebfa9dd3b1a586a28b875d5c5b1c7b7e90859557a4
                                                          • Opcode Fuzzy Hash: 6d5ce9460891511d033185ea73f46c3702c5d01c8c43f2607885a80299815d65
                                                          • Instruction Fuzzy Hash: 45325F71A00619AFCB18DFA4D9899AEBBF9FF48304F209169E506F7291DB30ED45CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E338B3
                                                          • PathIsUNCW.SHLWAPI(?,?,?,00000000), ref: 00E3395E
                                                          • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00E33982
                                                          • GetFullPathNameW.KERNEL32(?,00000104,?,?,00000268,00E33176,?,?,00000000), ref: 00E338E6
                                                            • Part of subcall function 00E3387C: GetLastError.KERNEL32(?,?,00E33993,?,?), ref: 00E33887
                                                            • Part of subcall function 00E331EF: PathStripToRootW.SHLWAPI(00000000), ref: 00E33223
                                                          • CharUpperW.USER32(?), ref: 00E339B0
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E339C8
                                                          • FindClose.KERNEL32(00000000), ref: 00E339D4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Path$Find$CharCloseErrorFileFirstFullH_prolog3_InformationLastNameRootStripUpperVolume
                                                          • String ID:
                                                          • API String ID: 2323451338-0
                                                          • Opcode ID: 7175fd31dbe93070b937c7099b9d03ff9e91845f0934eaed3a34e8bac4a1c086
                                                          • Instruction ID: 6479a4dfadc9c5e58e2f0454324a3ca6f0fd6004f735be342463c4f92fea34f1
                                                          • Opcode Fuzzy Hash: 7175fd31dbe93070b937c7099b9d03ff9e91845f0934eaed3a34e8bac4a1c086
                                                          • Instruction Fuzzy Hash: B441A470504215AFDB24EB34CC8DFAEB7BCEF50314F101699B85AB2151EB759F84CA20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 4eaca6427b3a7502c1db4b0dc57abb358c4361fd5b456b0a155529beec5f509b
                                                          • Instruction ID: e09994bc4e4ff1959688108b65cf581e0b1bd26268b1c202090d859772c0a473
                                                          • Opcode Fuzzy Hash: 4eaca6427b3a7502c1db4b0dc57abb358c4361fd5b456b0a155529beec5f509b
                                                          • Instruction Fuzzy Hash: CDC25B71E482288FCB65CE28ED407E9B3B9EB84395F1451EAD80DF7241E775AE818F41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00E666B2,?,00000000), ref: 00E66426
                                                          • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00E666B2,?,00000000), ref: 00E6644F
                                                          • GetACP.KERNEL32(?,?,00E666B2,?,00000000), ref: 00E66464
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: InfoLocale
                                                          • String ID: ACP$OCP
                                                          • API String ID: 2299586839-711371036
                                                          • Opcode ID: 0a9db5f0d0be94cbff36a2c74a2c23070254e30e241c30326a7e80ef1e1e1cdd
                                                          • Instruction ID: 3f986f37906cecbd9f4d47c57bddecfb6dcae58579cb39d5907ffaec7b76cf2b
                                                          • Opcode Fuzzy Hash: 0a9db5f0d0be94cbff36a2c74a2c23070254e30e241c30326a7e80ef1e1e1cdd
                                                          • Instruction Fuzzy Hash: AE21D8316E0115ABDB308F55E904AA773A6FF60B98B569025E81DF7211EB32DE40C350
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                            • Part of subcall function 00E5CE4E: _free.LIBCMT ref: 00E5CEA9
                                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 00E66673
                                                          • IsValidCodePage.KERNEL32(00000000), ref: 00E666CE
                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00E666DD
                                                          • GetLocaleInfoW.KERNEL32(?,00001001,00E5A6D2,00000040,?,00E5A7F2,00000055,00000000,?,?,00000055,00000000), ref: 00E66725
                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00E5A752,00000040), ref: 00E66744
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser_free
                                                          • String ID:
                                                          • API String ID: 1213562535-0
                                                          • Opcode ID: 1bc35b01229753cb4fafd115ac49649a9fa455d67d4ab6f208d7d635679faf09
                                                          • Instruction ID: a76f02c3d00c0f83132a838a4f72fac08620b7f129fa7e83b97e2f8b0d62842d
                                                          • Opcode Fuzzy Hash: 1bc35b01229753cb4fafd115ac49649a9fa455d67d4ab6f208d7d635679faf09
                                                          • Instruction Fuzzy Hash: A751D3B2A50206AFDF20DFA5FC45ABEB7B8EF04344F051429E805F7190EB719A048B61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00E5A6D9,?,?,?,?,?,?,00000004), ref: 00E65D0B
                                                          • _wcschr.LIBVCRUNTIME ref: 00E65D9B
                                                          • _wcschr.LIBVCRUNTIME ref: 00E65DA9
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00E5A6D9,00000000,00E5A7F9), ref: 00E65E4C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                          • String ID:
                                                          • API String ID: 4147378913-0
                                                          • Opcode ID: dbc49de9f89237fa3a462ec4c42989fb38e67b18e95625f259c9c4e35457471d
                                                          • Instruction ID: a0bb1a48b91014e50b6203b83c58e9b7e66b3355afa2a61d6e1e98bc024c92cc
                                                          • Opcode Fuzzy Hash: dbc49de9f89237fa3a462ec4c42989fb38e67b18e95625f259c9c4e35457471d
                                                          • Instruction Fuzzy Hash: E661E772740B06AAD724AB74EC46BBB73E8EF04794F24146AF915FB181EB70AD448760
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00E593B2
                                                          • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 00E593CA
                                                          • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004,?,?,?,0000001C), ref: 00E59420
                                                          • VirtualProtect.KERNEL32(?,-00000001,00000104,?,?,?,0000001C), ref: 00E59435
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Virtual$AllocInfoProtectQuerySystem
                                                          • String ID:
                                                          • API String ID: 3562403962-0
                                                          • Opcode ID: dc3c705a46b39431e2a73f50c804b3e9b72a508445cfb22382ebad5cbcd4e6e8
                                                          • Instruction ID: 4f015b64a797602bfac643ee869d91492266e4c3e9738b34bd3ccd6136d579b4
                                                          • Opcode Fuzzy Hash: dc3c705a46b39431e2a73f50c804b3e9b72a508445cfb22382ebad5cbcd4e6e8
                                                          • Instruction Fuzzy Hash: 8C218D72E00119EBCF20DBA59C89AEEB7F8EF44755F011425E919F7182EA309909CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2AB5A: GetWindowLongW.USER32(?,000000F0), ref: 00E2AB67
                                                          • GetKeyState.USER32(00000010), ref: 00E218E2
                                                          • GetKeyState.USER32(00000011), ref: 00E218EF
                                                          • GetKeyState.USER32(00000012), ref: 00E218FC
                                                          • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 00E21916
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: State$LongMessageSendWindow
                                                          • String ID:
                                                          • API String ID: 1063413437-0
                                                          • Opcode ID: 72d96618b812c0766d42b539751c0a1c779cb7beabfaf1592c83587225c9170b
                                                          • Instruction ID: 4847aafa8fb6aba05e416cfbd764e8fe50a3fe8101b11c9abe233359f3fdc8a3
                                                          • Opcode Fuzzy Hash: 72d96618b812c0766d42b539751c0a1c779cb7beabfaf1592c83587225c9170b
                                                          • Instruction Fuzzy Hash: F7F052343402322FDA3077B0BC85BE82568DFA4B54F0028B8B286FE0C3CA9085C24462
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (I$@$hI$H
                                                          • API String ID: 0-3252275086
                                                          • Opcode ID: e367213836d088ff1eaca0ed4635a45703a4a11b128c293f131c374cacc3e48b
                                                          • Instruction ID: 75897cc5eb16b37093274efec68be342051d3639d128f26caf8c7e86208ede7d
                                                          • Opcode Fuzzy Hash: e367213836d088ff1eaca0ed4635a45703a4a11b128c293f131c374cacc3e48b
                                                          • Instruction Fuzzy Hash: 31F15A75E00218CFDF28CFA8C4906ADBBB1FF99314F24916AD81AAB395E7319955CB40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                            • Part of subcall function 00E5CE4E: _free.LIBCMT ref: 00E5CEA9
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E66068
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E660B9
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E66179
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: InfoLocale$ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 1690466582-0
                                                          • Opcode ID: c5941b22727f2ffbac8b88a8b8390871a4c972b257c7c13bcc89ff55c8370d56
                                                          • Instruction ID: c3fc9cf109f6d4f6ab483e97b61b320ef358186886a3ae1df7829854ae475239
                                                          • Opcode Fuzzy Hash: c5941b22727f2ffbac8b88a8b8390871a4c972b257c7c13bcc89ff55c8370d56
                                                          • Instruction Fuzzy Hash: C76104715A12079FDB289F24DC82BBA77A8EF05398F105079EC15E6196E734ED81CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00E4A746
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00E4A750
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00E4A75D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 8cfc9a2b4a959308e4ed37f4a1687b455d1ef180c898b3e2e16ce07c03ce0a2c
                                                          • Instruction ID: c044304787552fec6d6b1c7a0c309bd65c858bed3d4a060ca41c1ff81997b5d6
                                                          • Opcode Fuzzy Hash: 8cfc9a2b4a959308e4ed37f4a1687b455d1ef180c898b3e2e16ce07c03ce0a2c
                                                          • Instruction Fuzzy Hash: DE31D57490121CABCB21DF24E889BDDB7B8AF18310F5051EAE80CA6291E7709B858F45
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cf5dd68e2efac9364a7bf90a69f4571c0155ccf9e5fe11df5fc05dda589ce27e
                                                          • Instruction ID: e0cf4fc6e84e79e9cb2f537d040557a059c0e1d0dfcf669bb0aacca42b74c309
                                                          • Opcode Fuzzy Hash: cf5dd68e2efac9364a7bf90a69f4571c0155ccf9e5fe11df5fc05dda589ce27e
                                                          • Instruction Fuzzy Hash: 17023B71E002199BDF14CFA9D8806ADF7F1EF48315F25456AD819F7384D731AE458B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 8
                                                          • API String ID: 0-3897458245
                                                          • Opcode ID: 037e50103ac00812a28b685706e477036ef1f3a5ced53f08e2c3ea187f530a37
                                                          • Instruction ID: 82aa91b97c1e0567280cc531cfb80a0a6a93fc5adb9f043f12608abfb63b0a10
                                                          • Opcode Fuzzy Hash: 037e50103ac00812a28b685706e477036ef1f3a5ced53f08e2c3ea187f530a37
                                                          • Instruction Fuzzy Hash: 1F522A715083448FC725DF288880AEABBE5EF85314F14176DF4969B392D7B0DAC9CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 8
                                                          • API String ID: 0-3897458245
                                                          • Opcode ID: c8992822a2781a9bf7e5b28340ca20810c84f490c0c9f3c61a580b06baeefbaf
                                                          • Instruction ID: f4ba09cb8509e24a53d2c27aa823f26f7be7f65d490bca49fcf99169d765ad88
                                                          • Opcode Fuzzy Hash: c8992822a2781a9bf7e5b28340ca20810c84f490c0c9f3c61a580b06baeefbaf
                                                          • Instruction Fuzzy Hash: A85206715083488FC715CF2888C06EABBE5EF86314F1417ADF5A6AB392D774DA88C752
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,?), ref: 00E5BC30
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: 6bed19b917ec8067592b0ff4a4b127bb64efedf24b87ac1dbc4db727ab88125f
                                                          • Instruction ID: 20831aa1e50af2f85d2a1c88bf82d07b78093923109f3bec125e5d2f6337ab53
                                                          • Opcode Fuzzy Hash: 6bed19b917ec8067592b0ff4a4b127bb64efedf24b87ac1dbc4db727ab88125f
                                                          • Instruction Fuzzy Hash: 22B18F31110608CFD715CF28C48ABA5BBE0FF4536AF259A58EC9ADF2A1C735D985CB44
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantClear.OLEAUT32(00000000), ref: 00E37530
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: ece77007c9581083779902d739fe460f6d4ea74e3bc52f2624487fd4f074af93
                                                          • Instruction ID: 5b63bbd03d4173da35e71861f24d1dc8a0c7c46e967291822e797ce8df2913fb
                                                          • Opcode Fuzzy Hash: ece77007c9581083779902d739fe460f6d4ea74e3bc52f2624487fd4f074af93
                                                          • Instruction Fuzzy Hash: E19170B1A00616AFD768CF68C985A99BBF4FF48314F045169E949EB741D770E8A0CFC0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 54f56f4cb73202f82a908439cbed38307861d278ab0b3426fda9996a7b3a61fa
                                                          • Instruction ID: a37d07f65f30a115cbd7ac3e8e0daf7e93d9c0e218db30eb4928194c159ef1c7
                                                          • Opcode Fuzzy Hash: 54f56f4cb73202f82a908439cbed38307861d278ab0b3426fda9996a7b3a61fa
                                                          • Instruction Fuzzy Hash: 19312672900219BFCB24DFB9DC89DAF77BDEB85350F144168F905A7281EA30AE44CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                            • Part of subcall function 00E5CE4E: _free.LIBCMT ref: 00E5CEA9
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E662B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$InfoLocale_free
                                                          • String ID:
                                                          • API String ID: 787680540-0
                                                          • Opcode ID: f212ff9578575ce5512b60e5a634092d3ab00225e7a76d69378c9c45d94ba0c2
                                                          • Instruction ID: 12c5a186f71ecf028fea3355f11332b2aa06b0b5152f1aa15dd1c643e16a2018
                                                          • Opcode Fuzzy Hash: f212ff9578575ce5512b60e5a634092d3ab00225e7a76d69378c9c45d94ba0c2
                                                          • Instruction Fuzzy Hash: 3C21B3725A02069BDB249F25EC56BBA73ECEF85354F10117AED01E6291EB34AD44CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          • EnumSystemLocalesW.KERNEL32(00E66014,00000001,00000000,?,00E5A6D2,?,00E66647,00000000,?,?,?), ref: 00E65F5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                          • String ID:
                                                          • API String ID: 2417226690-0
                                                          • Opcode ID: 3684f8ee9650a6d6cd5353a3b59ba804def4c10bb2cb9984a53a3bfeb7ee888d
                                                          • Instruction ID: 2f19f72a8e26d8c1168fdae5a736afcd72ca51d2e91f311cf9c823d126da5211
                                                          • Opcode Fuzzy Hash: 3684f8ee9650a6d6cd5353a3b59ba804def4c10bb2cb9984a53a3bfeb7ee888d
                                                          • Instruction Fuzzy Hash: 6611E5373047059FDB189F39D8A55BAB7A1FF803ACB19442CEA869BA40D771B942C740
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00E66232,00000000,00000000,?), ref: 00E664C0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$InfoLocale
                                                          • String ID:
                                                          • API String ID: 3736152602-0
                                                          • Opcode ID: f481c56872653f689e7a4e5e18c3ea593ffc5fdd1ac88f6f04623a45d11a8677
                                                          • Instruction ID: c497b5537d0b88716bc370ad2b4267896a0c9ad699c197383e9c7493dd8fd135
                                                          • Opcode Fuzzy Hash: f481c56872653f689e7a4e5e18c3ea593ffc5fdd1ac88f6f04623a45d11a8677
                                                          • Instruction Fuzzy Hash: C0F0F932AA01167BDB249A25DC46ABA7798FB40399F151439ED19B3540EE30BE51C6D0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          • EnumSystemLocalesW.KERNEL32(00E66264,00000001,000000FF,?,00E5A6D2,?,00E6660B,00E5A6D2,?,?,?,?,?,00E5A6D2,?,?), ref: 00E65FD3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                          • String ID:
                                                          • API String ID: 2417226690-0
                                                          • Opcode ID: bc77ae8741a5943c44e75cf9d36e19c70125691487ccbc60fd4a9ca41cc1bfc0
                                                          • Instruction ID: 650d43679af5c998d52ebe6fb0663ee2c4087878fa01ee4e5c66cdd2a9db8656
                                                          • Opcode Fuzzy Hash: bc77ae8741a5943c44e75cf9d36e19c70125691487ccbc60fd4a9ca41cc1bfc0
                                                          • Instruction Fuzzy Hash: F9F022363447046FDB249F39AC91A7A7B94EF803ACF15842CF9059B690D7B1AC41CA40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5BF19: EnterCriticalSection.KERNEL32(?,?,00E5F777,?,00E9D780,0000000C), ref: 00E5BF28
                                                          • EnumSystemLocalesW.KERNEL32(00E5D12F,00000001,00E9D6E0,0000000C,00E5D623,00000000,00000000), ref: 00E5D174
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                          • String ID:
                                                          • API String ID: 1272433827-0
                                                          • Opcode ID: 39ab9573cd1bd4588d9f71591d70bb20ad5d7dca7c98506b7a7d2dcbf31426fd
                                                          • Instruction ID: eae831b0f8fffacb9bae00d9d81cd892f19610d5b859d9f4abec298e6744161c
                                                          • Opcode Fuzzy Hash: 39ab9573cd1bd4588d9f71591d70bb20ad5d7dca7c98506b7a7d2dcbf31426fd
                                                          • Instruction Fuzzy Hash: 8AF04972A10204AFEB14EF69ED0AB4E77F0EB09721F109615F810FB2E2CB7599588F40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,?,?,?,00E5A76C,?,20001004,?,00000002,?), ref: 00E5D7CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: InfoLocale
                                                          • String ID:
                                                          • API String ID: 2299586839-0
                                                          • Opcode ID: 08cd79b9aa46ec0b5ca97a177c77f6a03cb2a686d92f03cad69268d5edf307df
                                                          • Instruction ID: aa832eb5420303f951cf87fe0cbd5efc3fd34d1cc5837c237a6c7cc53c0fa298
                                                          • Opcode Fuzzy Hash: 08cd79b9aa46ec0b5ca97a177c77f6a03cb2a686d92f03cad69268d5edf307df
                                                          • Instruction Fuzzy Hash: 2AF0EC3060920CBFCB22AF61EC04AAE7BA5EF08712F01441AFC0576261CF318E24AB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          • EnumSystemLocalesW.KERNEL32(00E65DF8,00000001,000000FF,?,?,00E66669,00E5A6D2,?,?,?,?,?,00E5A6D2,?,?,?), ref: 00E65ED8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                          • String ID:
                                                          • API String ID: 2417226690-0
                                                          • Opcode ID: 5d888f0ff279b4087c56933e3dadc82021610e5347e0fdca7ea96c21a06b6413
                                                          • Instruction ID: ac376bfaedcc3010a563ef6da51e7e72326e72fa20b5b0059f7eaa7b91b4d182
                                                          • Opcode Fuzzy Hash: 5d888f0ff279b4087c56933e3dadc82021610e5347e0fdca7ea96c21a06b6413
                                                          • Instruction Fuzzy Hash: 7DF055373403055BCB04DF3AE849A6ABF90EFC27A4F460058EA09AB680C6329982C750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Iconic
                                                          • String ID:
                                                          • API String ID: 110040809-0
                                                          • Opcode ID: 33f65a826ac81a5b167f844188c01bceaa88addf9db926195e8ff9bb899ccb4f
                                                          • Instruction ID: 843946bd3df378794d6fbf514fa7318c59d08baaa6393e4b9071be7721770484
                                                          • Opcode Fuzzy Hash: 33f65a826ac81a5b167f844188c01bceaa88addf9db926195e8ff9bb899ccb4f
                                                          • Instruction Fuzzy Hash: DFD0C9315106709BC7265A25BC046D2B3A4BB14319B06142E9483A2570E6E09C90FB40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00044D3E,00E439AA), ref: 00E44D37
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: b2ac2015db5463be9b1e9652c6def18d9c149b5e1a473400b50f36d03fce3033
                                                          • Instruction ID: f20752bb2ac809d82ecba602e140a1c56c396856eae043f9e518172853fc11c4
                                                          • Opcode Fuzzy Hash: b2ac2015db5463be9b1e9652c6def18d9c149b5e1a473400b50f36d03fce3033
                                                          • Instruction Fuzzy Hash:
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 5a3b1337d93bcb87a2c6d9a67af7990983956be6d5384457711dfdee3ea763f0
                                                          • Instruction ID: ea27c9a00f72b1af58dcd913aa6128345ed455edb5ebaa88c11ae5342b2b2e6a
                                                          • Opcode Fuzzy Hash: 5a3b1337d93bcb87a2c6d9a67af7990983956be6d5384457711dfdee3ea763f0
                                                          • Instruction Fuzzy Hash: C351AA6160C64457DF388968BD96BFF23DB9B92308F18351AE842FB392C641ED038355
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: HeapProcess
                                                          • String ID:
                                                          • API String ID: 54951025-0
                                                          • Opcode ID: 155f193863ed701cf1264db7857f08cec9aab1e4ab99fdd05bf05c74d6f2a994
                                                          • Instruction ID: 25ea6b58686f89ad0035b19a844b5c3cd1d45521001da968acef97de8d53c7d0
                                                          • Opcode Fuzzy Hash: 155f193863ed701cf1264db7857f08cec9aab1e4ab99fdd05bf05c74d6f2a994
                                                          • Instruction Fuzzy Hash: CBA012301012008F57408F37590420F35D46BC018031041155008F1162D62440844600
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f2ec0d2613789016f8e166570981dac6513d45474e75d5ab92c6cb21bbed40ee
                                                          • Instruction ID: 64c40541d84bc11d600f1ebe414907e658e3894ec1c76e70e7d895902663b762
                                                          • Opcode Fuzzy Hash: f2ec0d2613789016f8e166570981dac6513d45474e75d5ab92c6cb21bbed40ee
                                                          • Instruction Fuzzy Hash: D6727BB1E002198FCB08CF99D8906ACBBF2FF88354F65516ED855BB381D775A942CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 02c264c7925b1cd20989524d6ba9ec8ad759a007ce4c6bfc693bfbd7759cfc3e
                                                          • Instruction ID: b3710765ddcadb12050017ecfc37c9036c7341348f1e3641da9e4d89ab47d369
                                                          • Opcode Fuzzy Hash: 02c264c7925b1cd20989524d6ba9ec8ad759a007ce4c6bfc693bfbd7759cfc3e
                                                          • Instruction Fuzzy Hash: 18322531D69F014DD7239635DD22335A388AFB73D8F15E727E81AB5AA6EF29C4874200
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0126dfb2ae3e1056ced80c99c70bf663844ba948f92ba6550ff3a83551e61f99
                                                          • Instruction ID: 673691e92e6cfd56e0220c2036faf440c32529da0a1c92cb59fa550045ab5efc
                                                          • Opcode Fuzzy Hash: 0126dfb2ae3e1056ced80c99c70bf663844ba948f92ba6550ff3a83551e61f99
                                                          • Instruction Fuzzy Hash: 09229D70E442059FDB14CF98D8807AEBBB2FF84348F6491A9D814BB391C775DA42CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f852f2e375a073a244264b28629c58ce75767c426af292b006526a9e32402e77
                                                          • Instruction ID: 9c82b9a2aba1df59e679e1c707f1151819460a2ed4cbd7ebf1ac11962dfa9585
                                                          • Opcode Fuzzy Hash: f852f2e375a073a244264b28629c58ce75767c426af292b006526a9e32402e77
                                                          • Instruction Fuzzy Hash: 41F1B431A00255DFCB08CF68C5906ADBBF2EF89314F24C19DD899EB342D775AA06CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1d16426023f6fda7057f25bde1b2f9e021c8babce63be733642e1a3c53e9e88f
                                                          • Instruction ID: 6b29ce398374966020774817d815cbb405ec61819c703c48addfa96c12a11f52
                                                          • Opcode Fuzzy Hash: 1d16426023f6fda7057f25bde1b2f9e021c8babce63be733642e1a3c53e9e88f
                                                          • Instruction Fuzzy Hash: 59F14D316082558FC709CF18D5949F67BF1FF69350B1A82F9D88A9B3A7D731A880CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strcspn
                                                          • String ID:
                                                          • API String ID: 3709121408-0
                                                          • Opcode ID: 50b5aaf59edfbcf982230df0a07688d064cfe648a67ce21bfdd2e6b122bcac06
                                                          • Instruction ID: c8746d8c87e2042f99defb0f73e905068c58299da1f1f9c200fcb303609fd2b0
                                                          • Opcode Fuzzy Hash: 50b5aaf59edfbcf982230df0a07688d064cfe648a67ce21bfdd2e6b122bcac06
                                                          • Instruction Fuzzy Hash: F1C1AF72E00619AFDF19DFA8DC41AAEBBB5FF49310F14412AF805B7291D730A951CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: abafc3236d98d550c459fb43ca6e14c779c0c3eb39c9853874deb01a087e7c18
                                                          • Instruction ID: 95f0b3d53565b8484005a411a1d8c5bfbee3466766001ad276a9e42f4d8d6f1a
                                                          • Opcode Fuzzy Hash: abafc3236d98d550c459fb43ca6e14c779c0c3eb39c9853874deb01a087e7c18
                                                          • Instruction Fuzzy Hash: 49B15432E052495FDF19CE78C8513EEBBE29F95306F1899D9EC11F7282EA348D498750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: 2f0c16f39b6cd4bdc3fc5456f900bb0b5debe55c798653ce5dadf7d99fc72a63
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: F091C7721080E34EDB6D463EA67803EFFE15A517A5B1A279ED4F2EB1C1FE20C554D620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction ID: b77948d8335a1ceca432ecef9542c82260e677190b00374f8b48de97d77dbf39
                                                          • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction Fuzzy Hash: EF91A67310D4A30EDB69463E967403EFFE15A927A5B0A279ED4F2EB0C1EE20C554E620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4ed4a107fb1cf032bb74807c1c617ef7d55ecb897c6cc7c1e5d6363254fddc8a
                                                          • Instruction ID: 0e484102559ec436c707525644ce14bd5bcced1e4bf9a95b3e2e8902fc0ef375
                                                          • Opcode Fuzzy Hash: 4ed4a107fb1cf032bb74807c1c617ef7d55ecb897c6cc7c1e5d6363254fddc8a
                                                          • Instruction Fuzzy Hash: 4761983170C60997CA389E28BC95BFF73D89B42708F50351AE443FB2D1EA90ED41834A
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e02e8f51819738c8fa9e6c3b0e916540662d75f587d31d349967f854f8a5a67
                                                          • Instruction ID: 6323ecd695449e7efc0ba5e3c00f300586544bb08c44ebabbff23f2b02990ed4
                                                          • Opcode Fuzzy Hash: 1e02e8f51819738c8fa9e6c3b0e916540662d75f587d31d349967f854f8a5a67
                                                          • Instruction Fuzzy Hash: A86178B1A0C608D7DA389A68BC95BFE73D8DB4630CF54355AE487FB280DE19ED428705
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 94216c1e751fa5de578113c9ed3092cf8eea0dcc9ebc5afb87d1967a18336de2
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: 1791F6722080A30EDB2D463EA67407EFFE15A527A5B1A279ED4F3DB1C1FE14C954D620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 778947efa9c760edc952b236ecacb498bf4dc1967693c83e85f63312d021199a
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: F381F73220D0E34EDB2D463EA63407EFFE15A527A5B0A279ED4F2DB1C1EE10C555D620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 68052141a0bdc4cda48e69fe2d9b45b1435d849edd0c152bb8fd28f39dc57a84
                                                          • Instruction ID: f8c1dff2c26e5367503e77a051aaf77fa7e76f82fad223367ccc7e2ffa3e62a7
                                                          • Opcode Fuzzy Hash: 68052141a0bdc4cda48e69fe2d9b45b1435d849edd0c152bb8fd28f39dc57a84
                                                          • Instruction Fuzzy Hash: 96718C31624164AFDB18CF6BECD047A7391E789301346892FEE85EB396C534E539DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f234c35f90504293debdb7ca502e9dfc9ad558d7570e6c8072fc9a31c4e8ee68
                                                          • Instruction ID: 59c157b3386d1e61ab5832639273d2bdb21c0afcd741aee63caeef00a56b00e7
                                                          • Opcode Fuzzy Hash: f234c35f90504293debdb7ca502e9dfc9ad558d7570e6c8072fc9a31c4e8ee68
                                                          • Instruction Fuzzy Hash: B651A171E00219AFDB08CF98C840BEEBBB5FF84305F188599E815AB201D7759E55CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0c87d990571d6d3d172ce26cc1b5ca51e77e9bebc740c61ffd216321408f180e
                                                          • Instruction ID: 6a71009521f201afa2db3d5675774cb274c9c8624ff84c7ca50c3715ee250158
                                                          • Opcode Fuzzy Hash: 0c87d990571d6d3d172ce26cc1b5ca51e77e9bebc740c61ffd216321408f180e
                                                          • Instruction Fuzzy Hash: 5541192121D2D89ECB0ACF6D48904AA7FE09EA6101F4884DAFCD8DF347C524DB59D7B2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c4b62afb825e04fd8a3e0b51a7584a89a2efd6d4ac992f759bcdc981faa360a2
                                                          • Instruction ID: f8a73ea11668384b97aeabfde470ab8de4475365091d5ec6ac9f7e421ef13686
                                                          • Opcode Fuzzy Hash: c4b62afb825e04fd8a3e0b51a7584a89a2efd6d4ac992f759bcdc981faa360a2
                                                          • Instruction Fuzzy Hash: FA219233F218384B6718C47E8C422B9F2E697CC1517498276E8A5EB3C5D9B8DD16E2E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1224e6f9f7fc1141f0181b4ca13485a8dc68f6e79e9b519c1739b565a4bbc767
                                                          • Instruction ID: 4b7add61a70d6131361d51baa545c6560d7a367e16b75d6e713ef52ba1fbf2d9
                                                          • Opcode Fuzzy Hash: 1224e6f9f7fc1141f0181b4ca13485a8dc68f6e79e9b519c1739b565a4bbc767
                                                          • Instruction Fuzzy Hash: 8C11C653F30935573B08856A8C93279A5D6EADC64035B933EE5A7D62C0E464EA27E3C0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction ID: e8fe90aa4af1430069ba292de3b76fe3926070aa7463c86e51da61803d423dbf
                                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction Fuzzy Hash: C5115B7724C08243D6048A3EF4B45B7E395EBC532872F637AD3C1AB758D322E9419580
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3c500d551490b2a2eeaa9dd0f018b75ed61514fe47833c09175feba067c394d1
                                                          • Instruction ID: ddf591723ced9b21d016f1e1a452299d69f3a21fd25a5f1e0e914dfb9d705678
                                                          • Opcode Fuzzy Hash: 3c500d551490b2a2eeaa9dd0f018b75ed61514fe47833c09175feba067c394d1
                                                          • Instruction Fuzzy Hash: ACE04632965228EBC724DAD89A04A9AF3FCEB09B12B1149AAF904E3610C2709E04C7D0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strstr$ErrorLastLibraryLoad
                                                          • String ID: %s%s$.turbomeet.com$666 %s$Failed to 111 LoadLibrary %d$Failed to 222 GetProcAddress %d$Failed to 444 error %d return value %d for WPADLocation = %s$Failed to 555 error %d, %s$Failed to 777 error %d$Failed to Detect 333 %d$HR::Detect$InternetDeInitializeAutoProxyDll$InternetGetProxyInfo$InternetInitializeAutoProxyDll$The script: %s$c:\rhub2\code\hlib\hlib.cpp$gomeetnow.com$gosupportnow.com$host=%s; url=%s, WPADLocation = %s$http://%s$http://%s%s$http://%s:%d$http://%s:%d%s$https://%s$https://%s%s$jsproxy.dll$rhubcom.com
                                                          • API String ID: 1723602470-3407230231
                                                          • Opcode ID: b5bca9d5409668d17d22f1b88720895f6b71c53e2a2a77d6e1713d5cd1187166
                                                          • Instruction ID: 0ac539d3aff349a502f2dfe54f3f44eea8f7450a6ebb61b62870310573f54ecf
                                                          • Opcode Fuzzy Hash: b5bca9d5409668d17d22f1b88720895f6b71c53e2a2a77d6e1713d5cd1187166
                                                          • Instruction Fuzzy Hash: 9BF1A471A44309BEDF239B60DC46FEA77BCAF15704F0090E9F508BA192D7716B898B61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E13110: GetModuleFileNameW.KERNEL32(00000000,?,00000200,?,?,?,?,00E09B9A,?,?,?,?,?,?,?,00000000), ref: 00E1321F
                                                            • Part of subcall function 00E13110: GetLongPathNameW.KERNEL32(?,?,00000200), ref: 00E1323A
                                                            • Part of subcall function 00E13110: GetUserNameW.ADVAPI32(?,00000200), ref: 00E132B9
                                                          • _strstr.LIBCMT ref: 00E09BBD
                                                          • GetTempPathW.KERNEL32(00000200,?), ref: 00E09BE0
                                                            • Part of subcall function 00E16610: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000000,00000000,?,00003829,?,?,00E017B0,?,00000000,00001000), ref: 00E16644
                                                            • Part of subcall function 00E16610: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,?,00000000,00000000,?,?,00E017B0,?,00000000,00001000,?,?), ref: 00E16661
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • _strstr.LIBCMT ref: 00E09D09
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Name$ByteCharCriticalMultiPathSectionWide_strstr$EnterFileLeaveLongModuleTempUser
                                                          • String ID: %s\%s$%s\%s\%s$--called_by_client_to_sync$--called_by_downloader$</__DESKTOP_DIRECTORY__>$</__START_MENUE_DIRECTORY__>$</__USER_APPLICATION_DIRECTORY__>$<__DESKTOP_DIRECTORY__>$<__START_MENUE_DIRECTORY__>$<__USER_APPLICATION_DIRECTORY__>$Read from sCommandParameterFile %s$Read from sCommandParameterFile = %s$Refine directory by %s$Refined directories: m_sUserApplicationDirectory = %s; m_sDesktopDirectory = %s, m_sStartMenuDirectory = %s$SetupHandler::InitializeSetup$TMServiceCache.txt$TurboMeeting$\$c:\rhub2\code\setuphandler\setuphandler.cpp$failed to load %s$rsp1024hcmd.txt$sCommandParameterFile = %s
                                                          • API String ID: 4122698823-3744154938
                                                          • Opcode ID: ac4ba0c48320a7d073df932bb7c0cf940dee7fe1e226690e627d3e715abf081c
                                                          • Instruction ID: 687b817a2e04341f3d10f414a088a8b1fd9cca332bfe7637f4ac423a26ecafb9
                                                          • Opcode Fuzzy Hash: ac4ba0c48320a7d073df932bb7c0cf940dee7fe1e226690e627d3e715abf081c
                                                          • Instruction Fuzzy Hash: 14B194B1A44308BAEB21DB60CC46FDA77FCAF05700F005595F65DB61C3DAB16AC88B65
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegisterWindowMessageW.USER32(Native), ref: 00E42254
                                                          • RegisterWindowMessageW.USER32(OwnerLink), ref: 00E42261
                                                          • RegisterWindowMessageW.USER32(ObjectLink), ref: 00E4226F
                                                          • RegisterWindowMessageW.USER32(Embedded Object), ref: 00E4227D
                                                          • RegisterWindowMessageW.USER32(Embed Source), ref: 00E4228B
                                                          • RegisterWindowMessageW.USER32(Link Source), ref: 00E42299
                                                          • RegisterWindowMessageW.USER32(Object Descriptor), ref: 00E422A7
                                                          • RegisterWindowMessageW.USER32(Link Source Descriptor), ref: 00E422B5
                                                          • RegisterWindowMessageW.USER32(FileName), ref: 00E422C3
                                                          • RegisterWindowMessageW.USER32(FileNameW), ref: 00E422D1
                                                          • RegisterWindowMessageW.USER32(Rich Text Format), ref: 00E422DF
                                                          • RegisterWindowMessageW.USER32(RichEdit Text and Objects), ref: 00E422ED
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageRegisterWindow
                                                          • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
                                                          • API String ID: 1814269913-2889995556
                                                          • Opcode ID: 68717a9f9dd75b6d898d86c9b462396821262252e93b209cacd027692faa63b5
                                                          • Instruction ID: 08d75178374c451a8dbd5d33b4f3218610029577a16eba8bc9bd57d6bb2e265d
                                                          • Opcode Fuzzy Hash: 68717a9f9dd75b6d898d86c9b462396821262252e93b209cacd027692faa63b5
                                                          • Instruction Fuzzy Hash: E01147B19427019FC720AFF2AC0D48A7EA0EF18F013015A19A25EB76B1E77591C98F85
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OutputDebugStringW.KERNEL32(raising exception,904898A6,771EF860,00000000,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17B42
                                                          • RaiseException.KERNEL32(80000003,?,?,?,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17B50
                                                          • OutputDebugStringW.KERNEL32(writing minidump,904898A6,771EF860,00000000,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17B88
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E17B8E
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17BAF
                                                          • PathRemoveFileSpecW.SHLWAPI(?,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17BBC
                                                          • LoadLibraryW.KERNEL32(?,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17BF1
                                                          • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17C0D
                                                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17C59
                                                          • __swprintf.LEGACY_STDIO_DEFINITIONS ref: 00E17C65
                                                          • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17CDA
                                                          • LoadLibraryW.KERNEL32(dbghelp.dll,?,?,?,?,?,?,00000000,00E47BD0,00E9A818,000000FE), ref: 00E17CE7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$CurrentDebugFileOutputPathString$ExceptionModuleNameProcessRaiseRemoveSpecTempThread__swprintf
                                                          • String ID: MiniDumpWriteDump$TMPlaying$\dbghelp.dll$dbghelp.dll$raising exception$writing minidump
                                                          • API String ID: 1873934928-1408066759
                                                          • Opcode ID: fb209b4b522a1c1a53f6a2621672a8642f8ed247a2c94f9e378fdda4b55fa7a9
                                                          • Instruction ID: 0b3e6dfa85e07f47b01ad59c77398c62e260d4605ff12e890c837f35324ab139
                                                          • Opcode Fuzzy Hash: fb209b4b522a1c1a53f6a2621672a8642f8ed247a2c94f9e378fdda4b55fa7a9
                                                          • Instruction Fuzzy Hash: C151E376900249AFCB20DF68DC44BEAB7B5FF88714F158128ED0DBB291DB309949CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Focus$MessageParentStateWindow$BeepDialogH_prolog3_catch
                                                          • String ID: +
                                                          • API String ID: 44247675-2126386893
                                                          • Opcode ID: 73af97d9e848dc23490f5f6ea9ac38293bab7120b9561bbfb2daf339f2e3d046
                                                          • Instruction ID: 3f9991f902c3bcb9f8506b88602ba12aa0b81a423357779cf43fa05894db3040
                                                          • Opcode Fuzzy Hash: 73af97d9e848dc23490f5f6ea9ac38293bab7120b9561bbfb2daf339f2e3d046
                                                          • Instruction Fuzzy Hash: 7AD1DF31A082259FDF25AB65EC4DABE7FB5EF44714F142119E846BB2A2CB30CC81CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E12230: __fread_nolock.LIBCMT ref: 00E122C3
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E0AA95
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E0AAA7
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AttributesCriticalFileSection$EnterLeave__fread_nolock
                                                          • String ID: --called_by_client_to_sync$--called_by_downloader$.cfg$.txt$.zip$Delay to load setting$Loaded %s successfully$PCClient.zip$PCClientAccessory.zip$SetupHandler::LoadSetupConfigure$both client files are available$c:\rhub2\code\setuphandler\setuphandler.cpp$c:\rhub2\pcsetup\pcsetup.cpp$starter.cfg
                                                          • API String ID: 936925517-164824950
                                                          • Opcode ID: 3ea0f0ed5d664bef1b90b3da92fb4b6d1d20d56e9b03e8b6d720b4c43f8aa059
                                                          • Instruction ID: a32ad6faaaf27d536f8558bf7c7d745a7dfe9580f951a652fc23dc7f992cc339
                                                          • Opcode Fuzzy Hash: 3ea0f0ed5d664bef1b90b3da92fb4b6d1d20d56e9b03e8b6d720b4c43f8aa059
                                                          • Instruction Fuzzy Hash: 3DA10571A40308ABDB24DB24CC46B9D77B4FF04308F14A5E8E5487B2D2DBB29AC58BD1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,?,00000108,00E265EA,?,?), ref: 00E2F8C7
                                                          • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 00E2F8D7
                                                          • EncodePointer.KERNEL32(00000000,?,?,?,00000108,00E265EA,?,?), ref: 00E2F8E0
                                                          • DecodePointer.KERNEL32(15066AE0,?,?,?,?,?,00000108,00E265EA,?,?), ref: 00E2F8EE
                                                          • GetUserDefaultUILanguage.KERNEL32(?,?,?,00000108,00E265EA,?,?), ref: 00E2F918
                                                          • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 00E2F928
                                                          • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 00E2F957
                                                          • GetSystemDefaultUILanguage.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E2F985
                                                          • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 00E2F995
                                                          • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 00E2F9CD
                                                          • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 00E2FA03
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: DownlevelLocaleName___crt$DefaultLanguagePointer$AddressDecodeEncodeHandleModuleProcSystemUser
                                                          • String ID: GetThreadPreferredUILanguages$kernel32.dll$e$e
                                                          • API String ID: 404278886-1276406016
                                                          • Opcode ID: 5e46b18a8a8ef16a9153f776414cebde5803bb7a23d268950675decb7fafe2d8
                                                          • Instruction ID: 837c334a74a5df47e254a0ab0488f91d46e31b9a081e3f9799195c63b5d30fcc
                                                          • Opcode Fuzzy Hash: 5e46b18a8a8ef16a9153f776414cebde5803bb7a23d268950675decb7fafe2d8
                                                          • Instruction Fuzzy Hash: 175118B290021AAFCB05EBA5D985DAFB7BCEF48340F111525F905F7251DB34AA09CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Internet Explorer,00000000,00000001,00000000,00000000), ref: 00E17182
                                                          • RegQueryValueExW.ADVAPI32(?,Build,00000000,00000000,?,?), ref: 00E171B5
                                                          • RegQueryValueExW.ADVAPI32(?,Version,00000000,00000000,?,?), ref: 00E1720C
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E17248
                                                            • Part of subcall function 00E19B10: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,-00000002,00000000,00000000,00000000,00000000,771EF860,?,?,00E18284,?,?,00000200), ref: 00E19B40
                                                            • Part of subcall function 00E19B10: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,-00000002,00000000,00000000,00000000,00000000,00000000,?,?,00E18284,?,?,00000200), ref: 00E19B62
                                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000001,?), ref: 00E17261
                                                          • RegQueryValueExW.ADVAPI32(?,MinorVersion,00000000,00000000,?,?), ref: 00E1728A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E172C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$ByteCharCloseMultiOpenWide
                                                          • String ID: Build$MinorVersion$P$Software\Microsoft\Internet Explorer$Software\Microsoft\Windows\CurrentVersion\Internet Settings$Version
                                                          • API String ID: 678391126-2977682357
                                                          • Opcode ID: 8016fb7afe43388156f4ba1c09aa2a7dd4e58834222de0c2559ea754fea7deaf
                                                          • Instruction ID: 590a2871d10445aacaa259218485261b4de95017de786b04aa0d816754bedd3d
                                                          • Opcode Fuzzy Hash: 8016fb7afe43388156f4ba1c09aa2a7dd4e58834222de0c2559ea754fea7deaf
                                                          • Instruction Fuzzy Hash: FA41B17465C305EAD710DF61EC06FAAB7B8BF48B00F005829FD49B25E1EB70A589CB56
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00E5C09C
                                                          • _free.LIBCMT ref: 00E5C0B2
                                                          • _free.LIBCMT ref: 00E5C0C3
                                                          • _free.LIBCMT ref: 00E5C0D4
                                                          • _free.LIBCMT ref: 00E5C0EB
                                                          • GetCPInfo.KERNEL32(?,?), ref: 00E5C133
                                                            • Part of subcall function 00E66F05: _free.LIBCMT ref: 00E66F70
                                                          • _free.LIBCMT ref: 00E5C2FD
                                                          • _free.LIBCMT ref: 00E5C310
                                                          • _free.LIBCMT ref: 00E5C31E
                                                          • _free.LIBCMT ref: 00E5C329
                                                          • _free.LIBCMT ref: 00E5C36B
                                                          • _free.LIBCMT ref: 00E5C373
                                                          • _free.LIBCMT ref: 00E5C37B
                                                          • _free.LIBCMT ref: 00E5C383
                                                          • _free.LIBCMT ref: 00E5C391
                                                            • Part of subcall function 00E65081: MultiByteToWideChar.KERNEL32(00E5C952,00000000,?,?,00000000,00000000,?,00000000,7FFFFFFF,-00000001,00E5C952,00000001,?,?,00000001,?), ref: 00E650C9
                                                            • Part of subcall function 00E65081: MultiByteToWideChar.KERNEL32(00E5C952,00000001,?,?,00000000,?), ref: 00E65153
                                                            • Part of subcall function 00E65081: GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00E65165
                                                            • Part of subcall function 00E65081: __freea.LIBCMT ref: 00E6516E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InfoStringType__freea
                                                          • String ID:
                                                          • API String ID: 607174680-0
                                                          • Opcode ID: 383c6df831668a02816b901ef57794f5e37df42a7f483600b968c6d1dccf97bc
                                                          • Instruction ID: 2d37239c16e7910962f699cf9e83932ada5fcc7e7afe7a9e1a46f582518ec8c6
                                                          • Opcode Fuzzy Hash: 383c6df831668a02816b901ef57794f5e37df42a7f483600b968c6d1dccf97bc
                                                          • Instruction Fuzzy Hash: 7EB1B37090430A9FDB21DFB4C895BEEBBF5FF08705F245469E849B7292DA719849CB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00000002,?,?,?,?), ref: 00E19D8C
                                                          • RegSetValueExW.ADVAPI32(?,?,00000000,00000004,?,00000004,?,?,?,?,?,?,?,?,?,?), ref: 00E19DF0
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?), ref: 00E19DFE
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E19E39
                                                          • RegSetValueExW.ADVAPI32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 00E19E7B
                                                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?), ref: 00E19E85
                                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?), ref: 00E19EAB
                                                          • WSAGetLastError.WS2_32(?,?), ref: 00E19EB5
                                                          Strings
                                                          • RegSetValueEx() failed. iErrorCode = %d, Error = %s, sKey = %s, sName = %s, sValue = %s, xrefs: 00E19E14, 00E19E9B
                                                          • RegistryHandler::AddRegistryValue(), xrefs: 00E19E22, 00E19ED9
                                                          • RegOpenKeyEx() failed. iErrorCode = %d, Error = %s, sKey = %s, sName = %s, sValue = %s, xrefs: 00E19ECB
                                                          • c:\rhub2\code\utility\registryhandler.cpp, xrefs: 00E19E1B, 00E19ED2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$CloseValue$ByteCharMultiOpenWide
                                                          • String ID: RegOpenKeyEx() failed. iErrorCode = %d, Error = %s, sKey = %s, sName = %s, sValue = %s$RegSetValueEx() failed. iErrorCode = %d, Error = %s, sKey = %s, sName = %s, sValue = %s$RegistryHandler::AddRegistryValue()$c:\rhub2\code\utility\registryhandler.cpp
                                                          • API String ID: 1877916705-1395665049
                                                          • Opcode ID: e9263ae33c623f9977cad4e979a31ed369c77d3fdb1b303d52080e1e59584414
                                                          • Instruction ID: 8fdde00c4a816f18813d433b8dcf68a51aaaaf19b40d978cabc5187c3bad774e
                                                          • Opcode Fuzzy Hash: e9263ae33c623f9977cad4e979a31ed369c77d3fdb1b303d52080e1e59584414
                                                          • Instruction Fuzzy Hash: 8741A371644304BFE220DB11DC86FEB77ECEF49714F005528FA4DB2192EB61A949C7A2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 00E6525B
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E64542
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E64554
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E64566
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E64578
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E6458A
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E6459C
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E645AE
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E645C0
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E645D2
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E645E4
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E645F6
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E64608
                                                            • Part of subcall function 00E64525: _free.LIBCMT ref: 00E6461A
                                                          • _free.LIBCMT ref: 00E65250
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          • _free.LIBCMT ref: 00E65272
                                                          • _free.LIBCMT ref: 00E65287
                                                          • _free.LIBCMT ref: 00E65292
                                                          • _free.LIBCMT ref: 00E652B4
                                                          • _free.LIBCMT ref: 00E652C7
                                                          • _free.LIBCMT ref: 00E652D5
                                                          • _free.LIBCMT ref: 00E652E0
                                                          • _free.LIBCMT ref: 00E65318
                                                          • _free.LIBCMT ref: 00E6531F
                                                          • _free.LIBCMT ref: 00E6533C
                                                          • _free.LIBCMT ref: 00E65354
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: e59ecfddde8c85ee534548f3770b5da6cff233b9b9a487ddd703129a6327abe1
                                                          • Instruction ID: 8296f0f2d54662fc6b00390c8fa6ae99cfbdac807d5e568b05ae9f1322e8a18e
                                                          • Opcode Fuzzy Hash: e59ecfddde8c85ee534548f3770b5da6cff233b9b9a487ddd703129a6327abe1
                                                          • Instruction Fuzzy Hash: 55318F72644B02DFEB30AA79EC49B5B73E9EF01395F24681AE458F72A1DF70AC458710
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,00000000,0000040E,?,?,00000000,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E17DCC
                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E17E16
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E17E31
                                                          • GetFileTime.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E17E43
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E17E63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleModuleNameSizeTime
                                                          • String ID: %s$Checksum: 0x%08x Time Stamp: 0x%08x$File Size: %-10d File Time: %s$Image Base: 0x%08x Image Size: 0x%08x$Module %d$Version Information:
                                                          • API String ID: 3087221180-4170275160
                                                          • Opcode ID: ee18649ff5778e6d80918af36d9d374fd76c946e209aae1eea35cbef038e458f
                                                          • Instruction ID: e4fce570b617a35433b3e66dc0fdb43ac893c52255ecba365339a22426f1baa8
                                                          • Opcode Fuzzy Hash: ee18649ff5778e6d80918af36d9d374fd76c946e209aae1eea35cbef038e458f
                                                          • Instruction Fuzzy Hash: C3417DB1A44248AFCB20DFA4DC41FEE77B8BF09704F405529FA19B6182D774A654CB68
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 952113a65a11a2aa5b390834f46b560fd4c18085fed53e3248da0e992cee0f9f
                                                          • Instruction ID: 7b24b71f45b259016794c6ae0da9ae0cafdc7cb353a13a7fe10e5a3b72bb5576
                                                          • Opcode Fuzzy Hash: 952113a65a11a2aa5b390834f46b560fd4c18085fed53e3248da0e992cee0f9f
                                                          • Instruction Fuzzy Hash: EAC154B2E80205AFDB20DBA8DC86FEF77F8AB49740F155565FA04FB2C2D6709A418750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3_strlen
                                                          • String ID:
                                                          • API String ID: 782648989-0
                                                          • Opcode ID: e1310441310796680981a6af369f170310f5167c735f33c770edfe63d08a00ca
                                                          • Instruction ID: 311d5ae452575e60115ec99679216d6a5c2180abbd8148d8bcd7f6dcc77aa853
                                                          • Opcode Fuzzy Hash: e1310441310796680981a6af369f170310f5167c735f33c770edfe63d08a00ca
                                                          • Instruction Fuzzy Hash: 23818B71D00229AFDF25DFA5EC85AEEBBB8FF04354F141169E905B7292DB309984CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E322FE
                                                          • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00E324F7
                                                          • _wcsrchr.LIBVCRUNTIME ref: 00E325AD
                                                          • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00E326C8
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E326EE
                                                          • UpdateWindow.USER32(?), ref: 00E32710
                                                          • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00E327CD
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E327F3
                                                          • UpdateWindow.USER32(?), ref: 00E32815
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$InvalidateRectUpdateWindow$H_prolog3__wcsrchr
                                                          • String ID: :/\
                                                          • API String ID: 3028567741-2793184486
                                                          • Opcode ID: 009d19686227523197f8690b0b8b4c7c541a398601bfc842bade9a7c38993fa2
                                                          • Instruction ID: 129b4a036c273b11d421f0c7b27ccad38fa5a45327de18b9d789a630f4180b39
                                                          • Opcode Fuzzy Hash: 009d19686227523197f8690b0b8b4c7c541a398601bfc842bade9a7c38993fa2
                                                          • Instruction Fuzzy Hash: 77F13C316002189FCB18EF24CD99BAD7BB5BF85301F1511D9E50AB72A2DB74AE89CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E03774: SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E0377D
                                                          • CopyRect.USER32(?,?), ref: 00E03594
                                                          • OffsetRect.USER32(?,?,?), ref: 00E035FB
                                                          • GetSysColor.USER32(00000012), ref: 00E03667
                                                          • GetSysColor.USER32(00000012), ref: 00E03679
                                                          • GetSysColor.USER32(0000000F), ref: 00E03687
                                                          • GetSysColor.USER32(00000012), ref: 00E036B4
                                                          • GetSysColor.USER32(0000000F), ref: 00E036C6
                                                          • OffsetRect.USER32(?,00000001,00000001), ref: 00E036DC
                                                          • GetSysColor.USER32(00000014), ref: 00E036EC
                                                          • OffsetRect.USER32(?,000000FF,000000FF), ref: 00E0370B
                                                          • GetSysColor.USER32(00000010), ref: 00E03715
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Offset$CopyMessageSend
                                                          • String ID:
                                                          • API String ID: 4180492184-0
                                                          • Opcode ID: ad961339cebf741575bd863d6a40861a43260e401f3377ce670dad5c24eac6c4
                                                          • Instruction ID: 2ba83c221c838dde5448aad7171e10349c1d9a5a26d19a3361970043fdb63c08
                                                          • Opcode Fuzzy Hash: ad961339cebf741575bd863d6a40861a43260e401f3377ce670dad5c24eac6c4
                                                          • Instruction Fuzzy Hash: AD615C71A00615AFCF14DFB8DC89AAEBBB9FF49320F144628E516A72D1CB70A944CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • __fread_nolock.LIBCMT ref: 00E1A435
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__fread_nolock
                                                          • String ID: %s\%s$<__ClientCalledToLaunch__>Y</__ClientCalledToLaunch__>$Invalid iStatusFileType = %d$StatusFileHandler::WriteStatus$c:\rhub2\code\utility\statusfilehandler.cpp$failed to open %s for writing$failed to replace %s for %s in %s$setup_status.txt
                                                          • API String ID: 3992567027-1419269579
                                                          • Opcode ID: 1ce00dc01bdb13865c2acbe61b222e8eb8ad04aedd685225949840fd445e6884
                                                          • Instruction ID: 5b8cce887ebd63155fb9fe49aab994ff4481bf71972aadef8b03da63a918f2cb
                                                          • Opcode Fuzzy Hash: 1ce00dc01bdb13865c2acbe61b222e8eb8ad04aedd685225949840fd445e6884
                                                          • Instruction Fuzzy Hash: FBA13871640248AFEB24EF64CC46FEE37AAEF45704F041128F918B7282DB7699848761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • __fread_nolock.LIBCMT ref: 00E1A095
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__fread_nolock
                                                          • String ID: %s\%s$<__ClientCalledToLaunch__>Y</__ClientCalledToLaunch__>$Invalid iStatusFileType = %d$StatusFileHandler::ReadStatus$c:\rhub2\code\utility\statusfilehandler.cpp$failed to find %s in %s$failed to open %s for writing$setup_status.txt
                                                          • API String ID: 3992567027-1335245224
                                                          • Opcode ID: 5dbcadc6da9cb4edece324c02118cf2d59c2221cdea7d50f739e61266917b116
                                                          • Instruction ID: d6a84ce223aaad5299186ae0cdbb2185fbdc809f28b17eeb0892347f395dcbda
                                                          • Opcode Fuzzy Hash: 5dbcadc6da9cb4edece324c02118cf2d59c2221cdea7d50f739e61266917b116
                                                          • Instruction Fuzzy Hash: EEA10471640348AFEB24EF64CC86FEE37A9EF44700F541528F918B7292D7769A84C761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E037ED
                                                          • GetClientRect.USER32(?,?), ref: 00E03817
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00E03820
                                                          • CreateRoundRectRgn.GDI32(?,?,?,?,00000000,00000000), ref: 00E03872
                                                          • FrameRgn.GDI32(00000001,00000000,?,00000001,00000001), ref: 00E0389F
                                                          • SetWindowRgn.USER32(?,00000000,00000000), ref: 00E038AC
                                                          • CreateRoundRectRgn.GDI32(?,?,?,?,00000000,00000000), ref: 00E039A0
                                                          • FrameRgn.GDI32(00000000,00000000,?,00000001,00000001), ref: 00E039C9
                                                          • SetWindowRgn.USER32(?,00000000,00000000), ref: 00E039D6
                                                          • DeleteDC.GDI32(?), ref: 00E039EE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateRect$FrameRoundWindow$ClientCompatibleDeleteH_prolog3_
                                                          • String ID:
                                                          • API String ID: 1417020339-0
                                                          • Opcode ID: 5ceb9063203e4c0df1d59be51f79560ee878c8b382289dad9626f8afcfe61580
                                                          • Instruction ID: b58cde3c7ffd1e66e006bfc3531bdd26a9e94b99825a96572910500f78542d93
                                                          • Opcode Fuzzy Hash: 5ceb9063203e4c0df1d59be51f79560ee878c8b382289dad9626f8afcfe61580
                                                          • Instruction Fuzzy Hash: 1B6116B1A00209AFDF15EBA4DC86EEEBBBAFF48304F106119F556B2291DB715D44CB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch.LIBCMT ref: 00E2D41E
                                                          • EnterCriticalSection.KERNEL32(?,00000010,00E2D319,?,00000000), ref: 00E2D42F
                                                          • TlsGetValue.KERNEL32(?,?,00000000), ref: 00E2D44B
                                                          • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000), ref: 00E2D4BB
                                                          • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000), ref: 00E2D4D5
                                                          • TlsSetValue.KERNEL32(?,00000000), ref: 00E2D506
                                                          • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 00E2D527
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 00E2D538
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 00E2D54A
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E2D554
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$AllocLocalValue$EnterException@8H_prolog3_catchThrow
                                                          • String ID:
                                                          • API String ID: 2756576426-0
                                                          • Opcode ID: d1dc6de80cc901a1b8dfb2384056558c293821102128dc7addaa12c45145e085
                                                          • Instruction ID: 882d6f30e3232dd9401043c300c38fb891dca0341d560d0d6e0525b94822a35f
                                                          • Opcode Fuzzy Hash: d1dc6de80cc901a1b8dfb2384056558c293821102128dc7addaa12c45145e085
                                                          • Instruction Fuzzy Hash: 66410F70504706EFC710EF64EC85D2AB7F4FF40314B209529E629B72A2CB70AD54CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 363f3eb1544732c4e20e3f6f0849ae4b962d8dfcc0d397ed1fa76b36858e827b
                                                          • Instruction ID: 1e90475619e930880cdd9a38d1e01d20c2cb7fce3ca3e736238f9406ba299956
                                                          • Opcode Fuzzy Hash: 363f3eb1544732c4e20e3f6f0849ae4b962d8dfcc0d397ed1fa76b36858e827b
                                                          • Instruction Fuzzy Hash: 3F21C776904109EFCB51EFA8C885DDE7BB9AF08301F1055A6B919AB161DB32DA498B80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E20DFB
                                                            • Part of subcall function 00E229B1: SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00E229EB
                                                            • Part of subcall function 00E229B1: SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00E22A15
                                                            • Part of subcall function 00E229B1: GetCapture.USER32 ref: 00E22A2B
                                                            • Part of subcall function 00E229B1: SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 00E22A3A
                                                          • GetClientRect.USER32(?,?), ref: 00E20ED4
                                                          • IsMenu.USER32(?), ref: 00E20F11
                                                          • AdjustWindowRectEx.USER32(?,00000000,00000000), ref: 00E20F24
                                                          • GetClientRect.USER32(?,?), ref: 00E20F71
                                                            • Part of subcall function 00E2D82F: __EH_prolog3.LIBCMT ref: 00E2D836
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageRectSend$ClientH_prolog3$AdjustCaptureMenuWindow
                                                          • String ID: ,%$,+$<+
                                                          • API String ID: 2126229686-2836839932
                                                          • Opcode ID: 25ce3459471531d6824c41c5edb3573824b51cfe7c6aa745c95e2856cf976d26
                                                          • Instruction ID: 75a446053ae458541d0b544223c272414049577772770851b80e3ce76e2004f9
                                                          • Opcode Fuzzy Hash: 25ce3459471531d6824c41c5edb3573824b51cfe7c6aa745c95e2856cf976d26
                                                          • Instruction Fuzzy Hash: 3141CE71A00229AFDF14EFA5D945EAEBBF9EF44310F105069F905B7292DB309A40CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E358C8
                                                          • GetStockObject.GDI32(00000011), ref: 00E358EC
                                                          • GetStockObject.GDI32(0000000D), ref: 00E358FB
                                                          • GetObjectW.GDI32(?,0000005C,?), ref: 00E3591C
                                                          • GetDeviceCaps.GDI32(?,0000005A), ref: 00E35996
                                                          • OleCreateFontIndirect.OLEAUT32(00000020,00E84984), ref: 00E359C9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Object$Stock$CapsCreateDeviceFontH_prolog3_Indirect
                                                          • String ID: $t'
                                                          • API String ID: 721287286-2338888337
                                                          • Opcode ID: ba525617293cbfd01166eb1486e20501d31830f09a10136c5db5619896ec0f6a
                                                          • Instruction ID: d8d936ba46c72693161742af94f4ca217d2d036ef1f584adb6e3b33ed39dfcfa
                                                          • Opcode Fuzzy Hash: ba525617293cbfd01166eb1486e20501d31830f09a10136c5db5619896ec0f6a
                                                          • Instruction Fuzzy Hash: 2E313B70A0026ACEDF24DFA5C859BDDBBB4BF59304F1050AAE558B7292DB709A84DF10
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 00E1FDD3
                                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00E1FDE3
                                                          • EncodePointer.KERNEL32(00000000,?,00000000), ref: 00E1FDEC
                                                          • DecodePointer.KERNEL32(00000000,?,00000000), ref: 00E1FDFA
                                                          • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00E1FE22
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeDirectoryEncodeHandleModuleProcSystem
                                                          • String ID: SetDefaultDllDirectories$\$kernel32.dll
                                                          • API String ID: 2101061299-3881611067
                                                          • Opcode ID: f46452115e2303bac8c39b41f06da675187f1e683a4d8099f4ed899e7b535008
                                                          • Instruction ID: f988ffba9a109da77fe9eeba8d4f52931e7918cd7e4367f26e3348e49ec3c865
                                                          • Opcode Fuzzy Hash: f46452115e2303bac8c39b41f06da675187f1e683a4d8099f4ed899e7b535008
                                                          • Instruction Fuzzy Hash: 09219671E40218ABDB20EB76AC4DBEB36ECAF14754F141575F809F2162E770D9888AD1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStockObject.GDI32(00000011), ref: 00E3E591
                                                          • GetStockObject.GDI32(0000000D), ref: 00E3E59D
                                                          • GetObjectW.GDI32(00000000,0000005C,?), ref: 00E3E5AE
                                                          • GetDC.USER32(00000000), ref: 00E3E5BD
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E3E5D4
                                                          • MulDiv.KERNEL32(?,00000048,00000000), ref: 00E3E5E0
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E3E5EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Object$Stock$CapsDeviceRelease
                                                          • String ID: System
                                                          • API String ID: 46613423-3470857405
                                                          • Opcode ID: 87bae969783604d51eeaa08f6551fcfc648873cbb87018f47c07043317c5532e
                                                          • Instruction ID: f9ca127d0a72bb5d215f0b14aab280e27842635c5ee885a64c54cd9f7695670b
                                                          • Opcode Fuzzy Hash: 87bae969783604d51eeaa08f6551fcfc648873cbb87018f47c07043317c5532e
                                                          • Instruction Fuzzy Hash: EB113A71600318ABEB14EB66DC4DBAE7BB8AF55705F001019FA0ABB2D1EA609D45DB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 159f4732cdc65def2ef099875dd6fb022e9ada247cfcc28423614a2ff2c177a5
                                                          • Instruction ID: e7168f695deffb74af4f92310d82002044be5bcfe0c96fa3f22dc3f67b77caa7
                                                          • Opcode Fuzzy Hash: 159f4732cdc65def2ef099875dd6fb022e9ada247cfcc28423614a2ff2c177a5
                                                          • Instruction Fuzzy Hash: 0802AC72910619DFCB05DFA9D8849EEBBB6FF49314B208169E915BB261D730AC81CBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E4072E
                                                          • SendMessageW.USER32(?,00000469,00000000,?), ref: 00E40830
                                                          • SendMessageW.USER32(?,0000046A,?,00000000), ref: 00E40844
                                                          • SendMessageW.USER32(?,00000468,?,00000000), ref: 00E40855
                                                          • SendMessageW.USER32(?,00000470,00000000,00000000), ref: 00E40895
                                                          • SendMessageW.USER32(?,0000046F,00000000,00000000), ref: 00E408E0
                                                          • SendMessageW.USER32(?,00000473,00000000,00000001), ref: 00E40908
                                                          • SendMessageW.USER32(?,0000046F,00000000), ref: 00E4098D
                                                          • SendMessageW.USER32(?,00000473,00000000), ref: 00E409D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$H_prolog3
                                                          • String ID:
                                                          • API String ID: 1885053084-0
                                                          • Opcode ID: eeb6b39af3c3cdf62641effcdf61158fb91d2570835fe2ec109d98be837b7904
                                                          • Instruction ID: f8478d21feeb357d6c6231f776446eee90c2d572ab6820485dcdeba31f37d351
                                                          • Opcode Fuzzy Hash: eeb6b39af3c3cdf62641effcdf61158fb91d2570835fe2ec109d98be837b7904
                                                          • Instruction Fuzzy Hash: 30A19874A00226DFDB08DF65E984B7EB7B5BF88310F141169EA16B7392CB30AD51DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E205EA
                                                          • SendMessageW.USER32(00000000,00000000,00000000,00000080), ref: 00E20630
                                                          • SendMessageW.USER32(00000000,00000000,00000000,?), ref: 00E2065C
                                                          • ValidateRect.USER32(?,00000000), ref: 00E2066B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$H_prolog3_RectValidate
                                                          • String ID:
                                                          • API String ID: 3261311288-0
                                                          • Opcode ID: a43f17db967a508c62248e37d3892723187d40b57f8ce9f47a95a8b3f8af5fd8
                                                          • Instruction ID: 92342c83e5a94a25e7b735f1c0f1a660dc5679e497e79dd5119cacf36e773320
                                                          • Opcode Fuzzy Hash: a43f17db967a508c62248e37d3892723187d40b57f8ce9f47a95a8b3f8af5fd8
                                                          • Instruction Fuzzy Hash: 2B417F71A00225DFCF21AFA1EC95AAEB7F5BF88304F10552DE05AB2262DB349954DF10
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strrchr
                                                          • String ID: PK$PK$PK
                                                          • API String ID: 3213747228-369804076
                                                          • Opcode ID: ccec5464d1c7143ef411daf9246e01527796d28af9cd5e3b800101de3bb5fcbf
                                                          • Instruction ID: 18cf99d2720716d4797ea4575f6d2ede94567d554add8d03b94b573e431c6757
                                                          • Opcode Fuzzy Hash: ccec5464d1c7143ef411daf9246e01527796d28af9cd5e3b800101de3bb5fcbf
                                                          • Instruction Fuzzy Hash: 6FB159329003869FDB29CF18C8417AEBBE5EF45315F1899A9EC54BB341D2349F49C7A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(user32.dll), ref: 00E215C0
                                                            • Part of subcall function 00E29057: __CxxThrowException@8.LIBVCRUNTIME ref: 00E2906B
                                                          • GetProcAddress.KERNEL32(00000000,GetGestureInfo), ref: 00E215F5
                                                          • GetProcAddress.KERNEL32(00000000,CloseGestureInfoHandle), ref: 00E2161D
                                                          • ScreenToClient.USER32(?,?), ref: 00E216A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ClientException@8HandleModuleScreenThrow
                                                          • String ID: CloseGestureInfoHandle$GetGestureInfo$user32.dll
                                                          • API String ID: 2384296010-2905070798
                                                          • Opcode ID: 175b9478a28b54b8f2f44826ca53599883e4966b367524361f1e47a31daf3584
                                                          • Instruction ID: 36083e6649e89aeb9a1d4d29b50892b22b88e104f5e8f223a720b11e1d706e64
                                                          • Opcode Fuzzy Hash: 175b9478a28b54b8f2f44826ca53599883e4966b367524361f1e47a31daf3584
                                                          • Instruction Fuzzy Hash: 79819F74A00629EFCB18DF69E8849A97BF4FB59314B1401A9E815F7760D731EE25CF80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _strstr.LIBCMT ref: 00E74A36
                                                          • _strncpy.LIBCMT ref: 00E74A57
                                                            • Part of subcall function 00E71660: _strstr.LIBCMT ref: 00E716B7
                                                            • Part of subcall function 00E71660: _strstr.LIBCMT ref: 00E716CD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strstr$_strncpy
                                                          • String ID: $DIRECT$PROXY $SOCKS $socks=%s
                                                          • API String ID: 1902495667-4265802993
                                                          • Opcode ID: 825e5b78e1910b90c9d3f047e77d95c1f7c2047e1bd2d644cf3466b0079b19bf
                                                          • Instruction ID: c409422bc3404c64bb2598462afe05c134f62bb2e4693f3a14c741dacd128970
                                                          • Opcode Fuzzy Hash: 825e5b78e1910b90c9d3f047e77d95c1f7c2047e1bd2d644cf3466b0079b19bf
                                                          • Instruction Fuzzy Hash: FB81BEB1900259AEEF21CF64DC45FEEBBB9EB45304F049199E90D7B282E7315A45CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CheckMenuItem.USER32(?,?,00000000), ref: 00E1E3F9
                                                            • Part of subcall function 00E2DC0D: GetWindowTextW.USER32(?,?,00000100), ref: 00E2DC63
                                                            • Part of subcall function 00E2DC0D: lstrcmpW.KERNEL32(?,00E1E507,?,00000000), ref: 00E2DC75
                                                            • Part of subcall function 00E2DC0D: SetWindowTextW.USER32(?,00E1E507), ref: 00E2DC81
                                                          • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 00E1E414
                                                          • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00E1E431
                                                          • SetMenuItemBitmaps.USER32(?,?,00000400,00000000,00000000), ref: 00E1E49E
                                                          • SetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E1E4EE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$MessageSendTextWindow$BitmapsCheckInfolstrcmp
                                                          • String ID: 0$@
                                                          • API String ID: 72408025-1545510068
                                                          • Opcode ID: a683385f145820d57fc6f45b59a1cf7975f41567c55b43e2b7bfc09f20ba06d2
                                                          • Instruction ID: 0ceef21391f717eb482877e9ce36af8bffab66fe44c3a2cef47f8a45c959e90c
                                                          • Opcode Fuzzy Hash: a683385f145820d57fc6f45b59a1cf7975f41567c55b43e2b7bfc09f20ba06d2
                                                          • Instruction Fuzzy Hash: 6F41CE31200225EFCB24DF65D848FEAB7B9FF04718F109629F91AB6652D771E881CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2AB5A: GetWindowLongW.USER32(?,000000F0), ref: 00E2AB67
                                                          • GetClientRect.USER32(?,?), ref: 00E20ED4
                                                          • IsMenu.USER32(?), ref: 00E20F11
                                                          • AdjustWindowRectEx.USER32(?,00000000,00000000), ref: 00E20F24
                                                          • GetClientRect.USER32(?,?), ref: 00E20F71
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Rect$ClientWindow$AdjustLongMenu
                                                          • String ID: ,%$,+$<+
                                                          • API String ID: 3435883281-2836839932
                                                          • Opcode ID: 9f09028ca1ab32dcf35c96e04596cf651ee694e3ba813145ffaff099dc06a979
                                                          • Instruction ID: f5ef74039e152f0ee3cd6f5325a57fa8d71e41d5e71ae1ffaa2bbec35460d1aa
                                                          • Opcode Fuzzy Hash: 9f09028ca1ab32dcf35c96e04596cf651ee694e3ba813145ffaff099dc06a979
                                                          • Instruction Fuzzy Hash: 92317071A00229AFDB14EFA5D949EBFBBF9EF48710B145069E905F3281DB709E00CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00E210A7
                                                          • FindResourceW.KERNEL32(?,00000000,AFX_DIALOG_LAYOUT), ref: 00E210DF
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 00E210F1
                                                          • LoadResource.KERNEL32(?,?), ref: 00E210FE
                                                          • LockResource.KERNEL32(00000000), ref: 00E2110B
                                                          • FreeResource.KERNEL32(00000000), ref: 00E21130
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindFreeLoadLockSizeofWindow
                                                          • String ID: AFX_DIALOG_LAYOUT
                                                          • API String ID: 4180966417-2436846380
                                                          • Opcode ID: 90fc7e0eb91e811aa69752c22c538c0763956e9ee1385a287a4fc73162d6e18f
                                                          • Instruction ID: 15be07667ec8764eaa5b077bfe7758700999268bc2160c9f22f6af512f23e518
                                                          • Opcode Fuzzy Hash: 90fc7e0eb91e811aa69752c22c538c0763956e9ee1385a287a4fc73162d6e18f
                                                          • Instruction Fuzzy Hash: D021E731A01314AFDB51AFB9AC4876E77F8AF58704F0440B8E604F3221EB708E54C750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00E3A2EC
                                                          • GetDesktopWindow.USER32 ref: 00E3A31A
                                                          • GetWindowRect.USER32(?,?), ref: 00E3A32D
                                                          • GetWindowRect.USER32(?,?), ref: 00E3A33A
                                                            • Part of subcall function 00E2AE75: MoveWindow.USER32(?,?,?,?,?,?,?,?,00E023E7,?,?,?,?,?), ref: 00E2AE92
                                                            • Part of subcall function 00E2B152: ShowWindow.USER32(?,000003E8,?,?,00E027E3,000003E8,00000005), ref: 00E2B163
                                                          • IntersectRect.USER32(?,?,?), ref: 00E3A544
                                                          • EqualRect.USER32(?,?), ref: 00E3A54F
                                                          • IsRectEmpty.USER32(?), ref: 00E3A559
                                                          • InvalidateRect.USER32(?,?,?,?,00000000), ref: 00E3A576
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: RectWindow$DesktopEmptyEqualIntersectInvalidateMoveShowVisible
                                                          • String ID:
                                                          • API String ID: 3589585919-0
                                                          • Opcode ID: a56476d8dcb4629b3596c9d00fd50a1c3b8769104dad375dde57823e772bed9d
                                                          • Instruction ID: d02a88d55c6b809f809394891945d6c0e9c79b7c6823afb9d66a3d76abe012f7
                                                          • Opcode Fuzzy Hash: a56476d8dcb4629b3596c9d00fd50a1c3b8769104dad375dde57823e772bed9d
                                                          • Instruction Fuzzy Hash: 45A14E71A00219DFCB04DFA9D988EAEBBB9FF48700F145169E545FB261DB70AD40CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 348cd7c930924d7461c81781c78ef67f21221e740160ec6fc4ff7190cc050a62
                                                          • Instruction ID: ff4c78c7714e6b51f64d32e61d4a8f1e0c751b65867da656a968fd4859ffe40e
                                                          • Opcode Fuzzy Hash: 348cd7c930924d7461c81781c78ef67f21221e740160ec6fc4ff7190cc050a62
                                                          • Instruction Fuzzy Hash: 865109B09C4305AFDB20AFB5BC81AAE77F4AF01398F145569F920B73D2EA319945CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RealChildWindowFromPoint.USER32(?,?,?), ref: 00E2DD10
                                                          • ClientToScreen.USER32(?,?), ref: 00E2DD2B
                                                          • GetWindow.USER32(?,00000005), ref: 00E2DD34
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00E2DD44
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E2DD54
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E2DD72
                                                          • PtInRect.USER32(?,?,?), ref: 00E2DD82
                                                          • GetWindow.USER32(00000000,00000002), ref: 00E2DD91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Rect$ChildClientCtrlFromLongPointRealScreen
                                                          • String ID:
                                                          • API String ID: 151369081-0
                                                          • Opcode ID: e3a204492458decf62103bfb8b5567c7c93db289909c541d0163f3ea37c5b513
                                                          • Instruction ID: a103a6ac8959a31995e676de0dd5d5f9c5d75d4d0b79fb5cb4f7ba410bbedc20
                                                          • Opcode Fuzzy Hash: e3a204492458decf62103bfb8b5567c7c93db289909c541d0163f3ea37c5b513
                                                          • Instruction Fuzzy Hash: 9921747190152AAFCB11DFB9DC489EFBBB8EF45310B144229F905F3251DB349A458BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadImageW.USER32(?,?,00000001,00000000,00000000,00008000), ref: 00E03F0C
                                                          • LoadImageW.USER32(?,?,00000001,00000000,00000000,00008000), ref: 00E03F22
                                                            • Part of subcall function 00E0373F: DestroyIcon.USER32(?,?,?,00E0320B,00000000,?,00000000,?,?,00E01F4B,00000066,?,00000004,00E01701), ref: 00E03756
                                                          • GetIconInfo.USER32(?,?), ref: 00E03F39
                                                          • GetObjectW.GDI32(?,00000018,?), ref: 00E03F48
                                                          • CopyImage.USER32(?,00000001,?,?,00008000), ref: 00E03F5C
                                                          • DeleteObject.GDI32(?), ref: 00E03F83
                                                          • DeleteObject.GDI32(?), ref: 00E03F88
                                                          • InvalidateRect.USER32(?,00000000,00000001,00000001), ref: 00E03F91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ImageObject$DeleteIconLoad$CopyDestroyInfoInvalidateRect
                                                          • String ID:
                                                          • API String ID: 2045126027-0
                                                          • Opcode ID: 17d81dffde3e1e57ad115cb5f17447107d60b381936ab4f9777a6e4143b50aa0
                                                          • Instruction ID: 515e5bd8fcbd8c57a1558b51b9712b363258c88da054fdf6976601e84a288bc9
                                                          • Opcode Fuzzy Hash: 17d81dffde3e1e57ad115cb5f17447107d60b381936ab4f9777a6e4143b50aa0
                                                          • Instruction Fuzzy Hash: 4E212171A40218BFDF119FA5DC45FDD7BB9EF08710F144056FA08BA1D1D7B1A9849BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00E03B4D
                                                          • GetParent.USER32(?), ref: 00E03B56
                                                          • PostMessageW.USER32(?,00000202,?,?), ref: 00E03B7B
                                                          • ClientToScreen.USER32(?,?), ref: 00E03B92
                                                          • GetParent.USER32(?), ref: 00E03B9B
                                                          • PostMessageW.USER32(?,00000202,?,?), ref: 00E03BC0
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00E03BE6
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E03BF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Message$ClientParentPostScreen$InvalidateRectSend
                                                          • String ID:
                                                          • API String ID: 4027511905-0
                                                          • Opcode ID: 24d75f38618c575801256309bdaeed1bd2b9f89ebe856f19d6190249227accf4
                                                          • Instruction ID: b28b941475ec1c8e0709465693e6ec78d10d7f9db4334b805fa92b4cf22d22e6
                                                          • Opcode Fuzzy Hash: 24d75f38618c575801256309bdaeed1bd2b9f89ebe856f19d6190249227accf4
                                                          • Instruction Fuzzy Hash: C9219371100224EFEB119F65DC08DAA7FB9FF84701B008529F59A950B2D7719894DB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E2619D
                                                          • lstrcmpW.KERNEL32(00000000,?), ref: 00E261AE
                                                          • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 00E261C3
                                                          • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00E261E3
                                                          • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00E261EB
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E261F5
                                                          • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 00E26206
                                                          • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 00E2621E
                                                            • Part of subcall function 00E2DBDA: GlobalFlags.KERNEL32(?), ref: 00E2DBE7
                                                            • Part of subcall function 00E2DBDA: GlobalUnlock.KERNEL32(?,?,?,?,00E25C72,00000000,904898A6), ref: 00E2DBF5
                                                            • Part of subcall function 00E2DBDA: GlobalFree.KERNEL32(?), ref: 00E2DC01
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                          • String ID:
                                                          • API String ID: 168474834-0
                                                          • Opcode ID: 493c5c0bec43ccbffe1dbe459fc25fd773ce54a75563766a5db1b7e61185d1f1
                                                          • Instruction ID: c4d2f3fbc844bba59a586b99e07a6825181679a3219c4e1c1d0384ceb62372a8
                                                          • Opcode Fuzzy Hash: 493c5c0bec43ccbffe1dbe459fc25fd773ce54a75563766a5db1b7e61185d1f1
                                                          • Instruction Fuzzy Hash: F51151B2400A18FFEB22AFA5ED85EAA7EECEF04748B001559B605A5032D771DD50DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E267D2
                                                          • CoCreateGuid.OLE32(?,00000000,00000000,00000030), ref: 00E2682F
                                                          • SysFreeString.OLEAUT32(?), ref: 00E26A25
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateFreeGuidH_prolog3_String
                                                          • String ID: %08lX-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$4J$RestartByRestartManager
                                                          • API String ID: 1084067465-914482400
                                                          • Opcode ID: 4090f7558313ef5cb73b1cd4992c9bf9bafd57569d9c40b8c983fc8c1163ae8d
                                                          • Instruction ID: 1b5a10f77a6a39ab996140819681f8be97ec6a582e0ca9402d7bd2c86efb9bfd
                                                          • Opcode Fuzzy Hash: 4090f7558313ef5cb73b1cd4992c9bf9bafd57569d9c40b8c983fc8c1163ae8d
                                                          • Instruction Fuzzy Hash: 18A19C71A00219AFCB04EFA8EC95EFEB7B9BF49310F145169F505B7292DA34AD44CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00E6B9ED,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00E6B7C3
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00E6B9ED,00000000,00000000,?,00000001,?,?,?,?), ref: 00E6B846
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00E6B9ED,?,00E6B9ED,00000000,00000000,?,00000001,?,?,?,?), ref: 00E6B8D6
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00E6B9ED,00000000,00000000,?,00000001,?,?,?,?), ref: 00E6B8ED
                                                            • Part of subcall function 00E5DEBD: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00E6B9ED,00000000,00000000,?,00000001,?,?,?,?), ref: 00E6B969
                                                          • __freea.LIBCMT ref: 00E6B994
                                                          • __freea.LIBCMT ref: 00E6B9A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: c7a2648ff363300d3ccd7ec7690f1966e9e75ef49de0baf06cc19f840b808286
                                                          • Instruction ID: 76f18573541972978b5c0783edf21fa09c545e4fac6f7aaa2ad5345347f9b384
                                                          • Opcode Fuzzy Hash: c7a2648ff363300d3ccd7ec7690f1966e9e75ef49de0baf06cc19f840b808286
                                                          • Instruction Fuzzy Hash: 2191D672E802169EDF249E64EC81AEE7BF59F89794F14261AE905F7241D734DCC0C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E28402
                                                          • MapDialogRect.USER32(?,00000000), ref: 00E284A9
                                                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00E284CF
                                                          • CLSIDFromString.OLE32(?,?,00000000), ref: 00E285DC
                                                          • CLSIDFromProgID.OLE32(?,?,00000000), ref: 00E285E4
                                                          • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013,00000001,00000000,?,00000000,?,?,00000000,00000378,00000000), ref: 00E2868F
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E286E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: String$From$AllocDialogFreeH_prolog3_ProgRectWindow
                                                          • String ID:
                                                          • API String ID: 773032744-0
                                                          • Opcode ID: 6e0d4e7130cd54ea535a68a494b90e8006be7f33be18bd27072e148ca732a9bd
                                                          • Instruction ID: 91217d38495a4061b1aec194d37f4859fca9ed0987c8a447bae6152e833efa97
                                                          • Opcode Fuzzy Hash: 6e0d4e7130cd54ea535a68a494b90e8006be7f33be18bd27072e148ca732a9bd
                                                          • Instruction Fuzzy Hash: 20B11475E012299FDB14DFA8C984AEDBBF5FF48310F14416AE819EB381EB30A945CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: f212c3640c4a9f1d2a4d1af9a3bfc1544e325f91e0e1d45665645be5f6831edb
                                                          • Instruction ID: dd7bb31f397767791b35d77d07fe1024ec4c92626daa7ddf241fda234de11698
                                                          • Opcode Fuzzy Hash: f212c3640c4a9f1d2a4d1af9a3bfc1544e325f91e0e1d45665645be5f6831edb
                                                          • Instruction Fuzzy Hash: D461D4B1D44205EFDB20DF68E841B9ABBF5EF49790F14156AE844FB381EB70AD418B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E04FA8
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E04FC7
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00E04FE7
                                                          • std::_Facet_Register.LIBCPMT ref: 00E05079
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00E05091
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                          • String ID: 9
                                                          • API String ID: 459529453-2455714165
                                                          • Opcode ID: 799c04b4d94ff5be069f55826bfb595ffb7feaaafae5a3a4d9bd2fc881447a3c
                                                          • Instruction ID: 1745764dcee9f7ed695a7385d5fff624dd1b506665eb53addea04b032ffeec67
                                                          • Opcode Fuzzy Hash: 799c04b4d94ff5be069f55826bfb595ffb7feaaafae5a3a4d9bd2fc881447a3c
                                                          • Instruction Fuzzy Hash: DA61DD72A00645CFDB11CFA8C884BAEBBF4EF59304F159059E506BB392DB70AD84CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetConsoleCP.KERNEL32(?,00E0EC8E,00E0EC8E,?,?,?,?,?,?,?,00E60526,00E4F84C,00E0EC8E,00E0EC8E,?,004BEC50), ref: 00E5FDDC
                                                          • __fassign.LIBCMT ref: 00E5FE5B
                                                          • __fassign.LIBCMT ref: 00E5FE7A
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00E0EC8E,00000001,00E0EC8E,00000005,00000000,00000000), ref: 00E5FEA7
                                                          • WriteFile.KERNEL32(?,00E0EC8E,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00E60526), ref: 00E5FEC7
                                                          • WriteFile.KERNEL32(?,00E4F84C,00000001,?,00000000,?,?,?,?,?,?,?,?,?,?,00E60526), ref: 00E5FF01
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: d2b51e9102623b1697ff383c9a27b8a24d38d7a6483294e33ae65def2cddbc2c
                                                          • Instruction ID: 1681740f83fa93bde57a7a80d9f3fc8f4b3489a43e428408298858eeac5a3e70
                                                          • Opcode Fuzzy Hash: d2b51e9102623b1697ff383c9a27b8a24d38d7a6483294e33ae65def2cddbc2c
                                                          • Instruction Fuzzy Hash: B0519171E00249AFCF10CFA8D885AEEBBF8EF09311F14556AE955F7292D730A945CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E3C707
                                                          • VariantClear.OLEAUT32(?), ref: 00E3C80B
                                                            • Part of subcall function 00E3C190: __EH_prolog3_GS.LIBCMT ref: 00E3C197
                                                            • Part of subcall function 00E3C190: VariantClear.OLEAUT32(?), ref: 00E3C37B
                                                            • Part of subcall function 00E3C190: VariantClear.OLEAUT32(?), ref: 00E3C58F
                                                            • Part of subcall function 00E3DFC8: VariantCopy.OLEAUT32(?,?), ref: 00E3DFD7
                                                          • VariantClear.OLEAUT32(?), ref: 00E3C7B3
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E3C871
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E3C880
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E3C88F
                                                          • VariantClear.OLEAUT32(?), ref: 00E3C8A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$FreeString$CopyH_prolog3H_prolog3_
                                                          • String ID:
                                                          • API String ID: 3189293932-0
                                                          • Opcode ID: 2b43b2ab10b640deb0735be0c1f50e69cfacd26bceefe75c3d186449b95794e1
                                                          • Instruction ID: daf7d80bda5a1bbb7dbc0b025392e0fbdd71bbf89a8506a98212c3c9fd1e1512
                                                          • Opcode Fuzzy Hash: 2b43b2ab10b640deb0735be0c1f50e69cfacd26bceefe75c3d186449b95794e1
                                                          • Instruction Fuzzy Hash: 9E513A71E00219DFDB18DFA4D889B9DBBB4FF08304F24516AE519B7291DB70A945CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw
                                                          • String ID:
                                                          • API String ID: 2005118841-0
                                                          • Opcode ID: cd8d53bbba84c818d1da35741a094da0037f6287181f1c08c6e5fb5b0ee25dd3
                                                          • Instruction ID: ccef126f572cab6acdae70f7bb1ef6c86fd754b44a4af3dfe6b90d4ad347388d
                                                          • Opcode Fuzzy Hash: cd8d53bbba84c818d1da35741a094da0037f6287181f1c08c6e5fb5b0ee25dd3
                                                          • Instruction Fuzzy Hash: 5E313735301621AFDB225735AC4CEBEBBAAAF84755F192035F505B7252DF148E41C6B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __Getcvt.LIBCPMT ref: 00E05EEF
                                                          • __Getcvt.LIBCPMT ref: 00E05F10
                                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00E05FC5
                                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00E05FCA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Concurrency::cancel_current_taskGetcvt
                                                          • String ID: false$true
                                                          • API String ID: 2176591428-2658103896
                                                          • Opcode ID: f1a997098f0453d77e9d1515baf2a2e80e9c851d5590cdf7bb1fe3350e810d91
                                                          • Instruction ID: 721410e4dbcbd978391afbe5dccb3b78cb4e34fd2ac4fb9058416bf73355c783
                                                          • Opcode Fuzzy Hash: f1a997098f0453d77e9d1515baf2a2e80e9c851d5590cdf7bb1fe3350e810d91
                                                          • Instruction Fuzzy Hash: 3D41D572A007058FDF14DFA4C9417ABBBF8EF44304F1491ADEA18BB282DBB5D9458B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E2730D
                                                          • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00000008,?), ref: 00E273FE
                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 00E2741B
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E2743C
                                                          • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 00E27457
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CloseEnumH_prolog3_OpenQueryValue
                                                          • String ID: Software\
                                                          • API String ID: 1666054129-964853688
                                                          • Opcode ID: 92f2cd1906a4c2786c25629e3376613111cea0808552e74869bd9ff33e2f9f4f
                                                          • Instruction ID: 195987e3231634483253488902f54a2ad8073c15ea6896c836f2ab2a0b7c59e4
                                                          • Opcode Fuzzy Hash: 92f2cd1906a4c2786c25629e3376613111cea0808552e74869bd9ff33e2f9f4f
                                                          • Instruction Fuzzy Hash: 36416131901139ABCF20EB90EC88EEEB7B9BF49314F105199F558B2251DB349E85CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2D94D: GetParent.USER32(?), ref: 00E2D9AA
                                                            • Part of subcall function 00E2D94D: GetLastActivePopup.USER32(?), ref: 00E2D9BD
                                                            • Part of subcall function 00E2D94D: IsWindowEnabled.USER32(?), ref: 00E2D9D1
                                                            • Part of subcall function 00E2D94D: EnableWindow.USER32(?,00000000), ref: 00E2D9E4
                                                          • EnableWindow.USER32(?,00000001), ref: 00E2DA43
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00E2DA59
                                                          • GetCurrentProcessId.KERNEL32 ref: 00E2DA63
                                                          • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 00E2DA79
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00E2DAFC
                                                          • MessageBoxW.USER32(?,?,?,00E291FA), ref: 00E2DB1E
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00E2DB43
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Enable$MessageProcess$ActiveCurrentEnabledFileLastModuleNameParentPopupSendThread
                                                          • String ID:
                                                          • API String ID: 1924968399-0
                                                          • Opcode ID: ae6ffae355b7cd6fc447997b64ed34b4b11f81f80816b86c8839643a29b195ef
                                                          • Instruction ID: ac9579c112270a054d5bf76c9f6a0f101373fa4de2ee6cb9b98214c459a8c154
                                                          • Opcode Fuzzy Hash: ae6ffae355b7cd6fc447997b64ed34b4b11f81f80816b86c8839643a29b195ef
                                                          • Instruction Fuzzy Hash: 1E419FB5A4822C9FDB20DF65DC88BE9B3B8FF14704F1015A9E619F7281D7709E808B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00E47BFB
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00E47C03
                                                          • _ValidateLocalCookies.LIBCMT ref: 00E47C91
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00E47CBC
                                                          • _ValidateLocalCookies.LIBCMT ref: 00E47D11
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 217541d8b9408687770573b6350633219f66cf1e6baf9d7fef7349022152ef6f
                                                          • Instruction ID: 55488c76f7070f4502aa0bceafb701fcb084fd57be161e9af2428e6bf1c51bbc
                                                          • Opcode Fuzzy Hash: 217541d8b9408687770573b6350633219f66cf1e6baf9d7fef7349022152ef6f
                                                          • Instruction Fuzzy Hash: 0D41D874E042099BCF00DF68E884A9EBBF5EF49328F149155E858BB392D7319D05CBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 00E26FF3
                                                          • RegOpenKeyExW.ADVAPI32(?,00000010,00000000,0002001F,?,00000230), ref: 00E270A5
                                                            • Part of subcall function 00E26F85: __EH_prolog3.LIBCMT ref: 00E26F8C
                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 00E270C9
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E27194
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CloseEnumH_prolog3H_prolog3_catch_Open
                                                          • String ID: Software\Classes\
                                                          • API String ID: 854624316-1121929649
                                                          • Opcode ID: ecffce8340ab961093c81e65d13c184f742a656b644a7b8460be517dc764525e
                                                          • Instruction ID: c52a71d1747223d6c3ca02122d2400332d0e923fa1534d57537991186652d62f
                                                          • Opcode Fuzzy Hash: ecffce8340ab961093c81e65d13c184f742a656b644a7b8460be517dc764525e
                                                          • Instruction Fuzzy Hash: 45419E31905229EBDB21EBA4ED89BEDB7B8BF44300F2010D9E44977291DB349F84CA60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(user32.dll), ref: 00E21E52
                                                          • GetProcAddress.KERNEL32(00000000,GetTouchInputInfo), ref: 00E21E87
                                                          • GetProcAddress.KERNEL32(00000000,CloseTouchInputHandle), ref: 00E21EAF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule
                                                          • String ID: CloseTouchInputHandle$GetTouchInputInfo$user32.dll
                                                          • API String ID: 667068680-1853737257
                                                          • Opcode ID: 135f5474881c811a5ba3e9620e43171c564a6deac2edbe1ff42db51765269c44
                                                          • Instruction ID: 5019a669c193d8913a619fad48a6cde4f592fc5500dc68d4b7eb839166173d62
                                                          • Opcode Fuzzy Hash: 135f5474881c811a5ba3e9620e43171c564a6deac2edbe1ff42db51765269c44
                                                          • Instruction Fuzzy Hash: 0E31B734B00211AFDB249F6AFD0896A3BA5FF5A7567001479F90AF7261DB30AD08CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a57a6b27cd2060aaef605babf9c5f3a8168a4b5f46a948466b94a51a887c95b7
                                                          • Instruction ID: 210798ce29d1999c43bb05002c245f2c08978ed6532a570e31180a9d6a70cbb5
                                                          • Opcode Fuzzy Hash: a57a6b27cd2060aaef605babf9c5f3a8168a4b5f46a948466b94a51a887c95b7
                                                          • Instruction Fuzzy Hash: 5A11D231544225BFDB206FB6AC08DAB3AE8EFC13A8B105528F855F6291DA3088009670
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 00E277D0
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00E277FC
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00E27828
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E2783A
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E27849
                                                            • Part of subcall function 00E2729F: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 00E272B0
                                                            • Part of subcall function 00E2729F: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00E272C0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CloseCreate$AddressHandleModuleOpenProc
                                                          • String ID: software
                                                          • API String ID: 550756860-2010147023
                                                          • Opcode ID: 937a8573d8c435f0edf5aa3728ef3e4b3001d80b7d657b43030a3e177be924eb
                                                          • Instruction ID: 4ed9ac96bf25bcbea0b527199b871b3b72df98cfdfc70b178609e3db0febd853
                                                          • Opcode Fuzzy Hash: 937a8573d8c435f0edf5aa3728ef3e4b3001d80b7d657b43030a3e177be924eb
                                                          • Instruction Fuzzy Hash: 4C216A72A04128BFDB19DB90AC48EBFBB7DEB04705F10506AB805F2111D7708E44D7A4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,user32.dll), ref: 00E22CA5
                                                          • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 00E22CB7
                                                          • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 00E22CC5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule
                                                          • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                                          • API String ID: 667068680-2470269259
                                                          • Opcode ID: 4cfd2bebd6b86fabe0753db83e92ed17dd999ad6bc9e665c2d79173707d81a51
                                                          • Instruction ID: d6c60840270b003faee9ed1ab14ea3937b35df8a37de660ff906befa292089f0
                                                          • Opcode Fuzzy Hash: 4cfd2bebd6b86fabe0753db83e92ed17dd999ad6bc9e665c2d79173707d81a51
                                                          • Instruction Fuzzy Hash: D811E632300624BFD710AB66EC48A6EF7ACFF44765B00512BFA09B7611CB70AC4587E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00E4EA47,00E5D11B,?,?,00E5B4AC,?,?), ref: 00E5CFA4
                                                          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E5B4AC,?,?), ref: 00E5CFCA
                                                          • _free.LIBCMT ref: 00E5D00A
                                                          • _free.LIBCMT ref: 00E5D03D
                                                          • SetLastError.KERNEL32(00000000,?), ref: 00E5D04A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID: Pn
                                                          • API String ID: 3170660625-1375425085
                                                          • Opcode ID: 62c54659c361ef225f802cef8455ff88eee0c12a8e2c8af5da142aa7f1c9ee0a
                                                          • Instruction ID: 95c9e6a85857344d667daa77430ba03d7c18574a82dccc48cc6503297a14af73
                                                          • Opcode Fuzzy Hash: 62c54659c361ef225f802cef8455ff88eee0c12a8e2c8af5da142aa7f1c9ee0a
                                                          • Instruction Fuzzy Hash: D411C6362482006F87316735AC85C6F22EB9B9A377B352E15FD34B21E1DE61CD1E6161
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                          • _free.LIBCMT ref: 00E5CEA9
                                                          • _free.LIBCMT ref: 00E5CEDD
                                                          • SetLastError.KERNEL32(00000000), ref: 00E5CEEA
                                                          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID: Pn
                                                          • API String ID: 3170660625-1375425085
                                                          • Opcode ID: 42176172446cd74a0da67a8dfebb6d1bbbbe96b680f2b7f4c186d47206e20cb2
                                                          • Instruction ID: d4a3ddf71d55aa53981c2d01d5421be67e3b52963c6b0e27fd36ce9dabcadaaf
                                                          • Opcode Fuzzy Hash: 42176172446cd74a0da67a8dfebb6d1bbbbe96b680f2b7f4c186d47206e20cb2
                                                          • Instruction Fuzzy Hash: CD11E5351442016EC7317335EC5AD7F22AA9BAB777F342E15FD34B21E1EE21881E6121
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E64C64: _free.LIBCMT ref: 00E64C8D
                                                          • _free.LIBCMT ref: 00E64F6C
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          • _free.LIBCMT ref: 00E64F77
                                                          • _free.LIBCMT ref: 00E64F82
                                                          • _free.LIBCMT ref: 00E64FD6
                                                          • _free.LIBCMT ref: 00E64FE1
                                                          • _free.LIBCMT ref: 00E64FEC
                                                          • _free.LIBCMT ref: 00E64FF7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: f775ad679ef64de4d42467409bf44ad96d34863621b3dc23410eb0229fc732d6
                                                          • Instruction ID: 6c66d8de6d91e99834e9f06a677c63f8baccd1240b7f7b240c41f5cb68f94cfe
                                                          • Opcode Fuzzy Hash: f775ad679ef64de4d42467409bf44ad96d34863621b3dc23410eb0229fc732d6
                                                          • Instruction Fuzzy Hash: 091181B1581B04AAE530B7B0DC8BFCBB7DD5F44740F40AC15B6A9762D2DE24B5098658
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00E03AA2
                                                          • GetParent.USER32(?), ref: 00E03AAB
                                                          • PostMessageW.USER32(?,00000201,?,?), ref: 00E03AD0
                                                          • ClientToScreen.USER32(?,?), ref: 00E03AE8
                                                          • GetParent.USER32(?), ref: 00E03AF1
                                                          • PostMessageW.USER32(?,00000201,?,?), ref: 00E03B16
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E03B2A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ClientMessageParentPostScreen$InvalidateRect
                                                          • String ID:
                                                          • API String ID: 640176750-0
                                                          • Opcode ID: 1926c4e1db33bb45722cd60ce3b49173feda067768aa93905edc1174a4afc922
                                                          • Instruction ID: 05ce8217a935121f2bd60e80461533ca50ff59412d9ddfcd5d71aef85bb00fff
                                                          • Opcode Fuzzy Hash: 1926c4e1db33bb45722cd60ce3b49173feda067768aa93905edc1174a4afc922
                                                          • Instruction Fuzzy Hash: 30112171110224EFEF119F71DC08EAA7BB9FF48711F008919F59A650B2D7759994DB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • RegCreateKeyW.ADVAPI32(?,?,?), ref: 00E19CC2
                                                          • RegCloseKey.ADVAPI32(?,?,?,?), ref: 00E19CD0
                                                          • WSAGetLastError.WS2_32(?,?,?), ref: 00E19CDA
                                                          Strings
                                                          • RegCreateKeyEx() failed. iErrorCode = %d, Error = %s, sKey = %s, xrefs: 00E19CEE
                                                          • RegistryHandler::AddRegistryKey(), xrefs: 00E19CFF
                                                          • c:\rhub2\code\utility\registryhandler.cpp, xrefs: 00E19CF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharCloseCreateErrorLastMultiWide
                                                          • String ID: RegCreateKeyEx() failed. iErrorCode = %d, Error = %s, sKey = %s$RegistryHandler::AddRegistryKey()$c:\rhub2\code\utility\registryhandler.cpp
                                                          • API String ID: 4090531696-2747358197
                                                          • Opcode ID: 955a27969c7cfe0431758c7e443fa09311194d8cbc2b687768fe515bc5caef9c
                                                          • Instruction ID: f90cd60095397e8d6c70fb96f406f14ee2fbf9df0e4b96ec7c26eb9e180f1a2e
                                                          • Opcode Fuzzy Hash: 955a27969c7cfe0431758c7e443fa09311194d8cbc2b687768fe515bc5caef9c
                                                          • Instruction Fuzzy Hash: B50192B6504300AFD660AB11EC46FEB77E8EF95700F005429FA4DB2192E770698A87A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00E26A7A,?,?,?,?), ref: 00E2FAF9
                                                          • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 00E2FB09
                                                          • EncodePointer.KERNEL32(00000000,?,?,00E26A7A,?,?,?,?), ref: 00E2FB12
                                                          • DecodePointer.KERNEL32(00000000,?,?,00E26A7A,?,?,?,?), ref: 00E2FB20
                                                          Strings
                                                          • kernel32.dll, xrefs: 00E2FAF4
                                                          • RegisterApplicationRecoveryCallback, xrefs: 00E2FB03
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: RegisterApplicationRecoveryCallback$kernel32.dll
                                                          • API String ID: 2061474489-202725706
                                                          • Opcode ID: f6411516631719fc42c60c5b9caaba302b4cf21c55ca219276b5bda34a3207c1
                                                          • Instruction ID: 18e0e33bae56f562379412e636119c96d1d23779688f5284f42d0798731da380
                                                          • Opcode Fuzzy Hash: f6411516631719fc42c60c5b9caaba302b4cf21c55ca219276b5bda34a3207c1
                                                          • Instruction Fuzzy Hash: 6CF01D31601225AF8F119FA6FE1899A7BB8EF087457001035FD0DB6231DB30D8548B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(shell32.dll), ref: 00E2FBBD
                                                          • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00E2FBCD
                                                          • EncodePointer.KERNEL32(00000000), ref: 00E2FBD6
                                                          • DecodePointer.KERNEL32(00000000), ref: 00E2FBE4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: SHGetKnownFolderPath$shell32.dll
                                                          • API String ID: 2061474489-2936008475
                                                          • Opcode ID: 40c71be5beb8df5521772ca118006b0833e567f4cf560e55a906f246841fb0d8
                                                          • Instruction ID: 67a580059527ef11e444d69edd585ea885d62c6dcb9c97fe1714b659b711de5a
                                                          • Opcode Fuzzy Hash: 40c71be5beb8df5521772ca118006b0833e567f4cf560e55a906f246841fb0d8
                                                          • Instruction Fuzzy Hash: DCF0303164422ABF8B11AFA2FD08CAA7AB8BF087417045138FD0EF6271DB7198558B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(comctl32.dll), ref: 00E2FC22
                                                          • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 00E2FC32
                                                          • EncodePointer.KERNEL32(00000000), ref: 00E2FC3B
                                                          • DecodePointer.KERNEL32(00000000), ref: 00E2FC49
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: TaskDialogIndirect$comctl32.dll
                                                          • API String ID: 2061474489-2809879075
                                                          • Opcode ID: 8c4bedd681dc0178c20c317db9c4df36d6f443c8d9254750dc2f5c4d4c6bb7cc
                                                          • Instruction ID: 26ae4e47fc512bc6398b7c96545bfc75550094b4cf6a15cb8a39c044dfd2c745
                                                          • Opcode Fuzzy Hash: 8c4bedd681dc0178c20c317db9c4df36d6f443c8d9254750dc2f5c4d4c6bb7cc
                                                          • Instruction Fuzzy Hash: A5F03031500229BF9F11AF62BD09C997BB8AF087417005034FD0EF6271D731D8549BA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00E26A5E,?,?), ref: 00E2FB5E
                                                          • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 00E2FB6E
                                                          • EncodePointer.KERNEL32(00000000,?,?,00E26A5E,?,?), ref: 00E2FB77
                                                          • DecodePointer.KERNEL32(00000000,?,?,00E26A5E,?,?), ref: 00E2FB85
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: RegisterApplicationRestart$kernel32.dll
                                                          • API String ID: 2061474489-1259503209
                                                          • Opcode ID: 1bf04e690a07b21b64a0ae345e8b2aab20b3db78b73732cd2a46e14a59a8f784
                                                          • Instruction ID: f0bdc2b103fcaa83758da11bec9342ea01101d5616f2485a91f49d1a25113ec3
                                                          • Opcode Fuzzy Hash: 1bf04e690a07b21b64a0ae345e8b2aab20b3db78b73732cd2a46e14a59a8f784
                                                          • Instruction Fuzzy Hash: B0F08C31601229BF8B10AB72FC1CCA93BB8AF48B953045135FD0EFA231DB30C9448B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00E26040,00000000), ref: 00E2F7D1
                                                          • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 00E2F7E1
                                                          • EncodePointer.KERNEL32(00000000,?,?,00E26040,00000000), ref: 00E2F7EA
                                                          • DecodePointer.KERNEL32(00000000,?,?,00E26040,00000000), ref: 00E2F7F8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: ApplicationRecoveryInProgress$kernel32.dll
                                                          • API String ID: 2061474489-2899047487
                                                          • Opcode ID: 3a5f3198179937d33f3bc8bf76f059cb4cc8a2ad200f4c2502a41da29265872b
                                                          • Instruction ID: 07683cde84ebe59e71eb5f047781db5fdeb62ef296fe6b14ced9a74f667f4bda
                                                          • Opcode Fuzzy Hash: 3a5f3198179937d33f3bc8bf76f059cb4cc8a2ad200f4c2502a41da29265872b
                                                          • Instruction Fuzzy Hash: 69F0A731A00325AF9B18ABB2BC0C96A7BBCAF04B453145134FD0DF7272DB30D9448790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00E26083,00000001), ref: 00E2F77C
                                                          • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 00E2F78C
                                                          • EncodePointer.KERNEL32(00000000,?,00E26083,00000001), ref: 00E2F795
                                                          • DecodePointer.KERNEL32(00000000,?,?,00E26083,00000001), ref: 00E2F7A3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: ApplicationRecoveryFinished$kernel32.dll
                                                          • API String ID: 2061474489-1962646049
                                                          • Opcode ID: b31064b26eb4392d7d376903495e195daa9f09d49897e1c8deab92ffc2af9896
                                                          • Instruction ID: c411196367c736772d763c5574c90d4eae0ff381538509d66c911bd290b847ba
                                                          • Opcode Fuzzy Hash: b31064b26eb4392d7d376903495e195daa9f09d49897e1c8deab92ffc2af9896
                                                          • Instruction Fuzzy Hash: 0FF03032611325AF8B10ABB6FC0885A3BACAF05B863015075FD0EF2262DB20DD458A90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(comctl32.dll), ref: 00E2FAAB
                                                          • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 00E2FABB
                                                          • EncodePointer.KERNEL32(00000000), ref: 00E2FAC4
                                                          • DecodePointer.KERNEL32(00000000), ref: 00E2FAD2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                                          • String ID: TaskDialogIndirect$comctl32.dll
                                                          • API String ID: 2061474489-2809879075
                                                          • Opcode ID: ff572629ee0c8619705f50387f22bd411ba677e78d5241b24bc02fdbb7316c64
                                                          • Instruction ID: d312284fcfa09e183f604d926809ac51092cbd1726d9c70140ba12d993de9d44
                                                          • Opcode Fuzzy Hash: ff572629ee0c8619705f50387f22bd411ba677e78d5241b24bc02fdbb7316c64
                                                          • Instruction Fuzzy Hash: 92E04871A45771AFAB10FB727D0899637E8EF057453051574F80EF2161E730CC4586A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(0000000F), ref: 00E2E00C
                                                          • GetSysColor.USER32(00000010), ref: 00E2E017
                                                          • GetSysColor.USER32(00000014), ref: 00E2E022
                                                          • GetSysColor.USER32(00000012), ref: 00E2E02D
                                                          • GetSysColor.USER32(00000006), ref: 00E2E038
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00E2E043
                                                          • GetSysColorBrush.USER32(00000006), ref: 00E2E04E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Color$Brush
                                                          • String ID:
                                                          • API String ID: 2798902688-0
                                                          • Opcode ID: 564ad3d10acac501e554a8cbc8f1d05006d098bf47eff72638980dd38fed9078
                                                          • Instruction ID: 112145710e837a4f2b4619bc70a43b390fe8b683f0d1c227c7176a5c46d58522
                                                          • Opcode Fuzzy Hash: 564ad3d10acac501e554a8cbc8f1d05006d098bf47eff72638980dd38fed9078
                                                          • Instruction Fuzzy Hash: 82F09EB19507109FE721EFB2A94D7867AA0BF08711F000D19E34E9B992D77590C4DF14
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __allrem.LIBCMT ref: 00E56223
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E5623F
                                                          • __allrem.LIBCMT ref: 00E56256
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E56274
                                                          • __allrem.LIBCMT ref: 00E5628B
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E562A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 4e5e403073922fd89b04acce72c3119d95467152bb764d8ed283d26fa2542c62
                                                          • Instruction ID: 6c77994ff8f5ff8d5d254fd44a8d7cdd40d97c447b6fa9e1f703b1c6cb968abb
                                                          • Opcode Fuzzy Hash: 4e5e403073922fd89b04acce72c3119d95467152bb764d8ed283d26fa2542c62
                                                          • Instruction Fuzzy Hash: 59813A72A00B06ABE7249E68DC41B6A73F8EF40365F54692DF944F7691EBB0DD088750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5CE4E: GetLastError.KERNEL32(?,?,00E54CF3,00E9D440,00000010), ref: 00E5CE52
                                                            • Part of subcall function 00E5CE4E: SetLastError.KERNEL32(00000000,00000006,000000FF,?,00E54CF3,00E9D440,00000010), ref: 00E5CEF6
                                                          • _memcmp.LIBVCRUNTIME ref: 00E5B08E
                                                          • _free.LIBCMT ref: 00E5B0FF
                                                          • _free.LIBCMT ref: 00E5B118
                                                          • _free.LIBCMT ref: 00E5B14A
                                                          • _free.LIBCMT ref: 00E5B153
                                                          • _free.LIBCMT ref: 00E5B15F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorLast$_memcmp
                                                          • String ID:
                                                          • API String ID: 4275183328-0
                                                          • Opcode ID: 7927de618c0b416d00f099b3fa160f38b884c1feab561912626301e91c40cd7e
                                                          • Instruction ID: 013202353c5d350995565563e3548af337a0114cd5322475bc6700f115539e35
                                                          • Opcode Fuzzy Hash: 7927de618c0b416d00f099b3fa160f38b884c1feab561912626301e91c40cd7e
                                                          • Instruction Fuzzy Hash: AFB14F75A01219DFDB24DF18C889AAEB7B4FF08305F5459AAD909B7390EB31AD94CF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,00000000,7FFFFFFF,?,?,?,?,00E672FD,00000001,00000001,00000000), ref: 00E67111
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,00000000,?,?,?,00E672FD,00000001,00000001,00000000,-00000001,?,?), ref: 00E6718F
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,-00000001,00000000,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00E67286
                                                          • __freea.LIBCMT ref: 00E67293
                                                            • Part of subcall function 00E5DEBD: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          • __freea.LIBCMT ref: 00E6729C
                                                          • __freea.LIBCMT ref: 00E672C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: 088fb0da701014ef347b84d0d7a2a3756e87aa6a22745bc9fb5c06ed99fae76a
                                                          • Instruction ID: 13fe0c55180cb299ba3c8327162a9e884dfba965eaf8dc201501f1dad3c2d288
                                                          • Opcode Fuzzy Hash: 088fb0da701014ef347b84d0d7a2a3756e87aa6a22745bc9fb5c06ed99fae76a
                                                          • Instruction Fuzzy Hash: 775123B2644206AFEB248F65EC41EBF37E9EB81798F185A29FC44F6150EB34DC448660
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E04043
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E04065
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00E04085
                                                          • __Getctype.LIBCPMT ref: 00E0412C
                                                          • std::_Facet_Register.LIBCPMT ref: 00E04155
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00E0416D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                          • String ID:
                                                          • API String ID: 1102183713-0
                                                          • Opcode ID: b38af2e151845a29b94f387a0f7fa96af74273fde5845373c094e850fa0b8038
                                                          • Instruction ID: 0f98f75ffc4e4ae6bef2f0693bc96639c297ee5b92626ad962f7561d86cb6cfb
                                                          • Opcode Fuzzy Hash: b38af2e151845a29b94f387a0f7fa96af74273fde5845373c094e850fa0b8038
                                                          • Instruction Fuzzy Hash: F841DDF1A00614CFCB11DF94E980BAAB7F4EF55714F149169EA06BB2C2DB70AD85CB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(?), ref: 00E3DCB9
                                                          • GetWindow.USER32(?,00000002), ref: 00E3DCDB
                                                          • GetWindow.USER32(?,00000002), ref: 00E3DCF0
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00E3DD03
                                                          • IsWindowVisible.USER32(?), ref: 00E3DD19
                                                          • GetTopWindow.USER32(?), ref: 00E3DD43
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$LongParentVisible
                                                          • String ID:
                                                          • API String ID: 506644340-0
                                                          • Opcode ID: ee2363d1dad49e8dbf0a49a66d3eafa1eeb23dad8bc5734b18c078294a296012
                                                          • Instruction ID: dea9115d951d3a9dc6cc5fe90db6da08d00396c6e4ab758e7489615c41d3fc44
                                                          • Opcode Fuzzy Hash: ee2363d1dad49e8dbf0a49a66d3eafa1eeb23dad8bc5734b18c078294a296012
                                                          • Instruction Fuzzy Hash: BE217132908624ABDF326B35EC0DBAEBEA9BF84754F452614BC46B7172D760DC50C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E2D985
                                                          • GetParent.USER32(?), ref: 00E2D993
                                                          • GetParent.USER32(?), ref: 00E2D9AA
                                                          • GetLastActivePopup.USER32(?), ref: 00E2D9BD
                                                          • IsWindowEnabled.USER32(?), ref: 00E2D9D1
                                                          • EnableWindow.USER32(?,00000000), ref: 00E2D9E4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                                          • String ID:
                                                          • API String ID: 670545878-0
                                                          • Opcode ID: 05edc3b79a21cda1f5dae76039dc8e78baee9589b21c863c86d1285568a110bf
                                                          • Instruction ID: 0b54b6e455141d397017817f543e6c19b230aa5bb22f3161324ef22ae48b45f7
                                                          • Opcode Fuzzy Hash: 05edc3b79a21cda1f5dae76039dc8e78baee9589b21c863c86d1285568a110bf
                                                          • Instruction Fuzzy Hash: 41110B326092305BD7225F26BC847ABB2AC6FD5B58B156115FE08F7251D7A0CCC087E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00E4919B,00E465C5), ref: 00E491B2
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E491C0
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E491D9
                                                          • SetLastError.KERNEL32(00000000,?,00E4919B,00E465C5), ref: 00E4922B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: cdfea079bcc2fa1d6cd9486b4235873cf3a879b5c8ced6bb79b953aea59a11ec
                                                          • Instruction ID: 4b0bad9d48059f13f1b047df41d3f4840dfc66312593af718f685c89bb29aee9
                                                          • Opcode Fuzzy Hash: cdfea079bcc2fa1d6cd9486b4235873cf3a879b5c8ced6bb79b953aea59a11ec
                                                          • Instruction Fuzzy Hash: D001473220D2123EAB242B75BC8986B3A94EB1B339339123AF520753F3FF520C089154
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2D29E: __EH_prolog3.LIBCMT ref: 00E2D2A5
                                                          • SendMessageW.USER32(?,00000433,00000000,?), ref: 00E21B0B
                                                          • GetWindowLongW.USER32(?,000000FC), ref: 00E21B16
                                                          • GetWindowLongW.USER32(?,000000FC), ref: 00E21B2A
                                                          • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00E21B53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$H_prolog3MessageSend
                                                          • String ID: ,
                                                          • API String ID: 4140968126-3772416878
                                                          • Opcode ID: 33a94942e05fc58ca2ec7fce1fa0da7410e55f0cc2ebc8e89714b54eb3e659c0
                                                          • Instruction ID: 222ce8f2b3b1923dd0eb5a6439ca068861fc4c68093ae8c007d8afbab61ecff8
                                                          • Opcode Fuzzy Hash: 33a94942e05fc58ca2ec7fce1fa0da7410e55f0cc2ebc8e89714b54eb3e659c0
                                                          • Instruction Fuzzy Hash: 0571A171700225AFCB15AF75E895A6D7BF5BF98310B0411A9E945BB292EB30EE40CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E3103C
                                                          • _wcsrchr.LIBVCRUNTIME ref: 00E3105D
                                                          • CoCreateGuid.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,00000028), ref: 00E31097
                                                          Strings
                                                          • %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X, xrefs: 00E310E7
                                                          • 4J, xrefs: 00E31080
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateGuidH_prolog3__wcsrchr
                                                          • String ID: %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X$4J
                                                          • API String ID: 1226536641-1768582390
                                                          • Opcode ID: 0b46f618f87e83f62db93b8f06ad794118fbdc1ba9563c1eef3d46c8b948789e
                                                          • Instruction ID: 14329ed12bc7dbe5c4b8c732a9416d42f4be8229685cf172d980f8cc1bb470bd
                                                          • Opcode Fuzzy Hash: 0b46f618f87e83f62db93b8f06ad794118fbdc1ba9563c1eef3d46c8b948789e
                                                          • Instruction Fuzzy Hash: 5E41D0B1900159AFCB05EBA8CC55AFEBBF8AF49311F141069F555F7282CA789E44CBB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E33D65
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E33D9B
                                                          • __EH_prolog3_catch.LIBCMT ref: 00E33DA8
                                                            • Part of subcall function 00E33CD9: __EH_prolog3.LIBCMT ref: 00E33CE0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3$Exception@8H_prolog3_catchThrow
                                                          • String ID: tG$tG
                                                          • API String ID: 24280941-276734821
                                                          • Opcode ID: ffeac092064d486add30960b30637f64207795e5b14875193f57bb41ada60a06
                                                          • Instruction ID: 33100789b2552c7b6d06150f20437e88eaad1101002bfbda77bb668a5c24ef66
                                                          • Opcode Fuzzy Hash: ffeac092064d486add30960b30637f64207795e5b14875193f57bb41ada60a06
                                                          • Instruction Fuzzy Hash: 9F31847190120AABDF14EFB4CC46BEEBBE8AF00314F105928F511B72D2DB749A50C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Edit
                                                          • API String ID: 0-554135844
                                                          • Opcode ID: 4fe797aab532ddfdc205b8bb995e067f49ae526db5ab2f6a65f6906d784a530d
                                                          • Instruction ID: 12f00aa3e6a67098b8ded13c74e4cfc6c11ba69197026161a3f7da2add45bd1f
                                                          • Opcode Fuzzy Hash: 4fe797aab532ddfdc205b8bb995e067f49ae526db5ab2f6a65f6906d784a530d
                                                          • Instruction Fuzzy Hash: 7411A531300225ABEA311F35BC09BF677A8AF54759F156429E646F20A1DB60D840D6A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E2F244
                                                          • GetClassNameW.USER32(?,00000000,00000400), ref: 00E2F27B
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E2F2B4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ClassH_prolog3LongNameWindow
                                                          • String ID: ComboBox$ComboBoxEx32
                                                          • API String ID: 297531199-1907415764
                                                          • Opcode ID: 31229c7d76762db59d439197e02617ac94984b1a9ca720eebe839845bc41b305
                                                          • Instruction ID: 7812538a959a578c7755d094d1db144e651b167fbc1c675be1dbf17e55488d81
                                                          • Opcode Fuzzy Hash: 31229c7d76762db59d439197e02617ac94984b1a9ca720eebe839845bc41b305
                                                          • Instruction Fuzzy Hash: 5501C476504222ABDB00F760DC06BEE73F8BF21325F502529F911721E2DF305944CBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _wcsrchr
                                                          • String ID: .bat$.cmd$.com$.exe
                                                          • API String ID: 1752292252-4019086052
                                                          • Opcode ID: b608ef2730227f46cd9f390ffb1cb4ba35b288134ea2c8e7d9b615ce5e880007
                                                          • Instruction ID: 87591ea807792b2d555eecc52138162003f3433caa5d16b8b7078404de91bfd8
                                                          • Opcode Fuzzy Hash: b608ef2730227f46cd9f390ffb1cb4ba35b288134ea2c8e7d9b615ce5e880007
                                                          • Instruction Fuzzy Hash: 17F0C23328AF122599243220BC22ADA17C88F22377FE17816FC2C764E5EE4199C942A4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E3328E
                                                          • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 00E3329E
                                                          • CreateFileW.KERNEL32(?,?,?,?,?,?,00000000), ref: 00E332E7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressCreateFileHandleModuleProc
                                                          • String ID: CreateFileTransactedW$kernel32.dll
                                                          • API String ID: 2580138172-2053874626
                                                          • Opcode ID: a5f8355767f2d7777f98404c3d3719f31016ad1dd914778fa508f890868a530d
                                                          • Instruction ID: 3c0cd929cab8c622c9c02005bc9dd572bf1cf7dd5dbd47de1f443188a9b312a1
                                                          • Opcode Fuzzy Hash: a5f8355767f2d7777f98404c3d3719f31016ad1dd914778fa508f890868a530d
                                                          • Instruction Fuzzy Hash: 5101483610020ABFCF125FA1DC09CAB3F7AFF98795B148129FA1861074C732C961EB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00E17E5F,?,?,?,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E17FD1
                                                          • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00E17FEA
                                                          • wsprintfW.USER32 ref: 00E18031
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Time$File$DateLocalwsprintf
                                                          • String ID: %d/%d/%d %02d:%02d:%02d$_~
                                                          • API String ID: 3193010481-2688097607
                                                          • Opcode ID: 50dbdf10b228c529a74023e3e7aace5ae31ad470af2b5edeb22c723c52bc04c5
                                                          • Instruction ID: 45f71a4cc260df2d6acbf5525c49ab502c47dea3f5bf2352fc764f4adf68d917
                                                          • Opcode Fuzzy Hash: 50dbdf10b228c529a74023e3e7aace5ae31ad470af2b5edeb22c723c52bc04c5
                                                          • Instruction Fuzzy Hash: 0501F4F36102157FE308CB59CC01ABB73ECEFD8340B04842EF949E6241E634D98483A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 00E30F47
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E30F57
                                                            • Part of subcall function 00E27240: GetModuleHandleW.KERNEL32(Advapi32.dll,?), ref: 00E27253
                                                            • Part of subcall function 00E27240: GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 00E27263
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: Advapi32.dll$RegDeleteKeyExW
                                                          • API String ID: 1646373207-2191092095
                                                          • Opcode ID: a0347afb477403574bd9067ea3e1401df80ba89525672acb869f81d23b6b7234
                                                          • Instruction ID: 9a5bbb3e9a0a911d9c5344b9abe3f83f02ad8ebb83230ab1edbff789ea42db9c
                                                          • Opcode Fuzzy Hash: a0347afb477403574bd9067ea3e1401df80ba89525672acb869f81d23b6b7234
                                                          • Instruction Fuzzy Hash: 89015A35709214EFCB225F66EC18B99BF65BF0DB51F145025F909B2171CBA2A864EB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00E4FDEF,?,?,00E4FDB7,?,?), ref: 00E4FE5E
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E4FE71
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00E4FDEF,?,?,00E4FDB7,?,?), ref: 00E4FE94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 5c4a22598d22cbae65a15ba431fba3f560f3b49011dc86cd42d51a7e2baebe75
                                                          • Instruction ID: 8264e77b4761a5beba381b1f2703808cc8ab1a8f18bb25cfac17203c2ac0f0b3
                                                          • Opcode Fuzzy Hash: 5c4a22598d22cbae65a15ba431fba3f560f3b49011dc86cd42d51a7e2baebe75
                                                          • Instruction Fuzzy Hash: 41F04430A00209BFDB15AF65EC09BAEBBB4EF48B26F510164F80DB21A1DB319D85CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5B681: _free.LIBCMT ref: 00E5B6A1
                                                          • _free.LIBCMT ref: 00E5B637
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          • _free.LIBCMT ref: 00E5B64A
                                                          • _free.LIBCMT ref: 00E5B65B
                                                          • _free.LIBCMT ref: 00E5B66C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID: xxH
                                                          • API String ID: 776569668-977459878
                                                          • Opcode ID: 21b09a562c642d60b2d46ab2f97574e8357db21bdde32080ce6b23a0557b76d3
                                                          • Instruction ID: b6bae32bf66db089e7af4aae4a2d4bc65238b5b0e758f0081b378c4e3971662b
                                                          • Opcode Fuzzy Hash: 21b09a562c642d60b2d46ab2f97574e8357db21bdde32080ce6b23a0557b76d3
                                                          • Instruction Fuzzy Hash: 8CF030708152116E8625BF16FD8E84B7BE5E744751B101706F80832272DF72261EDBC1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant$H_prolog3_
                                                          • String ID:
                                                          • API String ID: 2346260723-0
                                                          • Opcode ID: 004870f63d29da54d3954989af97bad6a883fd716b63b0bf8d19d7ca11bff229
                                                          • Instruction ID: bb7ff1b256494280ab686d74154d9354d6607e9747e7b5a919e8bedab41f20aa
                                                          • Opcode Fuzzy Hash: 004870f63d29da54d3954989af97bad6a883fd716b63b0bf8d19d7ca11bff229
                                                          • Instruction Fuzzy Hash: A5D10570D05208EACF04DBA4D999AFEBFB9FF05304F24A08AF541B7291DB359A84D761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 00E40CA3
                                                          • _strlen.LIBCMT ref: 00E40CD4
                                                            • Part of subcall function 00E28FEB: _memcpy_s.LIBCMT ref: 00E28FFA
                                                            • Part of subcall function 00E412C5: __EH_prolog3.LIBCMT ref: 00E412CC
                                                            • Part of subcall function 00E412C5: VariantChangeType.OLEAUT32(?,?,00000000,0000000D), ref: 00E4136C
                                                          • VariantClear.OLEAUT32(?), ref: 00E40EE3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Variant$ChangeClearH_prolog3H_prolog3_catch_Type_memcpy_s_strlen
                                                          • String ID:
                                                          • API String ID: 961710286-0
                                                          • Opcode ID: cd76e7677394016166ea2243c365a99420fd0cea24ee40fab17c74cc0cf176ea
                                                          • Instruction ID: 4fc939b0874d57db1802b32d709bad021ac27f800e43b14e9c79109e9de7c6f3
                                                          • Opcode Fuzzy Hash: cd76e7677394016166ea2243c365a99420fd0cea24ee40fab17c74cc0cf176ea
                                                          • Instruction Fuzzy Hash: B0B18C71E00219EBCF10EFA4E8809EEBBB0FF08314F149469F915BB251D735A956DBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 33a3ed1333cbc8d23417e18b5e2d3a77f0936df37a0e8a649f11a5d49cb2d8e5
                                                          • Instruction ID: d8eb40e908a8dad2627d6fa9cc3d7f8f67f95ae974989dbd9ea69faba2e6468b
                                                          • Opcode Fuzzy Hash: 33a3ed1333cbc8d23417e18b5e2d3a77f0936df37a0e8a649f11a5d49cb2d8e5
                                                          • Instruction Fuzzy Hash: FA71E7319482169FCB21CF55E844ABFBB75FF513ADF24622AE4A077281D770AC41CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E5DEBD: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          • _free.LIBCMT ref: 00E5AA71
                                                          • _free.LIBCMT ref: 00E5AA88
                                                          • _free.LIBCMT ref: 00E5AAA7
                                                          • _free.LIBCMT ref: 00E5AAC2
                                                          • _free.LIBCMT ref: 00E5AAD9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 3033488037-0
                                                          • Opcode ID: 031285b2b0ee209a23350fd5a0b2224f5a23374682b228c02a0d99baf3d7a316
                                                          • Instruction ID: f82dd99e21075ffc367802220cc95c5605764e5dfba73784660d619aaf0ae631
                                                          • Opcode Fuzzy Hash: 031285b2b0ee209a23350fd5a0b2224f5a23374682b228c02a0d99baf3d7a316
                                                          • Instruction Fuzzy Hash: 0651C131A00204AFDB21DF29CD41A6A77F5EF58726F581A69EC09F7291EB31ED09CB41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 0aaa4d6d83505fce6bf6b5684aa7945069e8b6d235f96a55a7cb71f0f549419d
                                                          • Instruction ID: 766e1a60195fe7ceb942efdeed0912ace8ca3a5ebf9d50782cf109168add0393
                                                          • Opcode Fuzzy Hash: 0aaa4d6d83505fce6bf6b5684aa7945069e8b6d235f96a55a7cb71f0f549419d
                                                          • Instruction Fuzzy Hash: EE41D132A00204DFCB24DF78C885A5EB7E6EF89714F255968E905FB291DB71AD05CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SysAllocString.OLEAUT32(00000010), ref: 00E411AD
                                                          • SysAllocString.OLEAUT32(00000010), ref: 00E411D5
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E411FA
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E4122E
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E41267
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AllocString
                                                          • String ID:
                                                          • API String ID: 2525500382-0
                                                          • Opcode ID: f5d72009b28a0a7afc792ae765ea30c241f11ad9a9ece60524d73e8b533b5acf
                                                          • Instruction ID: 616688d6417d48d1d4c7984499ba63394178d832e394081e254b1348038f824d
                                                          • Opcode Fuzzy Hash: f5d72009b28a0a7afc792ae765ea30c241f11ad9a9ece60524d73e8b533b5acf
                                                          • Instruction Fuzzy Hash: FF415D75A00315AFCB14EF64DC89AA9B3B4BF04310F105699E965B72E2DF70E994CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E041BD
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E041E0
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00E04200
                                                          • std::_Facet_Register.LIBCPMT ref: 00E04265
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00E0427D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                          • String ID:
                                                          • API String ID: 459529453-0
                                                          • Opcode ID: ef62ec5b8a82e80dc5958a3011b20e22b0e9a1733eb9e600fa5ca97c613afdf1
                                                          • Instruction ID: 855595ae55b7f431f165817240c73b8e67f28f4c69a89cc632141ad332fee9be
                                                          • Opcode Fuzzy Hash: ef62ec5b8a82e80dc5958a3011b20e22b0e9a1733eb9e600fa5ca97c613afdf1
                                                          • Instruction Fuzzy Hash: 9B3122B2A00115DFCB20CF84E944A6EB7B4EB19324F115169EA157B3E2D730BD89CBC0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00E640F2
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E64115
                                                            • Part of subcall function 00E5DEBD: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00E6413B
                                                          • _free.LIBCMT ref: 00E6414E
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E6415D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: d7f6cb69bd959d1da6a7d79682af3283e6a6d345103f0b54036b7f344d1b9efc
                                                          • Instruction ID: 839036aa4687469739851728451e544f4f262abb830891a54b022b5504e00d5a
                                                          • Opcode Fuzzy Hash: d7f6cb69bd959d1da6a7d79682af3283e6a6d345103f0b54036b7f344d1b9efc
                                                          • Instruction Fuzzy Hash: F901B1E26426197F63315A6A6C8CCBB6A7DDED3BE43151129FD18E7281DE608C4282B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMapMode.GDI32(?), ref: 00E2C0F6
                                                          • GetDeviceCaps.GDI32(?,00000058), ref: 00E2C13E
                                                          • GetDeviceCaps.GDI32(?,0000005A), ref: 00E2C14B
                                                            • Part of subcall function 00E29E36: MulDiv.KERNEL32(?,00000000,00000000), ref: 00E29E6F
                                                            • Part of subcall function 00E29E36: MulDiv.KERNEL32(?,00000000,00000000), ref: 00E29E90
                                                          • MulDiv.KERNEL32(?,00000060,000009EC), ref: 00E2C16D
                                                          • MulDiv.KERNEL32(?,00000060,000009EC), ref: 00E2C17A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Mode
                                                          • String ID:
                                                          • API String ID: 696222070-0
                                                          • Opcode ID: 92af04a20c6f0d46afb14929870584dd60314b22126bb1a898f5f61e1fbec0c6
                                                          • Instruction ID: 793b2b20b1b72965d999c0843ca9fc027a8f8d6f53fc58557f3b4234ccf1b00d
                                                          • Opcode Fuzzy Hash: 92af04a20c6f0d46afb14929870584dd60314b22126bb1a898f5f61e1fbec0c6
                                                          • Instruction Fuzzy Hash: CE11E775201210BFCB119F62EC4882DBBB9FF49751B240415FD0973362DB316C52DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegDeleteKeyW.ADVAPI32(00000000,?), ref: 00E27E48
                                                          • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 00E27E66
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E27E99
                                                            • Part of subcall function 00E27795: RegCloseKey.ADVAPI32(00000000), ref: 00E2783A
                                                            • Part of subcall function 00E27795: RegCloseKey.ADVAPI32(00000000), ref: 00E27849
                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00E27EB4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Close$Delete$PrivateProfileStringValueWrite
                                                          • String ID:
                                                          • API String ID: 1330817964-0
                                                          • Opcode ID: 2309236e7f8fc4457e556d3e60ba5b379d98ef43468c0728b7df542d710f84e6
                                                          • Instruction ID: df2f2fbd50f368aed6941275345cb56ec1a3acd5ac380e5acedde70c37420540
                                                          • Opcode Fuzzy Hash: 2309236e7f8fc4457e556d3e60ba5b379d98ef43468c0728b7df542d710f84e6
                                                          • Instruction Fuzzy Hash: F0119A32418235EBCF225F60AC04EAF3B6ABF84751F125469F945B9021DB31CC5197B0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMapMode.GDI32(?), ref: 00E2BF22
                                                          • GetDeviceCaps.GDI32(?,00000058), ref: 00E2BF6A
                                                          • GetDeviceCaps.GDI32(?,0000005A), ref: 00E2BF77
                                                            • Part of subcall function 00E29BE3: MulDiv.KERNEL32(?,00000000,00000000), ref: 00E29C1C
                                                            • Part of subcall function 00E29BE3: MulDiv.KERNEL32(?,00000000,00000000), ref: 00E29C3D
                                                          • MulDiv.KERNEL32(?,000009EC,00000060), ref: 00E2BF99
                                                          • MulDiv.KERNEL32(?,000009EC,00000060), ref: 00E2BFA6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Mode
                                                          • String ID:
                                                          • API String ID: 696222070-0
                                                          • Opcode ID: 69ec205901f2bcb91d364347ad868bcd68f2e9b62313848cd58b2260192cd45a
                                                          • Instruction ID: ec256af626acd4a6902b3050989951c83b737e359586f101aebdc3ddab0beb59
                                                          • Opcode Fuzzy Hash: 69ec205901f2bcb91d364347ad868bcd68f2e9b62313848cd58b2260192cd45a
                                                          • Instruction Fuzzy Hash: 5111E33A600214AFDB019F62ED4882DBBA9FF893217140015FD0AB7362CB31AC91DF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E33300
                                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002,00000008), ref: 00E33334
                                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 00E3333E
                                                          • DuplicateHandle.KERNEL32(00000000), ref: 00E33345
                                                          • GetLastError.KERNEL32(?), ref: 00E33369
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CurrentProcess$DuplicateErrorH_prolog3HandleLast
                                                          • String ID:
                                                          • API String ID: 2082106130-0
                                                          • Opcode ID: 993f31e5f601961ac5e746b21c20367fa1973cd8b4701db86a879410940f2d83
                                                          • Instruction ID: f4ca441718cd924ecdaddfd262e0ce0b12c1e47cbe65a7ff30c10afa974242a9
                                                          • Opcode Fuzzy Hash: 993f31e5f601961ac5e746b21c20367fa1973cd8b4701db86a879410940f2d83
                                                          • Instruction Fuzzy Hash: E8115771A01205AFCB00DFB5D849A6EBFB5BF48710F199158F919EB292EB30DD40CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00E649F7
                                                            • Part of subcall function 00E5D0F5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E5B4AC,?,?), ref: 00E5D10B
                                                            • Part of subcall function 00E5D0F5: GetLastError.KERNEL32(?,?,00E5B4AC,?,?), ref: 00E5D11D
                                                          • _free.LIBCMT ref: 00E64A09
                                                          • _free.LIBCMT ref: 00E64A1B
                                                          • _free.LIBCMT ref: 00E64A2D
                                                          • _free.LIBCMT ref: 00E64A3F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 28d3f57e098654a061b40eeb2c904477e71f495c0e4b0f80186409cdbbf44e4e
                                                          • Instruction ID: 5394637177e0d678e787bbde329007ab489533ee75ddf9c3ebd2dae45cb1239b
                                                          • Opcode Fuzzy Hash: 28d3f57e098654a061b40eeb2c904477e71f495c0e4b0f80186409cdbbf44e4e
                                                          • Instruction Fuzzy Hash: F3F03C72688201AF8670EB99F8C9C1A77EAAB45795B682C05F408F7580DF30FC858654
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E39B0C
                                                          • CoTaskMemAlloc.OLE32(?,?,00000000), ref: 00E39C87
                                                          • CoTaskMemFree.OLE32(?), ref: 00E39EDF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Task$AllocFreeH_prolog3_
                                                          • String ID:
                                                          • API String ID: 1458175711-3916222277
                                                          • Opcode ID: 1d5bd6cbb252bdb43f65753432c5c218c83415184def660d319821c9ac1a2c58
                                                          • Instruction ID: f606c967531e0533918d0861d3229498ea643e8707ed1daa3aa7b9273e34270c
                                                          • Opcode Fuzzy Hash: 1d5bd6cbb252bdb43f65753432c5c218c83415184def660d319821c9ac1a2c58
                                                          • Instruction Fuzzy Hash: 54D13770A006199FDB28DF6AC998A99BBF4FF48304F20516DE50AE7392CB71AD45CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3
                                                          • String ID: $ ,$ ,
                                                          • API String ID: 431132790-2940328001
                                                          • Opcode ID: a366958981b95e10d2e95f8c3e57e296bd8e45f9891f1a6fcd541e96c7b2432e
                                                          • Instruction ID: cfa71880d1a8e49ce97980d6a563e22698d0a1bc351d525a132aaaca120ee450
                                                          • Opcode Fuzzy Hash: a366958981b95e10d2e95f8c3e57e296bd8e45f9891f1a6fcd541e96c7b2432e
                                                          • Instruction Fuzzy Hash: 33917C7180111AAADB15FBA0CC96AFFB7BCAF10304F142569E512B71D2DF74AE44CBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          • </__SERVER_ACCESS_SETTING1__>, xrefs: 00E73A19
                                                          • <__SERVER_ACCESS_SETTING1__>, xrefs: 00E73A1E
                                                          • %s%d%s%c%s%s, xrefs: 00E737B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strstr
                                                          • String ID: %s%d%s%c%s%s$</__SERVER_ACCESS_SETTING1__>$<__SERVER_ACCESS_SETTING1__>
                                                          • API String ID: 2882301372-896595307
                                                          • Opcode ID: a22f14a04401f800cad03de7c3a2fe358fd8696627e1f08982d73efb1f4bc9e7
                                                          • Instruction ID: 4881b33c23d60ac4021b1eb842616da966957bd5e14c19a86a4f2dc27078deb8
                                                          • Opcode Fuzzy Hash: a22f14a04401f800cad03de7c3a2fe358fd8696627e1f08982d73efb1f4bc9e7
                                                          • Instruction Fuzzy Hash: 19913671A002999BDB24CB24CC557EEBBB6EF85304F049198E98DBB381C7B55FC48B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.62491.4036.26173.exe
                                                          • API String ID: 0-1330334843
                                                          • Opcode ID: 461865d8b18a2dde4edd7605a869543d946f12c83a5ca1e4e91ab4792724adc9
                                                          • Instruction ID: b90e9b6c766aad61b7b88d2d4c648fdc405f2ac7221ef724911c80ffc6695202
                                                          • Opcode Fuzzy Hash: 461865d8b18a2dde4edd7605a869543d946f12c83a5ca1e4e91ab4792724adc9
                                                          • Instruction Fuzzy Hash: 2D41A071A00214EFCB21DF9ADC859DFBBF8EB89311B201567E804B7252E7705E48CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoTaskMemFree.OLE32(?,?,?,?,?,?,?,00E37939,00000000,?,00000000,00000002), ref: 00E39FF1
                                                          • CoTaskMemFree.OLE32(9y,?,?,?,?,?,?,00E37939,00000000,?,00000000,00000002), ref: 00E39FFE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: FreeTask
                                                          • String ID: 9y$DP
                                                          • API String ID: 734271698-393712294
                                                          • Opcode ID: d8c84f6cc1fe91b70bf0d9cfe42f60cea93e536b7f9d0def6c698d5500f6dda4
                                                          • Instruction ID: 30a74f93d9fc3fdc9a5340ac5ef1dd4ba4fd88ef84ac20236c3e69b4d9176def
                                                          • Opcode Fuzzy Hash: d8c84f6cc1fe91b70bf0d9cfe42f60cea93e536b7f9d0def6c698d5500f6dda4
                                                          • Instruction Fuzzy Hash: A63139B6A002199FCB08CF98D9949EEBBF5EF8C314F155029E906B7340DB71AD45CBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenuCheckMarkDimensions.USER32 ref: 00E1E6CF
                                                          • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 00E1E7BB
                                                          • LoadBitmapW.USER32(00000000,00007FE3), ref: 00E1E7D3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
                                                          • String ID: 8
                                                          • API String ID: 2596413745-1581818123
                                                          • Opcode ID: b28489cf8cbec76bb5cb830571213bfb6a38ee44fa83403dd62df7799cc8d63b
                                                          • Instruction ID: 5d9a527546ac9e1b798e8e46d353d3dafb100bebd94039bd4e1e075ab6ae289b
                                                          • Opcode Fuzzy Hash: b28489cf8cbec76bb5cb830571213bfb6a38ee44fa83403dd62df7799cc8d63b
                                                          • Instruction Fuzzy Hash: D631D671E0021A9FEB24DF29DC85BEDB7B4FB84315F0041AAE549F7281DB70AAC58B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3.LIBCMT ref: 00E3EE04
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E3EE3D
                                                          • __EH_prolog3.LIBCMT ref: 00E3EE4A
                                                            • Part of subcall function 00E32F39: __EH_prolog3.LIBCMT ref: 00E32F40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3$Exception@8Throw
                                                          • String ID: /
                                                          • API String ID: 2489616738-3878498614
                                                          • Opcode ID: 5a4762281f7522b134998a936f25c2acd761c44ae21dd0b3633e76a818f5c8eb
                                                          • Instruction ID: fcbc34ebf4607a97110af1ea0294ab1dd827aefe10203b638cf5bc386bd41ab2
                                                          • Opcode Fuzzy Hash: 5a4762281f7522b134998a936f25c2acd761c44ae21dd0b3633e76a818f5c8eb
                                                          • Instruction Fuzzy Hash: 0931707190120AABDF14EFA4CC49BAE7BB8BF04314F145968F521B72D1DB70DA50CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E16680: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,?,00E016A1,TMSetupWindow,?,00000200,?,?,?,?,00E75578,000000FF), ref: 00E1669A
                                                          • __fread_nolock.LIBCMT ref: 00E122C3
                                                          Strings
                                                          • c:\rhub2\code\utility\utility.cpp, xrefs: 00E122E9
                                                          • Failed to open sFileName %s, xrefs: 00E122DF
                                                          • Utility::GetFileData(), xrefs: 00E122F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__fread_nolock
                                                          • String ID: Failed to open sFileName %s$Utility::GetFileData()$c:\rhub2\code\utility\utility.cpp
                                                          • API String ID: 3992567027-3580890932
                                                          • Opcode ID: 3245998776c900498a86ef36d470a496392d368d4c56fccc4f886d8f5b4acbb7
                                                          • Instruction ID: e2de889927c48e6e9a9b6a2794f8464118a54fd1af8716a5ea98884bd261553d
                                                          • Opcode Fuzzy Hash: 3245998776c900498a86ef36d470a496392d368d4c56fccc4f886d8f5b4acbb7
                                                          • Instruction Fuzzy Hash: 6D21A4B1504340ABD720AB54DC41FAFB7DCAF49700F441829FB48B7291D775A954C766
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00E046DD
                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00E0472C
                                                            • Part of subcall function 00E45A4E: _Yarn.LIBCPMT ref: 00E45A6D
                                                            • Part of subcall function 00E45A4E: _Yarn.LIBCPMT ref: 00E45A91
                                                          • std::ctype_base::ctype_base.LIBCPMT ref: 00E04750
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_std::ctype_base::ctype_base
                                                          • String ID: bad locale name
                                                          • API String ID: 2130855923-1405518554
                                                          • Opcode ID: 6f1c74781057f2f5b860fe30d59fc8c5443b11cff6a2dc8bd58d75712e73e46f
                                                          • Instruction ID: 7399ae216bafe322c2271c7cdf36c685aca0ff8d4738cbf2562cf5f36aef6ab2
                                                          • Opcode Fuzzy Hash: 6f1c74781057f2f5b860fe30d59fc8c5443b11cff6a2dc8bd58d75712e73e46f
                                                          • Instruction Fuzzy Hash: 9A119071904B449FD320DF69D90574BBBF4EF19710F008A6EE48AE7B81D775A608CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetRectEmpty.USER32(?), ref: 00E1D4E4
                                                          • GetClientRect.USER32(00000000,?), ref: 00E1D4FB
                                                            • Part of subcall function 00E20C64: GetScrollPos.USER32(00000000,?), ref: 00E20C90
                                                          • OffsetRect.USER32(?,00000000,00000000), ref: 00E1D538
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Rect$ClientEmptyOffsetScroll
                                                          • String ID: 4&
                                                          • API String ID: 859223101-1676276578
                                                          • Opcode ID: 4130aa4e6f5cdac2f24eadb18ec326fd74120cfa8aaf17efe5a5c30fa965b090
                                                          • Instruction ID: e2e8476293e7662f3784b2a35a5c75bace6215466e87e5dea4a20ad154a6881c
                                                          • Opcode Fuzzy Hash: 4130aa4e6f5cdac2f24eadb18ec326fd74120cfa8aaf17efe5a5c30fa965b090
                                                          • Instruction Fuzzy Hash: 87118672200611EFD714DF69DC85D65FBA6FF84714714C269E919DB296EB30EC40CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?), ref: 00E11AB1
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          • c:\rhub2\code\utility\utility.cpp, xrefs: 00E11A49
                                                          • Utility::CopyMyFile(), xrefs: 00E11A50
                                                          • sSourceFile, %s, does not exist, xrefs: 00E11A3F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$CopyEnterFileLeave
                                                          • String ID: Utility::CopyMyFile()$c:\rhub2\code\utility\utility.cpp$sSourceFile, %s, does not exist
                                                          • API String ID: 948928420-793497291
                                                          • Opcode ID: 50fa00b2be5c7c0ef2c26a66f5b0d461344d20f2a7e3c1edf0351132ab604421
                                                          • Instruction ID: eef2d05955081ba6c74f8541cab39f3a71e9919ba0abcc8e35ddc12e836f3eaf
                                                          • Opcode Fuzzy Hash: 50fa00b2be5c7c0ef2c26a66f5b0d461344d20f2a7e3c1edf0351132ab604421
                                                          • Instruction Fuzzy Hash: D31191726053006AE620AB54DC47FEB77DCBF84B00F846859FA8CB6181EA706685C7D6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetLastError.KERNEL32(0000000D,?,00E45B76,904898A6,00000001,?,00000000,?,00E07547,00EA915C,00E03FA0,00EA9160,?,00E06A6F,?,00000001), ref: 00E46378
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast
                                                          • String ID: ios_base::failbit set$oj
                                                          • API String ID: 1452528299-2528494008
                                                          • Opcode ID: 40933e2eace695c480d45bcc98fd0a04b13256f33c4d2f459ca300f1b70c0ea1
                                                          • Instruction ID: c9173e11116ef39555c2f3fe700be8c64547c81a75cfb83783a8196bde59c1d4
                                                          • Opcode Fuzzy Hash: 40933e2eace695c480d45bcc98fd0a04b13256f33c4d2f459ca300f1b70c0ea1
                                                          • Instruction Fuzzy Hash: AF11A532300169AFCF169F66ED445AEF765FF89769B018039F905B6220CB70AC54DBD1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E2DE19: EnterCriticalSection.KERNEL32(00EAF9A0,00000000,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE4A
                                                            • Part of subcall function 00E2DE19: InitializeCriticalSection.KERNEL32(00000000,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE60
                                                            • Part of subcall function 00E2DE19: LeaveCriticalSection.KERNEL32(00EAF9A0,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE6E
                                                            • Part of subcall function 00E2DE19: EnterCriticalSection.KERNEL32(00000000,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE7B
                                                            • Part of subcall function 00E2D247: __EH_prolog3_catch.LIBCMT ref: 00E2D24E
                                                            • Part of subcall function 00E1FDAD: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 00E1FDD3
                                                            • Part of subcall function 00E1FDAD: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00E1FDE3
                                                            • Part of subcall function 00E1FDAD: EncodePointer.KERNEL32(00000000,?,00000000), ref: 00E1FDEC
                                                          • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 00E1F289
                                                          • FreeLibrary.KERNEL32(?,?,00E1DEA6,?,?,?,00E2B594), ref: 00E1F299
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$AddressEnterProc$EncodeFreeH_prolog3_catchHandleInitializeLeaveLibraryModulePointer
                                                          • String ID: HtmlHelpW$hhctrl.ocx
                                                          • API String ID: 849444252-3773518134
                                                          • Opcode ID: b004462d4b742d95964ff5c9956b7d16fed626d0c8a5d3584bee4ed1fc66aa7c
                                                          • Instruction ID: ad34c65a7bd9bc0dbc83dc9a69c9671ec7ccbc830856c2d795c2aeadc78ff471
                                                          • Opcode Fuzzy Hash: b004462d4b742d95964ff5c9956b7d16fed626d0c8a5d3584bee4ed1fc66aa7c
                                                          • Instruction Fuzzy Hash: F801D835500716AFDB206FA1DC0AB9B7BA4AF00754F006435F51E75572DB30D890D791
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(Advapi32.dll,0002001F,?,?,00E27826,?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00E27BFD
                                                          • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 00E27C0D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                          • API String ID: 1646373207-2994018265
                                                          • Opcode ID: 7e7915361f920992ce0f143d1228567ff7225ff7ec12360ce164a9117fb18e61
                                                          • Instruction ID: 5b58216de3289091b572a2926ec1b287d6d0ac1f7966bb51c8a62139a1bd0aee
                                                          • Opcode Fuzzy Hash: 7e7915361f920992ce0f143d1228567ff7225ff7ec12360ce164a9117fb18e61
                                                          • Instruction Fuzzy Hash: F501A232210208EFCF125FA5EC05AEA7BAAFF8C359F044025FA48B1070D772C8A1DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(Advapi32.dll,?), ref: 00E27253
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 00E27263
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                                          • API String ID: 1646373207-2168864297
                                                          • Opcode ID: 0bd5881136cf552f7196d4c535910dd6cba0edd27d6c02a3dfe40ed3322e3825
                                                          • Instruction ID: f5a4caba3301e4a530994528a286ba7deacf103525d16034451367a7bf3b1ddb
                                                          • Opcode Fuzzy Hash: 0bd5881136cf552f7196d4c535910dd6cba0edd27d6c02a3dfe40ed3322e3825
                                                          • Instruction Fuzzy Hash: 4FF096B3304319EF97116FA6BC4497677ADFB803A6318443AF189A5171D6318C458760
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(?), ref: 00E2E4DC
                                                          • GetProcAddress.KERNEL32(00000000,AfxmReleaseManagedReferences), ref: 00E2E4EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: AfxmReleaseManagedReferences$mfcm140u.dll
                                                          • API String ID: 1646373207-1124768495
                                                          • Opcode ID: e03b0bfaa7b49be660235ae8467123925d4747f5cf8e94a56671dee3e72b1370
                                                          • Instruction ID: 4bba0c59bd6624a71091ad005e284daf4c82971dbfeeb517d73b1adf34833dec
                                                          • Opcode Fuzzy Hash: e03b0bfaa7b49be660235ae8467123925d4747f5cf8e94a56671dee3e72b1370
                                                          • Instruction Fuzzy Hash: 42F09C31B0022CABCB14DB76EC499AF77E8FF487147000025F509F7291DA609D05C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 00E272B0
                                                          • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00E272C0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                          • API String ID: 1646373207-3913318428
                                                          • Opcode ID: e47df62b13c05dc057189664c6ef5908abc997bd5c9036b05776fc61bace633c
                                                          • Instruction ID: a9da7e37e0e26abcb1100d89f7c70992af12cb648528daa9ab4e4ae1f0c60919
                                                          • Opcode Fuzzy Hash: e47df62b13c05dc057189664c6ef5908abc997bd5c9036b05776fc61bace633c
                                                          • Instruction Fuzzy Hash: 2FF06233204219EFCB129F5AEC08BA63BB9FF89756F044035F54AB1170EB718851DB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 00E3F455
                                                          • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 00E3F465
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: GetFileAttributesTransactedW$kernel32.dll
                                                          • API String ID: 1646373207-1378992308
                                                          • Opcode ID: 210db11db29ca64bf2268212b9b22a286d1d4e486457e8858ad3cfd5d0f1ae84
                                                          • Instruction ID: e67f95b677dcc8cfae06032aa9afdcd3f81dcf8351829e604b1b8af7fc8ad8dc
                                                          • Opcode Fuzzy Hash: 210db11db29ca64bf2268212b9b22a286d1d4e486457e8858ad3cfd5d0f1ae84
                                                          • Instruction Fuzzy Hash: E6F06D32701305AFDB205FA5ED4CBBB7BA8EF0431AF00953AE558A1160C7718894C750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadResource.KERNEL32(00000000,?,00000010,?,00E260B8,00000000,00000000,?,?,00E26630,00000000,?,?,?,?,00E3E83A), ref: 00E26DEB
                                                          • LockResource.KERNEL32(00000000,?,00E260B8,00000000,00000000,?,?,00E26630,00000000,?,?,?,?,00E3E83A,00000000,?), ref: 00E26DF6
                                                          • SizeofResource.KERNEL32(00000000,?,?,00E260B8,00000000,00000000,?,?,00E26630,00000000,?,?,?,?,00E3E83A,00000000), ref: 00E26E08
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Resource$LoadLockSizeof
                                                          • String ID: tG
                                                          • API String ID: 2853612939-3095411533
                                                          • Opcode ID: aed5eef104582d1f732236893764cb5921e0060fdadef722fe9d5ddc359f2f30
                                                          • Instruction ID: 4f3c8ebdd5290dee6e92989a1a8b15bef44fb3c666ea1705b6765bae041e91cc
                                                          • Opcode Fuzzy Hash: aed5eef104582d1f732236893764cb5921e0060fdadef722fe9d5ddc359f2f30
                                                          • Instruction Fuzzy Hash: 1FF0C239800235ABCF326F55FC044BA7B68EF203057025A1AFC49B6434E731DEA0D6C0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • lstrlenW.KERNEL32(00EA9820,}~,00000000,?,00E17E7D,?,Module %d,?,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E19BD9
                                                          • WriteFile.KERNEL32(?,00EA9820,00000000,?,00E17E7D,?,Module %d,?,?,?,?,?,00E47BD0,00E9A838,000000FE), ref: 00E19BE9
                                                          • wvsprintfW.USER32(?,?,?), ref: 00E19C07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: FileWritelstrlenwvsprintf
                                                          • String ID: }~
                                                          • API String ID: 3159838295-951315991
                                                          • Opcode ID: 0ec92a57091b92ebd8aa35d70828f5d08f6b24f402ec2faf3981c2c199eaed21
                                                          • Instruction ID: 58bee722def7a9bf53f7794d9d960f4bfc994d415ed02ab84cac6721ca805aa2
                                                          • Opcode Fuzzy Hash: 0ec92a57091b92ebd8aa35d70828f5d08f6b24f402ec2faf3981c2c199eaed21
                                                          • Instruction Fuzzy Hash: 2EF03971408305AFDB08DF65EC44D9A77E8FB4E300F000919F026E50B2EB39A858CB95
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WSAGetLastError.WS2_32 ref: 00E72D18
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          • HR::DoRequest, xrefs: 00E72D3C
                                                          • c:\rhub2\code\hlib\hlib.cpp, xrefs: 00E72D35
                                                          • CRASHED --- error code=%d, error = %s, xrefs: 00E72D2B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterErrorLastLeave
                                                          • String ID: CRASHED --- error code=%d, error = %s$HR::DoRequest$c:\rhub2\code\hlib\hlib.cpp
                                                          • API String ID: 4082018349-3415088769
                                                          • Opcode ID: e36c871f327b7f206826d27a7cc2aac704173abfe421b43ba44eef0566c0867c
                                                          • Instruction ID: ea3e181b245cbda65722066d7dd163ef78bb4085d3b44c89601174c46de2e73a
                                                          • Opcode Fuzzy Hash: e36c871f327b7f206826d27a7cc2aac704173abfe421b43ba44eef0566c0867c
                                                          • Instruction Fuzzy Hash: 6AD0A7767807007AE62116116C47F7A25459B15745F403020BA0CB43EBD2C028494285
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WSAGetLastError.WS2_32 ref: 00E7349D
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          • HLib::GetPage, xrefs: 00E734BE
                                                          • c:\rhub2\code\hlib\hlib.cpp, xrefs: 00E734B7
                                                          • Crash, error code: %d, error: %s, xrefs: 00E734AD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterErrorLastLeave
                                                          • String ID: Crash, error code: %d, error: %s$HLib::GetPage$c:\rhub2\code\hlib\hlib.cpp
                                                          • API String ID: 4082018349-1778592653
                                                          • Opcode ID: 306b01e2052cec7a0b747a4fab1b6a854b25fc2e6804d0c1ed0e12d5ddff3223
                                                          • Instruction ID: 20408d53fad6f1244971921fedfb53a51e422c026d3d9a4f8574b9314be9fe3a
                                                          • Opcode Fuzzy Hash: 306b01e2052cec7a0b747a4fab1b6a854b25fc2e6804d0c1ed0e12d5ddff3223
                                                          • Instruction Fuzzy Hash: 57D0A7723447003FD9165611AC47F5A2888A705740F803410BE0DB42D792C05A45824D
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: d60fa4f0da1be44e7e36ae07b4f0b10f814b03209a138af43d06915c102ee8cf
                                                          • Instruction ID: df6c5d20cc6ee3b8def0d7fb81f11c100f2b697bd58da5326f2636e7b0ccfb12
                                                          • Opcode Fuzzy Hash: d60fa4f0da1be44e7e36ae07b4f0b10f814b03209a138af43d06915c102ee8cf
                                                          • Instruction Fuzzy Hash: 02417E31A80A016BDB316AB8AC457BE3AE4FFC53F4F18261DF614F6292DA744C415371
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindow.USER32(?,00000005), ref: 00E287E3
                                                          • SetWindowContextHelpId.USER32(00000000,?), ref: 00E2884C
                                                          • GetParent.USER32(00000000), ref: 00E28855
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$ContextHelpParent
                                                          • String ID:
                                                          • API String ID: 2037418093-0
                                                          • Opcode ID: d1e44dc5182d26ee0a6205cdf7ddb5b65bc10ba080bae318da728f4198c59371
                                                          • Instruction ID: e451f66a12fe431168a3ac60593a50b2e5ffbd82f145862e571f7325cb2d08b6
                                                          • Opcode Fuzzy Hash: d1e44dc5182d26ee0a6205cdf7ddb5b65bc10ba080bae318da728f4198c59371
                                                          • Instruction Fuzzy Hash: B0518E75E02229DFDF18CF98EA40AAEB7F1BF48714FA5911AD815B3250DB309D41CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c3a2afe1fb60355c837241580be786e3cedbfca41169beca8f491f4464462a62
                                                          • Instruction ID: eae0b587959b3ca322ef6520ba586f11f399d0b594c08e4e9979521ef06d51d0
                                                          • Opcode Fuzzy Hash: c3a2afe1fb60355c837241580be786e3cedbfca41169beca8f491f4464462a62
                                                          • Instruction Fuzzy Hash: 04415C71A04304AFD7249F78EC41BAABBE9EF8C711F10992AF581FB281D671A9558780
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantClear.OLEAUT32(?), ref: 00E3AD39
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E3ADCA
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E3ADD9
                                                          • SysFreeString.OLEAUT32(00000000), ref: 00E3ADE8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: FreeString$ClearVariant
                                                          • String ID:
                                                          • API String ID: 3349467263-0
                                                          • Opcode ID: d866406c9db5509e9603bf2203c26e55e795d4917364bfe3299a064aea212e72
                                                          • Instruction ID: 763910fed1fcd1253c02f7cf2ea3e739eedd0bc01b430430a03bb8443b1af30b
                                                          • Opcode Fuzzy Hash: d866406c9db5509e9603bf2203c26e55e795d4917364bfe3299a064aea212e72
                                                          • Instruction Fuzzy Hash: C8418A71A10219AFCB14EFA5DC89BDEBBB9FF04705F040129F549B72A1DB706988CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,00001000,?), ref: 00E27B52
                                                            • Part of subcall function 00E27B84: RegCloseKey.ADVAPI32(00000000,?,?,?,?,00E279B3,?,00000000), ref: 00E27BC9
                                                          • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000000,?,00000000,?,00000000), ref: 00E27AA1
                                                          • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 00E27ADD
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E27AF7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$PrivateProfileString
                                                          • String ID:
                                                          • API String ID: 2114517702-0
                                                          • Opcode ID: 22c71dc5ce932535adc72264a2ac5f7c9c97936810685c2ba23adba85b71b593
                                                          • Instruction ID: cacf3a6512408fdfd016ccaebb097b40599beadb8b0cc2ae2bfbca942f6b51be
                                                          • Opcode Fuzzy Hash: 22c71dc5ce932535adc72264a2ac5f7c9c97936810685c2ba23adba85b71b593
                                                          • Instruction Fuzzy Hash: 834180B1904329EFDB25DB14DC49EEEB3B9EB44310F00519AB959B3282DB309E95DF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00E5C952,00000000,?,?,00000000,00000000,?,00000000,7FFFFFFF,-00000001,00E5C952,00000001,?,?,00000001,?), ref: 00E650C9
                                                          • MultiByteToWideChar.KERNEL32(00E5C952,00000001,?,?,00000000,?), ref: 00E65153
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00E65165
                                                          • __freea.LIBCMT ref: 00E6516E
                                                            • Part of subcall function 00E5DEBD: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E1D9AD,?,?,?,?,00E013BB,?), ref: 00E5DEEF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 4e25fe7d9ab3bab3558cc064be7465c9345885ad669c0bdbb599448eba2359e0
                                                          • Instruction ID: bbfb1f875cdfa05f4b23c18251736d970ce712a323b59a9fc8bf17d37163dece
                                                          • Opcode Fuzzy Hash: 4e25fe7d9ab3bab3558cc064be7465c9345885ad669c0bdbb599448eba2359e0
                                                          • Instruction Fuzzy Hash: 3F31F472F01A1AAFDB208F64EC45EAF7BA5EF41754F054228F804A6251EB34CD54C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E2AF43
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E2AFA4
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E2AFEE
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00E2B01D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 7e5aef39bf56dacdb6186c86c59ac1476fa1be84194c67d5d4e2e6fddb2a3ec7
                                                          • Instruction ID: bc68bfd088fa4b5b5e0cf5debc8fda10280144da00a44a53d119de9e4e9a4d3d
                                                          • Opcode Fuzzy Hash: 7e5aef39bf56dacdb6186c86c59ac1476fa1be84194c67d5d4e2e6fddb2a3ec7
                                                          • Instruction Fuzzy Hash: 4C316371A0022AFFEB259FA0E995F7AB3A9FF00348F185079E11277161CB74AD44E651
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 00E259CF
                                                            • Part of subcall function 00E25087: __EH_prolog3.LIBCMT ref: 00E2508E
                                                          • GetCurrentThread.KERNEL32 ref: 00E25A2F
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E25A38
                                                          • GetVersionExW.KERNEL32 ref: 00E25AD4
                                                            • Part of subcall function 00E29057: __CxxThrowException@8.LIBVCRUNTIME ref: 00E2906B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CurrentThread$Exception@8H_prolog3H_prolog3_ThrowVersion
                                                          • String ID:
                                                          • API String ID: 3564936719-0
                                                          • Opcode ID: 34568a68b47cbbe36bd170a1ca3fd3cc5ae6a680148aca3f073a47b2269ba5a3
                                                          • Instruction ID: 578714ccf3b1888345f8498cb906da20f9dc052963653199658c4460d5b25821
                                                          • Opcode Fuzzy Hash: 34568a68b47cbbe36bd170a1ca3fd3cc5ae6a680148aca3f073a47b2269ba5a3
                                                          • Instruction Fuzzy Hash: 4041D0B1901B148FD720DF2A998578AFBF0BF48300F905A6ED1AEA3711DB70A484CF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cecfe3b1dc72e9489c38c2433834424616e74e0704d13677cbdd4273b3f28431
                                                          • Instruction ID: fac5959e122327fdae920b22b0d144ac6f545a9c9837c60f38054948f7a5909b
                                                          • Opcode Fuzzy Hash: cecfe3b1dc72e9489c38c2433834424616e74e0704d13677cbdd4273b3f28431
                                                          • Instruction Fuzzy Hash: 6211D531100304EFDB206B66AC05BEB7BA8FB81765F241E25FD54BB1D3E6719C4492A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00E229EB
                                                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00E22A15
                                                          • GetCapture.USER32 ref: 00E22A2B
                                                          • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 00E22A3A
                                                            • Part of subcall function 00E29057: __CxxThrowException@8.LIBVCRUNTIME ref: 00E2906B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CaptureException@8Throw
                                                          • String ID:
                                                          • API String ID: 1331319163-0
                                                          • Opcode ID: 30090c63734e05eab30c2b51f745167d2cd6dfe73c93c724c7a1fb3c7c54d30e
                                                          • Instruction ID: 22661def88a86c10b54a49011e7e31b85ccb777d49275495a9be0b50cf7711fb
                                                          • Opcode Fuzzy Hash: 30090c63734e05eab30c2b51f745167d2cd6dfe73c93c724c7a1fb3c7c54d30e
                                                          • Instruction Fuzzy Hash: B811947130021DBFEB156B61DC89FBE7B6EFF48785F040024F709762A2CB619C54A6A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SafeArrayDestroy.OLEAUT32(?), ref: 00E39228
                                                          • CoTaskMemFree.OLE32(00000000,?,?,?,?,?,?,?,?,?,00E381EC,?,?,?,?,00E36C3D), ref: 00E392B5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ArrayDestroyFreeSafeTask
                                                          • String ID:
                                                          • API String ID: 3253174383-0
                                                          • Opcode ID: 87baf9febc2c04924098e8536772e60d8f9c0bda18a2e878d8ea20133e02eda9
                                                          • Instruction ID: a556ecade6b031777e56f4de0ecaae21832b80439bf9eec0d593ce3e28496119
                                                          • Opcode Fuzzy Hash: 87baf9febc2c04924098e8536772e60d8f9c0bda18a2e878d8ea20133e02eda9
                                                          • Instruction Fuzzy Hash: 9B219D32110606FFDB199F69E85CAAA7F78FF45306F241114F806BA1B6CBB29D50DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • BeginDeferWindowPos.USER32(00000000), ref: 00E2EEE0
                                                          • IsWindow.USER32(?), ref: 00E2EEFB
                                                          • DeferWindowPos.USER32(00000000,?,00000000,?,00000000,?,00000000,00000000), ref: 00E2EF4B
                                                          • EndDeferWindowPos.USER32(00000000), ref: 00E2EF56
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Defer$Begin
                                                          • String ID:
                                                          • API String ID: 2880567340-0
                                                          • Opcode ID: 66689a2ffa0441e7e3d0d5f4a442d93f6b0e7d1f7ce3136e2d67be2646d8318f
                                                          • Instruction ID: bfab4f7c8493614dd158ca1987c3ccc74983fd9ebe724056d4534d65d1147d6c
                                                          • Opcode Fuzzy Hash: 66689a2ffa0441e7e3d0d5f4a442d93f6b0e7d1f7ce3136e2d67be2646d8318f
                                                          • Instruction Fuzzy Hash: 23215C71A00129AFDB00CFA9DD84AAEBBF9FF08300F144429E51AF3251D734A941CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindResourceW.KERNEL32(?,?,000000F0), ref: 00E288DB
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00E288E7
                                                          • LockResource.KERNEL32(00000000), ref: 00E288F4
                                                          • FreeResource.KERNEL32(00000000), ref: 00E28926
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindFreeLoadLock
                                                          • String ID:
                                                          • API String ID: 1078018258-0
                                                          • Opcode ID: 79e6cc231d4acea853a291bb36abbdd2256eee1081dcdcdbce8951fd4123af67
                                                          • Instruction ID: e5c4212413a565300f01671cd295b0c0fda7ad9ec0e223f5d8c52d42d8bbf1d5
                                                          • Opcode Fuzzy Hash: 79e6cc231d4acea853a291bb36abbdd2256eee1081dcdcdbce8951fd4123af67
                                                          • Instruction Fuzzy Hash: D4119D35601329AFCB05AF69EC84A6E7BB9FF897147050069F809A7322DF70DC40DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7e2db780725a3867667a3a60502f9900d835b8fbeb18b7497df27263b64497a9
                                                          • Instruction ID: 7a13ecfe670c5d853c46664940531d5e57942fa94a7b5e75a574a98c4685bb0b
                                                          • Opcode Fuzzy Hash: 7e2db780725a3867667a3a60502f9900d835b8fbeb18b7497df27263b64497a9
                                                          • Instruction Fuzzy Hash: 79012BB2209206BEEB301A786CC5FA7636DDF413BAF352F25F931721D6DA608C484270
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindResourceW.KERNEL32(?,00000000,00000005), ref: 00E2B390
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00E2B398
                                                          • LockResource.KERNEL32(?), ref: 00E2B3A6
                                                          • FreeResource.KERNEL32(?), ref: 00E2B3FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindFreeLoadLock
                                                          • String ID:
                                                          • API String ID: 1078018258-0
                                                          • Opcode ID: ce2b39afed216eb247ac58e0404e4dc464b391d71427fbd9ad9ff88845cfb48b
                                                          • Instruction ID: dfb84dbc8ae23ef483d48c773ebdee922380bcdb0326ddf461aad489f4ee621a
                                                          • Opcode Fuzzy Hash: ce2b39afed216eb247ac58e0404e4dc464b391d71427fbd9ad9ff88845cfb48b
                                                          • Instruction Fuzzy Hash: C611D031904631EBCB10EF56E848BAAB7B8FF48314F14C174E844A7696EBB49D81D7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,00000000), ref: 00E27DD7
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E27DE0
                                                          • swprintf.LIBCMT ref: 00E27DFD
                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00E27E0E
                                                            • Part of subcall function 00E27B84: RegCloseKey.ADVAPI32(00000000,?,?,?,?,00E279B3,?,00000000), ref: 00E27BC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Close$PrivateProfileStringValueWriteswprintf
                                                          • String ID:
                                                          • API String ID: 581541481-0
                                                          • Opcode ID: 52428497b339dad5e18e6470352f1de6fec594c7e8d0f8b8de8a4d71c5970d91
                                                          • Instruction ID: d8ef1fd412bad7275ddb96d16e1ced92012359820869fcf6cb887e0d68715479
                                                          • Opcode Fuzzy Hash: 52428497b339dad5e18e6470352f1de6fec594c7e8d0f8b8de8a4d71c5970d91
                                                          • Instruction Fuzzy Hash: B001AD72600218BBDB10DB65AC46FAEB3FCEF49714F150899FA41B7291DB74ED0487A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnableMenuItem.USER32(?,?,?), ref: 00E1E165
                                                          • GetFocus.USER32 ref: 00E1E17F
                                                          • GetParent.USER32(?), ref: 00E1E18A
                                                          • SendMessageW.USER32(?,00000028,00000000,00000000), ref: 00E1E19F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: EnableFocusItemMenuMessageParentSend
                                                          • String ID:
                                                          • API String ID: 2297321873-0
                                                          • Opcode ID: 8e5790251e93a12e5fd9cabc79d73ce98680bdcb44366959e349439badd73690
                                                          • Instruction ID: 5ca15a58d9acaf020f7b26e11973f1350d2e9b50d8cdda1d4449f0c8f9812b83
                                                          • Opcode Fuzzy Hash: 8e5790251e93a12e5fd9cabc79d73ce98680bdcb44366959e349439badd73690
                                                          • Instruction Fuzzy Hash: EB11E171240614AFDB209F25EC45FA6B7B9FF94311F149A18F90AB76A2C774E8C48A90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00E49476
                                                            • Part of subcall function 00E493C3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00E493F2
                                                            • Part of subcall function 00E493C3: ___AdjustPointer.LIBCMT ref: 00E4940D
                                                          • _UnwindNestedFrames.LIBCMT ref: 00E4948B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00E4949C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00E494C4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 168c9c34df258510efb0ff844af28b6366e521c082595d16045faf1b1b758ed9
                                                          • Instruction ID: 97f4621d7aa04d9cd9081159f76a2507be1cae121d200b64d366de8a1ae762ad
                                                          • Opcode Fuzzy Hash: 168c9c34df258510efb0ff844af28b6366e521c082595d16045faf1b1b758ed9
                                                          • Instruction Fuzzy Hash: 5E019E32100108BBCF126F95EC41EEB3FAAEF88358F045014FE5876122C332E861DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E12FF4
                                                          • QueryPerformanceFrequency.KERNEL32(00989680,?,?,?,?,?,?,?,?,00000001), ref: 00E1302A
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 00E13046
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E1306E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQueryUnothrow_t@std@@@__ehfuncinfo$??2@$CounterFrequency
                                                          • String ID:
                                                          • API String ID: 1219647529-0
                                                          • Opcode ID: 565285fcd70ec6d0b2715de8e925ca12360cf36443defaebf779894f07e6dd70
                                                          • Instruction ID: 19f2f7fcb87aa264744a78e13d73d6345cf463c2c2ec9581a21ea41775df5a74
                                                          • Opcode Fuzzy Hash: 565285fcd70ec6d0b2715de8e925ca12360cf36443defaebf779894f07e6dd70
                                                          • Instruction Fuzzy Hash: 00111CB5A10211AFD710EF6AFC45E9637E8EB8A710B045516F114B72B3D630B848CB75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00E03C1D
                                                          • WindowFromPoint.USER32(?,?), ref: 00E03C29
                                                          • InvalidateRect.USER32(?,00000000,00000001,00000000), ref: 00E03C6F
                                                          • _TrackMouseEvent.COMCTL32(?), ref: 00E03C8D
                                                            • Part of subcall function 00E03347: InvalidateRect.USER32(?,00000000,00000001,00E037CC), ref: 00E03365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect$ClientEventFromMousePointScreenTrackWindow
                                                          • String ID:
                                                          • API String ID: 2310010663-0
                                                          • Opcode ID: dac7c284d8e1b9f55e83b30bde59d270611e70aa9a625334e703265bf3e218c6
                                                          • Instruction ID: 8336f4ba0860f9059686957f756209e9ab47d1982bda8a7e220290c7abdf18dd
                                                          • Opcode Fuzzy Hash: dac7c284d8e1b9f55e83b30bde59d270611e70aa9a625334e703265bf3e218c6
                                                          • Instruction Fuzzy Hash: AD115E714002159FEB25DB74C84CAAAB7F9FF44304F00952EE59AE5192EB71D9848B20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTopWindow.USER32(?), ref: 00E22FD2
                                                          • GetTopWindow.USER32(00000000), ref: 00E23015
                                                          • GetWindow.USER32(00000000,00000002), ref: 00E23037
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID:
                                                          • API String ID: 2353593579-0
                                                          • Opcode ID: b94aa01deae5ff187e9e00b545aa2f7db87e5252c9f7cd94772012096edbe86b
                                                          • Instruction ID: ddfd081b6465e56449cdc9697eb4003f7d242614bd3c7314e33d61a1076d4c66
                                                          • Opcode Fuzzy Hash: b94aa01deae5ff187e9e00b545aa2f7db87e5252c9f7cd94772012096edbe86b
                                                          • Instruction Fuzzy Hash: 1C01083210152ABBDF225FA1ED08EDE3F66AF08354F045004FA1574061C77ACAA5EFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,?), ref: 00E20A63
                                                          • GetTopWindow.USER32(00000000), ref: 00E20A70
                                                            • Part of subcall function 00E20A59: GetWindow.USER32(00000000,00000002), ref: 00E20ABF
                                                          • GetTopWindow.USER32(?), ref: 00E20AA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$Item
                                                          • String ID:
                                                          • API String ID: 369458955-0
                                                          • Opcode ID: 6aef38ae9f5dc80f95b0eae2658ab11ce98ee9d5d4980492978242bec6d1e863
                                                          • Instruction ID: 46c3f913d9768dccd40c338e88039db1c7c37ba4dce5a6d98c6353eb2fe124db
                                                          • Opcode Fuzzy Hash: 6aef38ae9f5dc80f95b0eae2658ab11ce98ee9d5d4980492978242bec6d1e863
                                                          • Instruction Fuzzy Hash: D401D17150273ABFDF22AF61AC04AEE3B68BF14358F45A010FC15B41A3E732C9519AE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindResourceW.KERNEL32(?,?,000000F0), ref: 00E20895
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00E208A1
                                                          • LockResource.KERNEL32(00000000), ref: 00E208AE
                                                          • FreeResource.KERNEL32(00000000,00000000), ref: 00E208CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindFreeLoadLock
                                                          • String ID:
                                                          • API String ID: 1078018258-0
                                                          • Opcode ID: 21afe086b7bc508dc25099d145d77fc761c5f7b651b7a2b8d7beb3a35dfc791e
                                                          • Instruction ID: f93a25cb855067c5f92f2b7b0c467c775122d4bca524e98a030ad78303db7f5f
                                                          • Opcode Fuzzy Hash: 21afe086b7bc508dc25099d145d77fc761c5f7b651b7a2b8d7beb3a35dfc791e
                                                          • Instruction Fuzzy Hash: 1AF0C2326013207FD729AB66BC44E6FB6ACAF85764B045124FD09F3663DA30CC4096E4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(?), ref: 00E2B038
                                                          • GetParent.USER32(?), ref: 00E2B04B
                                                          • GetParent.USER32(?), ref: 00E2B065
                                                          • SetFocus.USER32(?,00000000,?,?,00E03A51,00000000), ref: 00E2B07E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Parent$Focus
                                                          • String ID:
                                                          • API String ID: 384096180-0
                                                          • Opcode ID: 4609985ba4f7484920df2badfea7e350fd81c1a6cbbcb6eacb224ed128ddad7d
                                                          • Instruction ID: 991aac5578f1bc1c1f0fa516881d015388f6a6c0d970973af1202e7cbf789fae
                                                          • Opcode Fuzzy Hash: 4609985ba4f7484920df2badfea7e350fd81c1a6cbbcb6eacb224ed128ddad7d
                                                          • Instruction Fuzzy Hash: FBF0FB32610724DBCF226B71F818D1BBBAABFC83117052929B596A3563DF2598409B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00E2B8E6
                                                          • GetActiveWindow.USER32 ref: 00E2B8F0
                                                          • SetActiveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00E2B8FC
                                                          • FreeResource.KERNEL32(?,?,?,?,?,00000000), ref: 00E2B926
                                                            • Part of subcall function 00E2A5EA: EnableWindow.USER32(?,00000000), ref: 00E2A5FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Window$ActiveEnable$FreeResource
                                                          • String ID:
                                                          • API String ID: 253586258-0
                                                          • Opcode ID: e8f71006a79267c51c5714620de28a70c873973e5d198762f3d12b4604e03949
                                                          • Instruction ID: 45585e9b6f8fe75aed3ad81aa29f5cfe97644b9457a3bcd709543e37575a7e7c
                                                          • Opcode Fuzzy Hash: e8f71006a79267c51c5714620de28a70c873973e5d198762f3d12b4604e03949
                                                          • Instruction Fuzzy Hash: 1A016D30A012299FCF19EF61E889BADB775BF48311F041004EA05732A2CB746C85CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WriteConsoleW.KERNEL32(00E0EC8E,004BEC50,?,00000000,00E0EC8E,?,00E6A4A0,00E0EC8E,00000001,00E0EC8E,00E0EC8E,?,00E5FF8C,00E0EC8E,?,00E0EC8E), ref: 00E6B6D9
                                                          • GetLastError.KERNEL32(?,00E6A4A0,00E0EC8E,00000001,00E0EC8E,00E0EC8E,?,00E5FF8C,00E0EC8E,?,00E0EC8E,00E0EC8E,00E0EC8E,?,00E6050B,00E4F84C), ref: 00E6B6E5
                                                            • Part of subcall function 00E6B6AB: CloseHandle.KERNEL32(FFFFFFFE,00E6B6F5,?,00E6A4A0,00E0EC8E,00000001,00E0EC8E,00E0EC8E,?,00E5FF8C,00E0EC8E,?,00E0EC8E,00E0EC8E,00E0EC8E), ref: 00E6B6BB
                                                          • ___initconout.LIBCMT ref: 00E6B6F5
                                                            • Part of subcall function 00E6B66D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E6B69C,00E6A486,00E0EC8E,?,00E5FF8C,00E0EC8E,?,00E0EC8E,00E0EC8E), ref: 00E6B680
                                                          • WriteConsoleW.KERNEL32(00E0EC8E,004BEC50,?,00000000,?,00E6A4A0,00E0EC8E,00000001,00E0EC8E,00E0EC8E,?,00E5FF8C,00E0EC8E,?,00E0EC8E,00E0EC8E), ref: 00E6B70A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                          • String ID:
                                                          • API String ID: 2744216297-0
                                                          • Opcode ID: f250c321fd6a254fd0a899fd6af88b42e422f79cc4d8cf33d54ee71b9c273054
                                                          • Instruction ID: f8ecef89dace345ab8ed62bd43f273f5a2c64d38ac84a28fcd9feec6129aaec8
                                                          • Opcode Fuzzy Hash: f250c321fd6a254fd0a899fd6af88b42e422f79cc4d8cf33d54ee71b9c273054
                                                          • Instruction Fuzzy Hash: 47F0FE36440115BFCF126F92EC089893EA5FF493A0F044110F908E5131D7319CA0DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 00E42417
                                                          • GetTickCount.KERNEL32 ref: 00E42428
                                                          • CoFreeUnusedLibraries.OLE32 ref: 00E4243B
                                                          • GetTickCount.KERNEL32 ref: 00E42441
                                                            • Part of subcall function 00E4238D: CoFreeUnusedLibraries.OLE32 ref: 00E423E2
                                                            • Part of subcall function 00E4238D: OleUninitialize.OLE32 ref: 00E423E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CountTick$FreeLibrariesUnused$Uninitialize
                                                          • String ID:
                                                          • API String ID: 685759847-0
                                                          • Opcode ID: 65b9971282cffb176721417eb6a965ab2f9360dcc178fe8bd3c457fed37d18b2
                                                          • Instruction ID: b26bce746aa3c9a04ccbe462560354c2d88941657e9bb8fbd4cd078dddc284fa
                                                          • Opcode Fuzzy Hash: 65b9971282cffb176721417eb6a965ab2f9360dcc178fe8bd3c457fed37d18b2
                                                          • Instruction Fuzzy Hash: E6E0C9308156098FD710AFA6FC4D2583BB1FB06315F98512AF519F5571C734A8E8CB22
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00E74980
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$Enter
                                                          • String ID: HR::SendRequest$c:\rhub2\code\hlib\hlib.cpp$error code=%d
                                                          • API String ID: 2978645861-3379328656
                                                          • Opcode ID: 1f6565d28a0a8eb1b644d8cceec9bd69e1ea7cd14bd00a341fb0f0c146c5d36b
                                                          • Instruction ID: 2ebdaea7907b454b3fbaed34d20ae63ae78ec159364e60c78454578d9cb8e5a0
                                                          • Opcode Fuzzy Hash: 1f6565d28a0a8eb1b644d8cceec9bd69e1ea7cd14bd00a341fb0f0c146c5d36b
                                                          • Instruction Fuzzy Hash: FCD05EF2BC0300BBDB005754DC47F8B26A9AF94B04F443060B909B53E3D2A9AA998668
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32 ref: 00E723F7
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterErrorLastLeave
                                                          • String ID: HR::Detect$c:\rhub2\code\hlib\hlib.cpp$error code=%d
                                                          • API String ID: 4082018349-3618719425
                                                          • Opcode ID: 3777db2c914bbe5b20aa077b558fb8fef6e2ae4b4af71b07f909c52e7d92f260
                                                          • Instruction ID: a88f636a4f02024ba7676b7241fdccac759e44d2361dd178f23298911c5dfabf
                                                          • Opcode Fuzzy Hash: 3777db2c914bbe5b20aa077b558fb8fef6e2ae4b4af71b07f909c52e7d92f260
                                                          • Instruction Fuzzy Hash: E9D0A9313C0340BEDB025708CC83F5A3664AB02B00F8460A4B2087E2E3C2E62E89C7B8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32 ref: 00E74C35
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterErrorLastLeave
                                                          • String ID: HLib::SetOptionA$c:\rhub2\code\hlib\hlib.cpp$error code=%d
                                                          • API String ID: 4082018349-1992909155
                                                          • Opcode ID: d5d8e4ccfef10d56dee1f03a54eb969645d159dcdee7e1fa0a040ac64f2f4267
                                                          • Instruction ID: 51de0417160461f7ca50f239bf73d0cf560538505f61b5196cfaf90f1fba3088
                                                          • Opcode Fuzzy Hash: d5d8e4ccfef10d56dee1f03a54eb969645d159dcdee7e1fa0a040ac64f2f4267
                                                          • Instruction Fuzzy Hash: 17C08CB23C03007FEF021710AC07F2A3225B365B02F8430A0BA0C792E3C3C114498369
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32 ref: 00E72D83
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterErrorLastLeave
                                                          • String ID: HR::DoRequest$c:\rhub2\code\hlib\hlib.cpp$error code=%d
                                                          • API String ID: 4082018349-1477512771
                                                          • Opcode ID: b757d2f27812caa48ead7b4c19fe1fbbe073a74d1bc5b57945677f88707dff20
                                                          • Instruction ID: f45f838a19a430d77501380ae012fbd829adb5b7d8fbde68bd011107d7b8778e
                                                          • Opcode Fuzzy Hash: b757d2f27812caa48ead7b4c19fe1fbbe073a74d1bc5b57945677f88707dff20
                                                          • Instruction Fuzzy Hash: 22C08C723C07007FDE211B10AC07F293224A791F45F943064B709BC2F3C2D024498768
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32 ref: 00E74EE1
                                                            • Part of subcall function 00E0EEE0: EnterCriticalSection.KERNEL32(?,904898A6,?,?,00000000), ref: 00E0EF31
                                                            • Part of subcall function 00E0EEE0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000), ref: 00E0EF7F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterErrorLastLeave
                                                          • String ID: HLib::SetOptionR$c:\rhub2\code\hlib\hlib.cpp$error code=%d
                                                          • API String ID: 4082018349-367263832
                                                          • Opcode ID: 42cddc20582f6eb24fe420054adaa9c2c44f41819f93eda4d724b27dcc8d0ff3
                                                          • Instruction ID: 92a57a708f953c2a51ffd4797ca64c99b030c5f26074f8cb96b1c0f303151ad4
                                                          • Opcode Fuzzy Hash: 42cddc20582f6eb24fe420054adaa9c2c44f41819f93eda4d724b27dcc8d0ff3
                                                          • Instruction Fuzzy Hash: 09C08CF33C07007FEE022700AC03F2A3528A344B00FC43064BB08782F3D2D81A499328
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3_catch_memcpy_s
                                                          • String ID: |
                                                          • API String ID: 76230481-1477062447
                                                          • Opcode ID: 57f79f24f4d44c8aaf78e3db9fbf336f2d9cee7a5fa8c1da6acf50e88241a0e2
                                                          • Instruction ID: 73740d3e0b7393ee4224f07ab2146a0da08f3233dfbcadd30ae7a2f63b831059
                                                          • Opcode Fuzzy Hash: 57f79f24f4d44c8aaf78e3db9fbf336f2d9cee7a5fa8c1da6acf50e88241a0e2
                                                          • Instruction Fuzzy Hash: 45916E71A01A0ADFCB18DF64C9889AEBBB5FF49314F245229E425B7391D731AD41CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID: 4J
                                                          • API String ID: 2931989736-303676377
                                                          • Opcode ID: dfd0125a623c65ae0906558229c1701118de3337edf5e02ecd3f611b019f0d57
                                                          • Instruction ID: 0b204bdee15eba212e5b467bfe3a4e9b1d59ef78af966498d843d0177a1474af
                                                          • Opcode Fuzzy Hash: dfd0125a623c65ae0906558229c1701118de3337edf5e02ecd3f611b019f0d57
                                                          • Instruction Fuzzy Hash: B9714D75A10619EFCB08DF96CC4896EBBB9FF88715B000099E94AFB361DB71AD41CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00E5C7CD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 56308522cb5813009b3ac2666e1c61aeee9b76273840e880821e83a12d0c922e
                                                          • Instruction ID: b8f557a78c1e238401dc0738fb0ff0d5b732bd0f9b883c9e9a2226b26187f748
                                                          • Opcode Fuzzy Hash: 56308522cb5813009b3ac2666e1c61aeee9b76273840e880821e83a12d0c922e
                                                          • Instruction Fuzzy Hash: FA517C719443028ECB157724EA6137A27D49B44785F347E56E899721A9EF318C8C9F42
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetRectEmpty.USER32(!), ref: 00E2EF86
                                                            • Part of subcall function 00E1D4D9: SetRectEmpty.USER32(?), ref: 00E1D4E4
                                                            • Part of subcall function 00E1D4D9: GetClientRect.USER32(00000000,?), ref: 00E1D4FB
                                                            • Part of subcall function 00E1D4D9: OffsetRect.USER32(?,00000000,00000000), ref: 00E1D538
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Rect$Empty$ClientOffset
                                                          • String ID: !$!
                                                          • API String ID: 2342594873-1572258622
                                                          • Opcode ID: 4bd90ac72df5e9b65bac6de2e37bf325f88d77265b950b17fe265dc4750ef14b
                                                          • Instruction ID: 2b89845cbf534714af18077e4bc347fc55414e9ac0adbe56e310ef819ceb59af
                                                          • Opcode Fuzzy Hash: 4bd90ac72df5e9b65bac6de2e37bf325f88d77265b950b17fe265dc4750ef14b
                                                          • Instruction Fuzzy Hash: 8A618971D0061EDBCB00DF95E5495EEBFF4FF08310F6240A9D984B6255DB329A65CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3_wcsrchr
                                                          • String ID: :/\
                                                          • API String ID: 3614732858-2793184486
                                                          • Opcode ID: 5f00922bdb5af845aa5ddae7be050a224334baa11e0ab7ba6060524eef295da2
                                                          • Instruction ID: 0d68b7a48ac6f324fcf0bb8c288fd7a5dfe621f7fc4e1d646e10abcff142dea4
                                                          • Opcode Fuzzy Hash: 5f00922bdb5af845aa5ddae7be050a224334baa11e0ab7ba6060524eef295da2
                                                          • Instruction Fuzzy Hash: A4515E71A002099FDB04EFA4C999BEEB7F8BF48300F14156DE511B72D2DB749944CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GlobalLock.KERNEL32(?,?,0000000A,System,00E3E609,System,?,?,?,00000000), ref: 00E3E43F
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E3E557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Global$LockUnlock
                                                          • String ID: System
                                                          • API String ID: 2502338518-3470857405
                                                          • Opcode ID: 67c5463078b006245fa2b2d411db9c54b4df1b4946d40fa593f0bffe1887bc4e
                                                          • Instruction ID: 72426a879d654be2ae22c4cd64a5cd365fe5bd92abcd3a78d5921a4f37596f52
                                                          • Opcode Fuzzy Hash: 67c5463078b006245fa2b2d411db9c54b4df1b4946d40fa593f0bffe1887bc4e
                                                          • Instruction Fuzzy Hash: 0941927190011AAFDB24DFA8C8499BEBBF5FF04358F109569E425F7291E734AE44CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E63DCD: _free.LIBCMT ref: 00E63E2D
                                                            • Part of subcall function 00E63A44: GetOEMCP.KERNEL32(00000000), ref: 00E63A6F
                                                          • _free.LIBCMT ref: 00E63D2A
                                                          • _free.LIBCMT ref: 00E63D60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: xxH
                                                          • API String ID: 269201875-977459878
                                                          • Opcode ID: aa41fbd97e6dcd717b2f9894ee05ee3f7246a1ec5997b20b581bc14a9c36d614
                                                          • Instruction ID: 3914e323ebd14178b6581e1f12b2f0ef11edba9ec9614124941452950013f16e
                                                          • Opcode Fuzzy Hash: aa41fbd97e6dcd717b2f9894ee05ee3f7246a1ec5997b20b581bc14a9c36d614
                                                          • Instruction Fuzzy Hash: 29310671904249AFCB10DF68E840BDE7BF4FF45354F11145AF910AB2A1EB329E10CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00E65CE3,?,00000050,?,?,?,?,?), ref: 00E65B63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ACP$OCP
                                                          • API String ID: 0-711371036
                                                          • Opcode ID: d35f23c915ff72665a5f478d2b49fd46c6149174c575072be586d79e3fa031e8
                                                          • Instruction ID: db20ace18c9d74ed47979d7deea5a2c60b72fed53554d0144f6220b471b7ed3c
                                                          • Opcode Fuzzy Hash: d35f23c915ff72665a5f478d2b49fd46c6149174c575072be586d79e3fa031e8
                                                          • Instruction Fuzzy Hash: BA21D663B80A00A6D7349F54ED41BA7B396EF54BD4F5A5625E909F7101F732DD40C350
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E27B84: RegCloseKey.ADVAPI32(00000000,?,?,?,?,00E279B3,?,00000000), ref: 00E27BC9
                                                          • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000003,?,?,?,00000000), ref: 00E27CF4
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E27CFD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: Close$Value
                                                          • String ID: A
                                                          • API String ID: 299128501-3554254475
                                                          • Opcode ID: 4bc3c485636c6fde7192dac4ab36fde45cc4ce339ec483094867c707a65ff688
                                                          • Instruction ID: 9f1c0cb7454ef2a7afb4bf87189d1658a1afdb2cfe0fd5935789072aafad287c
                                                          • Opcode Fuzzy Hash: 4bc3c485636c6fde7192dac4ab36fde45cc4ce339ec483094867c707a65ff688
                                                          • Instruction Fuzzy Hash: 0B21F236200225ABCF159F65EC45AFF7BB9EF4A350F04502AFC49AB251DA75CC41D760
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ChildWindow
                                                          • String ID: 4&
                                                          • API String ID: 3555343667-1676276578
                                                          • Opcode ID: 682347e6d140cf2fb8fa0fe4c41f1409c405d9b8f774b3b6c40a5cd94510bddd
                                                          • Instruction ID: a769dd653bbdbd4869f76cf1594a0b1140e4d02bba1d13d31da13e968f475361
                                                          • Opcode Fuzzy Hash: 682347e6d140cf2fb8fa0fe4c41f1409c405d9b8f774b3b6c40a5cd94510bddd
                                                          • Instruction Fuzzy Hash: 9D11CE723002356B9B20ABBAAC91D7F73EC9F95B487052038F906F2251FA60DD0582B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDriveTypeW.KERNEL32(00E54F67,?,?,00000000,00000000), ref: 00E555F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: DriveType
                                                          • String ID: ./\$gO
                                                          • API String ID: 338552980-1752363115
                                                          • Opcode ID: 23df09cdb20e4fb43135f81701203c7d1ca568b74ba49f9949db1e6066755823
                                                          • Instruction ID: 5f8a508d5f854ffe2c9c61cd4df623a9b51b371db3b91ed4fa530f72b7bf796c
                                                          • Opcode Fuzzy Hash: 23df09cdb20e4fb43135f81701203c7d1ca568b74ba49f9949db1e6066755823
                                                          • Instruction Fuzzy Hash: CE119C366006086BDB14AF64DCA55FF73E8EF86315F9418A9ED0577181EAB05E8E8640
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: l
                                                          • API String ID: 269201875-1854719717
                                                          • Opcode ID: 006c83560e400caf901cc4289af2b8981d14c693af888e4f78412cd8212c7205
                                                          • Instruction ID: 98b88d87c44affd522060caf6d79dbbb4114fc8c1f63e4a0dea64c58fed900e6
                                                          • Opcode Fuzzy Hash: 006c83560e400caf901cc4289af2b8981d14c693af888e4f78412cd8212c7205
                                                          • Instruction Fuzzy Hash: AB11B171A803004ED7345B29BC4AB173396A755734F182B36E930FB2E1E3B0E94A8681
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          • c:\rhub2\pcsetup\pcsetup.cpp, xrefs: 00E13082
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strstr
                                                          • String ID: c:\rhub2\pcsetup\pcsetup.cpp
                                                          • API String ID: 2882301372-158182345
                                                          • Opcode ID: 2f94966675e251f15210b8c43a4b1ffefe2f979a24a0de6232a18e4782300b86
                                                          • Instruction ID: b685237338fb45090f543653c88a1cb565728ce97b0bb4473d4c3a821771f199
                                                          • Opcode Fuzzy Hash: 2f94966675e251f15210b8c43a4b1ffefe2f979a24a0de6232a18e4782300b86
                                                          • Instruction Fuzzy Hash: 8F0126362043160BE6208DB46881BE7B7CCCA95755F04107CFC8567101DB929E8A46B1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: Pn
                                                          • API String ID: 269201875-1375425085
                                                          • Opcode ID: 10054aeb001a5d7c3fe503c6fdfe74340a058d9ae9e9863e66324d3a33a539da
                                                          • Instruction ID: 729711212576b68e3ebdc14d9d3ea78e7c16e5378103148eed8efc64c1a3cdff
                                                          • Opcode Fuzzy Hash: 10054aeb001a5d7c3fe503c6fdfe74340a058d9ae9e9863e66324d3a33a539da
                                                          • Instruction Fuzzy Hash: 3D01F125A4D3222E8A312374AC12A6F22CB9B26763F342E20BE34BA0D1D9519C1D51F2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: _strstr
                                                          • String ID: %3F
                                                          • API String ID: 2882301372-2853428364
                                                          • Opcode ID: c6a3054798f3a33e3877dd777167fe41ebcd1e20ac3febb51a3dab8483b47d41
                                                          • Instruction ID: 53364bc918c0556989413e5bd19f48c880318db6c44cacf54850e8ffff20598c
                                                          • Opcode Fuzzy Hash: c6a3054798f3a33e3877dd777167fe41ebcd1e20ac3febb51a3dab8483b47d41
                                                          • Instruction Fuzzy Hash: C5F050371046519ACE2199687C049CB2FD68ED1364F05146DF48437201D665594783F2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: H_prolog3
                                                          • String ID: tG$tG
                                                          • API String ID: 431132790-276734821
                                                          • Opcode ID: 1080f626e605fd5ae4e5b6b1703f85e9985ee348646c3af0c4ba9979a0ebce19
                                                          • Instruction ID: 582ebc1aff6b90754deeb65b85a7ca8470bd3f883b620025c135b0a1ef003f37
                                                          • Opcode Fuzzy Hash: 1080f626e605fd5ae4e5b6b1703f85e9985ee348646c3af0c4ba9979a0ebce19
                                                          • Instruction Fuzzy Hash: F2F03A7190111AAACF05FFA0DC06AAE7BB8BF10354F086818F915762D1DF719910DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(?,g), ref: 00E23A8B
                                                          • LoadIconW.USER32(00000000,00007F00), ref: 00E23A9E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: g
                                                          • API String ID: 2457776203-1037297435
                                                          • Opcode ID: 6746c69ed25f39b4ccde54491c35783c32adc93cc4702d7631bb53953d85c9dd
                                                          • Instruction ID: 48d23caed3c62759781adac53c848a462d3deeb10ef40a5c066efaed2584a3ca
                                                          • Opcode Fuzzy Hash: 6746c69ed25f39b4ccde54491c35783c32adc93cc4702d7631bb53953d85c9dd
                                                          • Instruction Fuzzy Hash: 3BE09A71500724AFCB20EFA9EC048BBB7ECEF08710700442AFC49E7211DA34E940CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,TMSetupWindow,00000000,00E08130,904898A6,?,?,00E0176D,?,?,00000000,00001000), ref: 00E0E4E6
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,00E0176D,?,?,00000000,00001000), ref: 00E0E4F7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CreateEvent
                                                          • String ID: TMSetupWindow
                                                          • API String ID: 2692171526-637819172
                                                          • Opcode ID: 15a95d14904376c57eec7152cfcac89ed67438d6b3f5d97203b73e65a91b0a10
                                                          • Instruction ID: 2e350a694712ef49e1b494a9a11abe9c22beeddca389226ff4908ec86231ebbc
                                                          • Opcode Fuzzy Hash: 15a95d14904376c57eec7152cfcac89ed67438d6b3f5d97203b73e65a91b0a10
                                                          • Instruction Fuzzy Hash: 23E01AB0380301BEE3148F16DC0AB02FAA0AB84B10F20851AF204AE6C0D7F1A4948B94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00E0156F: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00E451B9,?,?,?,00E012B2), ref: 00E01574
                                                            • Part of subcall function 00E0156F: GetLastError.KERNEL32(?,00E451B9,?,?,?,00E012B2), ref: 00E0157E
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00E012B2), ref: 00E451BD
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E012B2), ref: 00E451CC
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00E451C7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerErrorInitializeLastOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 450123788-631824599
                                                          • Opcode ID: 3b4a964da20da59986572f64068abb6b8aefb3d4ed873d776fdc5c8ef09169bb
                                                          • Instruction ID: 59f7ee9ad888d48b5fe9e9337c680b12c368a268278578b7917bfde20e95f42b
                                                          • Opcode Fuzzy Hash: 3b4a964da20da59986572f64068abb6b8aefb3d4ed873d776fdc5c8ef09169bb
                                                          • Instruction Fuzzy Hash: AAE06D72200B418FD320EF69F8047467AE4AF45744F00995DE89AFB752EBB1E48CCB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00E453E3
                                                            • Part of subcall function 00E4533D: std::exception::exception.LIBCONCRT ref: 00E4534A
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E453F1
                                                            • Part of subcall function 00E47B17: RaiseException.KERNEL32(?,?,00E453D6,?,?,?,?,?,?,?,?,00E453D6,?,00E9D10C,?), ref: 00E47B77
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                          • String ID: Unknown exception
                                                          • API String ID: 1586462112-410509341
                                                          • Opcode ID: d8227236c44e0bd92f5d48738c35f52caf09397bc066a19d8d628846f74c656a
                                                          • Instruction ID: dcdba17e05bde3799562759f4bca2f5ba6e6ab0271696d2892137bae24b54a45
                                                          • Opcode Fuzzy Hash: d8227236c44e0bd92f5d48738c35f52caf09397bc066a19d8d628846f74c656a
                                                          • Instruction Fuzzy Hash: 14D0A736E0470877CF00FAA4E806D8C77AC9E00780B909860B914F7142F7B1E91687C0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,000000FF,000000FF,00000000,00000000,00000000,?,00000000), ref: 00E673AA
                                                          • GetLastError.KERNEL32 ref: 00E673B8
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 00E67413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: a46a8f47f3b9727d8a0408f2aa0c485e0cbcc1607ec3b8984555cc87f16d66fe
                                                          • Instruction ID: a66147402e877288eaac86fbef7923ab071927a5b16f07619d4539f3cafff1fc
                                                          • Opcode Fuzzy Hash: a46a8f47f3b9727d8a0408f2aa0c485e0cbcc1607ec3b8984555cc87f16d66fe
                                                          • Instruction Fuzzy Hash: 2D410A30648255AFCF21CF65E848ABA7FA4EF413ACF145158E8E977192DB308D01D761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?,00000001,00000000,00000010,?,?,00000000), ref: 00E2D12C
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000), ref: 00E2D13F
                                                          • LocalFree.KERNEL32(?,?,?,00000000), ref: 00E2D148
                                                          • TlsSetValue.KERNEL32(?,00000000,?,?,00000000), ref: 00E2D164
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterFreeLeaveLocalValue
                                                          • String ID:
                                                          • API String ID: 2949335588-0
                                                          • Opcode ID: 9ea08fe5ea169aee703b00735ccc2b3d171a7af2b718826b850e933e5d6d3702
                                                          • Instruction ID: f80e8f0a38f91a2cac4a1574020372fcdf67b8fc52e6dab4e9751a45a96b505f
                                                          • Opcode Fuzzy Hash: 9ea08fe5ea169aee703b00735ccc2b3d171a7af2b718826b850e933e5d6d3702
                                                          • Instruction Fuzzy Hash: 99218E35A00228EFCB14DF59EC84A9DBBB5FF49315F148159EA06AB261C731ED92CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(00EAF9A0,00000000,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE4A
                                                          • InitializeCriticalSection.KERNEL32(00000000,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE60
                                                          • LeaveCriticalSection.KERNEL32(00EAF9A0,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE6E
                                                          • EnterCriticalSection.KERNEL32(00000000,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DE7B
                                                            • Part of subcall function 00E2DDB0: InitializeCriticalSection.KERNEL32(00EAF9A0,00E2DE34,?,?,?,00E2D261,00000010,00000008,00E1DE06,00E1DE49,00E1DEA6,00E25C04,904898A6), ref: 00E2DDC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterInitialize$Leave
                                                          • String ID:
                                                          • API String ID: 713024617-0
                                                          • Opcode ID: bebb9b9d52f92ec93bc1e0f9f97baad6e324cb042491113cc6e45937a2242b2b
                                                          • Instruction ID: 97545ae3bcff12964aa5adea95000ebf2aacc0b22276aa543b03c8ba20273a75
                                                          • Opcode Fuzzy Hash: bebb9b9d52f92ec93bc1e0f9f97baad6e324cb042491113cc6e45937a2242b2b
                                                          • Instruction Fuzzy Hash: ECF09C73900224BFCA106BD6FC0DB5A766CEF9E322F856421F645B6062C734D446C696
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(0000001C,?,?,00000000,?,00E2D33F,00000000,00000004,00E1DDEC,00E1DEA6,00E25C04,904898A6), ref: 00E2D368
                                                          • TlsGetValue.KERNEL32(00000000,?,?,00000000,?,00E2D33F,00000000,00000004,00E1DDEC,00E1DEA6,00E25C04,904898A6), ref: 00E2D37C
                                                          • LeaveCriticalSection.KERNEL32(0000001C,?,?,00000000,?,00E2D33F,00000000,00000004,00E1DDEC,00E1DEA6,00E25C04,904898A6), ref: 00E2D396
                                                          • LeaveCriticalSection.KERNEL32(0000001C,?,?,00000000,?,00E2D33F,00000000,00000004,00E1DDEC,00E1DEA6,00E25C04,904898A6), ref: 00E2D3A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1476925615.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                          • Associated: 00000000.00000002.1476906068.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476961743.0000000000E79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476983318.0000000000EA1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1476997541.0000000000EA6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477010902.0000000000EA8000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477023099.0000000000EAE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1477058529.0000000000EB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e00000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$EnterValue
                                                          • String ID:
                                                          • API String ID: 3969253408-0
                                                          • Opcode ID: 89409e10f04352deb2afde481aca2bb44e6d86876d6edd1f603887708858acdf
                                                          • Instruction ID: 762fbd7f6ebb73f2be081a960b25de917e1ff075fed17ac1e3547ebdd3181827
                                                          • Opcode Fuzzy Hash: 89409e10f04352deb2afde481aca2bb44e6d86876d6edd1f603887708858acdf
                                                          • Instruction Fuzzy Hash: 04F09076304624AFCB10EB26EC849DAB7A8EF487603555015E90AB7222C631EC458AE2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Execution Graph

                                                          Execution Coverage:6.3%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:0.1%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:55
                                                          execution_graph 52941 ca2448 52942 ca24b6 52941->52942 53009 caf930 EnterCriticalSection 52942->53009 52944 ca24cd _strstr 52945 caf930 94 API calls 52944->52945 52946 ca253f 52945->52946 52947 caf930 94 API calls 52946->52947 52948 ca256c 52947->52948 53074 cb3370 52948->53074 52951 caf930 94 API calls 52952 ca2604 52951->52952 53150 ca6620 52952->53150 52956 ca2639 53155 ce4f37 52956->53155 53010 ce4f37 28 API calls 53009->53010 53011 caf998 53010->53011 53012 caf9da 53011->53012 53013 caf9a5 53011->53013 53394 caf700 53012->53394 53014 ca6620 44 API calls 53013->53014 53015 caf9c5 LeaveCriticalSection 53014->53015 53016 caff12 53015->53016 53018 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53016->53018 53019 caff2a 53018->53019 53019->52944 53021 cafffa 53578 ce4bea 25 API calls 2 library calls 53021->53578 53022 cafa5d std::ios_base::_Tidy 53024 ca63c0 27 API calls 53022->53024 53026 cafaea 53024->53026 53027 ca6620 44 API calls 53026->53027 53028 cafb02 53027->53028 53029 ca13f0 27 API calls 53028->53029 53030 cafb1c 53029->53030 53031 ca6260 27 API calls 53030->53031 53032 cafb31 53031->53032 53408 ca1390 53032->53408 53035 ca1890 25 API calls 53036 cafb9b std::ios_base::_Tidy 53035->53036 53037 ca13f0 27 API calls 53036->53037 53038 cafcc7 53037->53038 53039 ca6260 27 API calls 53038->53039 53040 cafcf8 53039->53040 53041 ca6260 27 API calls 53040->53041 53042 cafd4a 53041->53042 53043 ca1890 25 API calls 53042->53043 53048 cafd7d std::ios_base::_Tidy 53043->53048 53044 caff2e 53412 cb0060 53044->53412 53045 cafe50 53046 ce973c 68 API calls 53045->53046 53049 cafe5b 53046->53049 53048->53044 53048->53045 53434 caf290 7 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 53049->53434 53050 caff53 __vsnwprintf_s_l 53416 ce8bd4 53050->53416 53052 cafe7d 53053 cafe8d 53052->53053 53435 caf190 80 API calls 2 library calls 53052->53435 53436 caf290 7 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 53053->53436 53057 caff74 53059 cb0060 69 API calls 53057->53059 53058 cafea2 53060 ce4f37 28 API calls 53058->53060 53061 caff84 53059->53061 53062 cafebd 53060->53062 53426 cf02fb 53061->53426 53062->53044 53065 cafeca WSAGetLastError 53062->53065 53064 caff8f 53066 ce973c 68 API calls 53064->53066 53437 ca6660 53065->53437 53068 caff9a 53066->53068 53070 caff00 LeaveCriticalSection 53068->53070 53069 cafee2 53071 ca6620 44 API calls 53069->53071 53073 ca1890 25 API calls 53070->53073 53072 cafef7 53071->53072 53072->53070 53073->53016 53080 cb337a __wsopen_s 53074->53080 53075 cb3470 GetModuleFileNameW GetLongPathNameW 53960 cb6320 53075->53960 53077 cb34ba 53078 caf930 94 API calls 53077->53078 53079 cb34e3 53078->53079 53081 cb34fa GetUserNameW 53079->53081 53080->53075 53080->53080 53082 cb6320 2 API calls 53081->53082 53083 cb3539 53082->53083 53084 cb36cc SHGetFolderPathW 53083->53084 53085 cb35a6 53083->53085 53086 cb370a 53084->53086 53087 cb36e2 53084->53087 53091 caf930 94 API calls 53085->53091 53089 cb6320 2 API calls 53086->53089 53088 caf930 94 API calls 53087->53088 53088->53086 53090 cb3720 53089->53090 53092 caf930 94 API calls 53090->53092 53093 cb35e4 53091->53093 53096 cb3665 53092->53096 53094 ca6620 44 API calls 53093->53094 53095 cb3600 _strstr 53094->53095 53097 cb3618 53095->53097 53103 cb366d _strstr 53095->53103 53098 cb3818 GetTempPathW GetLongPathNameW 53096->53098 53099 cb377d 53096->53099 53102 caf930 94 API calls 53097->53102 53100 cb6320 2 API calls 53098->53100 53965 cb3e60 7 API calls 2 library calls 53099->53965 53104 cb3859 SHGetSpecialFolderPathW 53100->53104 53102->53096 53103->53096 53109 caf930 94 API calls 53103->53109 53106 cb6320 2 API calls 53104->53106 53105 cb3782 53105->53098 53107 cb378a SHGetFolderPathW 53105->53107 53110 cb3886 53106->53110 53108 cb6320 2 API calls 53107->53108 53112 cb37b6 53108->53112 53109->53096 53113 cb3900 53110->53113 53114 cb38e7 53110->53114 53111 cb37f3 53115 caf930 94 API calls 53111->53115 53112->53111 53121 cb38bb 53112->53121 53122 cb3be3 53112->53122 53119 cb390e SHGetFolderPathW 53113->53119 53966 cb3e60 7 API calls 2 library calls 53114->53966 53117 cb3815 53115->53117 53117->53098 53118 cb38ec 53118->53113 53118->53119 53120 cb6320 2 API calls 53119->53120 53126 cb3928 53120->53126 53123 ca6620 44 API calls 53121->53123 53967 cde4de 5 API calls ___report_securityfailure 53122->53967 53123->53111 53125 cb3be8 53126->53126 53127 cb3968 GetLongPathNameW GetLongPathNameW 53126->53127 53128 cb6320 2 API calls 53127->53128 53129 cb39bc SHGetFolderPathW GetLongPathNameW 53128->53129 53130 cb6320 2 API calls 53129->53130 53131 cb39fe 53130->53131 53132 caf930 94 API calls 53131->53132 53133 cb3aa2 53132->53133 53134 caf930 94 API calls 53133->53134 53135 cb3ac7 53134->53135 53136 caf930 94 API calls 53135->53136 53137 cb3aec 53136->53137 53138 caf930 94 API calls 53137->53138 53139 cb3b11 53138->53139 53140 caf930 94 API calls 53139->53140 53141 cb3b33 53140->53141 53142 caf930 94 API calls 53141->53142 53143 cb3b55 53142->53143 53144 caf930 94 API calls 53143->53144 53145 cb3b8e 53144->53145 53146 caf930 94 API calls 53145->53146 53147 cb3bc7 53146->53147 53148 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53147->53148 53149 ca25d9 53148->53149 53149->52951 53151 ca6636 __vsnwprintf_s_l 53150->53151 53968 ce8d01 53151->53968 53154 cb6390 MultiByteToWideChar 53154->52956 53990 ce4e81 53155->53990 53395 caf734 __Getcvt 53394->53395 53579 cefedc GetSystemTimeAsFileTime 53395->53579 53397 caf73b 53581 cf09cb 53397->53581 53403 caf798 53404 ca63c0 27 API calls 53403->53404 53405 caf7c6 53404->53405 53406 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53405->53406 53407 caf7d8 53406->53407 53407->53021 53407->53022 53409 ca13a0 53408->53409 53409->53409 53410 ca6260 27 API calls 53409->53410 53411 ca13b3 53410->53411 53411->53035 53411->53036 53413 cb0074 __vsnwprintf_s_l 53412->53413 53414 ce8bd4 69 API calls 53413->53414 53415 cb007e 53414->53415 53415->53050 53417 ce8c19 53416->53417 53418 ce8c04 53416->53418 53417->53418 53420 ce8c1d 53417->53420 53419 cf2529 _free 14 API calls 53418->53419 53421 ce8c09 53419->53421 53674 ce4fc0 53420->53674 53682 ce4bda 25 API calls _memcpy_s 53421->53682 53425 ce8c14 53425->53057 53427 cf030d 53426->53427 53429 cf0316 ___scrt_uninitialize_crt 53426->53429 53803 cf01a0 67 API calls ___scrt_uninitialize_crt 53427->53803 53431 cf0327 53429->53431 53795 cf0140 53429->53795 53430 cf0313 53430->53064 53431->53064 53434->53052 53435->53053 53436->53058 53438 ca6688 53437->53438 53439 ca6ae3 53437->53439 53440 ca6ac8 53438->53440 53441 ca668e 53438->53441 53442 ca6af0 53439->53442 53443 ca6bf7 53439->53443 53447 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53440->53447 53445 ca669d 53441->53445 53446 ca6b02 __Getcvt 53441->53446 53448 ca6af9 53442->53448 53449 ca6bdc 53442->53449 53444 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53443->53444 53450 ca6c0b 53444->53450 53451 ca680a 53445->53451 53452 ca6a0b 53445->53452 53453 ca694e 53445->53453 53454 ca674d 53445->53454 53455 ca6783 53445->53455 53456 ca6840 53445->53456 53457 ca6a41 53445->53457 53458 ca66c6 53445->53458 53459 ca68c7 53445->53459 53460 ca6984 53445->53460 53461 ca685b 53445->53461 53462 ca6918 53445->53462 53463 ca679e 53445->53463 53464 ca699f 53445->53464 53465 ca6a5c 53445->53465 53466 ca6891 53445->53466 53467 ca6717 53445->53467 53468 ca67d4 53445->53468 53469 ca69d5 53445->53469 53470 ca66ab 53445->53470 53471 ca6768 53445->53471 53472 ca6969 53445->53472 53473 ca67ef 53445->53473 53474 ca68ac 53445->53474 53475 ca68e2 53445->53475 53476 ca66e1 53445->53476 53477 ca6a26 53445->53477 53478 ca6825 53445->53478 53479 ca69ba 53445->53479 53480 ca67b9 53445->53480 53481 ca66fc 53445->53481 53482 ca68fd 53445->53482 53483 ca6732 53445->53483 53484 ca6933 53445->53484 53485 ca69f0 53445->53485 53486 ca6876 53445->53486 53487 ca6a77 53445->53487 53491 ca6b13 FormatMessageW 53446->53491 53488 ca6adc 53447->53488 53448->53446 53490 ca6bc1 53448->53490 53489 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53449->53489 53450->53069 53524 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53451->53524 53519 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53452->53519 53505 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53453->53505 53510 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53454->53510 53514 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53455->53514 53528 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53456->53528 53523 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53457->53523 53499 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53458->53499 53494 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53459->53494 53509 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53460->53509 53529 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53461->53529 53501 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53462->53501 53516 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53463->53516 53511 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53464->53511 53525 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53465->53525 53492 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53466->53492 53506 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53467->53506 53520 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53468->53520 53515 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53469->53515 53497 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53470->53497 53512 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53471->53512 53507 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53472->53507 53522 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53473->53522 53493 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53474->53493 53495 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53475->53495 53502 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53476->53502 53521 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53477->53521 53526 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53478->53526 53513 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53479->53513 53518 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53480->53518 53504 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53481->53504 53498 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53482->53498 53508 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53483->53508 53503 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53484->53503 53517 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53485->53517 53530 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53486->53530 53527 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53487->53527 53488->53069 53500 ca6bf0 53489->53500 53496 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53490->53496 53531 ca6b40 53491->53531 53532 ca68a5 53492->53532 53533 ca68c0 53493->53533 53534 ca68db 53494->53534 53535 ca68f6 53495->53535 53536 ca6bd5 53496->53536 53537 ca66bf 53497->53537 53538 ca6911 53498->53538 53539 ca66da 53499->53539 53500->53069 53540 ca692c 53501->53540 53541 ca66f5 53502->53541 53542 ca6947 53503->53542 53543 ca6710 53504->53543 53544 ca6962 53505->53544 53545 ca672b 53506->53545 53546 ca697d 53507->53546 53547 ca6746 53508->53547 53548 ca6998 53509->53548 53549 ca6761 53510->53549 53550 ca69b3 53511->53550 53551 ca677c 53512->53551 53552 ca69ce 53513->53552 53553 ca6797 53514->53553 53554 ca69e9 53515->53554 53555 ca67b2 53516->53555 53556 ca6a04 53517->53556 53557 ca67cd 53518->53557 53558 ca6a1f 53519->53558 53559 ca67e8 53520->53559 53560 ca6a3a 53521->53560 53561 ca6803 53522->53561 53562 ca6a55 53523->53562 53563 ca681e 53524->53563 53564 ca6a70 53525->53564 53565 ca6839 53526->53565 53566 ca6a8b 53527->53566 53567 ca6854 53528->53567 53568 ca686f 53529->53568 53569 ca688a 53530->53569 53531->53531 53570 ca6b4b WideCharToMultiByte 53531->53570 53532->53069 53533->53069 53534->53069 53535->53069 53536->53069 53537->53069 53538->53069 53539->53069 53540->53069 53541->53069 53542->53069 53543->53069 53544->53069 53545->53069 53546->53069 53547->53069 53548->53069 53549->53069 53550->53069 53551->53069 53552->53069 53553->53069 53554->53069 53555->53069 53556->53069 53557->53069 53558->53069 53559->53069 53560->53069 53561->53069 53562->53069 53563->53069 53564->53069 53565->53069 53566->53069 53567->53069 53568->53069 53569->53069 53571 ca6b79 WideCharToMultiByte 53570->53571 53572 ca6b9e 53570->53572 53571->53572 53573 ca6c12 53571->53573 53574 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53572->53574 53959 cde4de 5 API calls ___report_securityfailure 53573->53959 53575 ca6bba 53574->53575 53575->53069 53577 ca6c17 53580 ceff0e __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 53579->53580 53580->53397 53595 cf1d28 53581->53595 53584 caf74d 53586 cb0020 53584->53586 53587 cb0038 __vsnwprintf_s_l 53586->53587 53652 ce8d49 53587->53652 53590 caf8a0 53591 caf8b0 53590->53591 53591->53591 53592 caf8bb WideCharToMultiByte 53591->53592 53593 caf8de WideCharToMultiByte 53592->53593 53594 caf905 53592->53594 53593->53403 53594->53403 53605 cf7592 GetLastError 53595->53605 53597 cf1d30 53598 cf09d6 53597->53598 53603 cf1d4e 53597->53603 53628 cf89cd 15 API calls 2 library calls 53597->53628 53598->53584 53604 cf073c 44 API calls 5 library calls 53598->53604 53601 cf1d44 53629 cf76ea 53601->53629 53603->53598 53635 cf2529 53603->53635 53604->53584 53606 cf75a9 53605->53606 53607 cf75af 53605->53607 53638 cf7bd2 6 API calls std::_Lockit::_Lockit 53606->53638 53626 cf75b5 SetLastError 53607->53626 53639 cf7c11 6 API calls std::_Lockit::_Lockit 53607->53639 53610 cf75cd 53610->53626 53640 cf768d 53610->53640 53614 cf75fc 53648 cf7c11 6 API calls std::_Lockit::_Lockit 53614->53648 53615 cf75e5 53647 cf7c11 6 API calls std::_Lockit::_Lockit 53615->53647 53618 cf75f3 53623 cf76ea _free 12 API calls 53618->53623 53619 cf7608 53620 cf761d 53619->53620 53621 cf760c 53619->53621 53650 cf7269 14 API calls __dosmaperr 53620->53650 53649 cf7c11 6 API calls std::_Lockit::_Lockit 53621->53649 53623->53626 53625 cf7628 53627 cf76ea _free 12 API calls 53625->53627 53626->53597 53627->53626 53628->53601 53630 cf76f5 RtlFreeHeap 53629->53630 53631 cf771e _free 53629->53631 53630->53631 53632 cf770a 53630->53632 53631->53603 53633 cf2529 _free 12 API calls 53632->53633 53634 cf7710 GetLastError 53633->53634 53634->53631 53636 cf7592 __dosmaperr 14 API calls 53635->53636 53637 cf252e 53636->53637 53637->53598 53638->53607 53639->53610 53646 cf769a __dosmaperr 53640->53646 53641 cf76da 53643 cf2529 _free 13 API calls 53641->53643 53642 cf76c5 RtlAllocateHeap 53644 cf75dd 53642->53644 53642->53646 53643->53644 53644->53614 53644->53615 53646->53641 53646->53642 53651 d01119 EnterCriticalSection LeaveCriticalSection __dosmaperr 53646->53651 53647->53618 53648->53619 53649->53618 53650->53625 53651->53646 53655 ce55a1 53652->53655 53656 ce55c9 53655->53656 53657 ce55e1 53655->53657 53658 cf2529 _free 14 API calls 53656->53658 53657->53656 53659 ce55e9 53657->53659 53660 ce55ce 53658->53660 53671 ce5dec 38 API calls 2 library calls 53659->53671 53670 ce4bda 25 API calls _memcpy_s 53660->53670 53663 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53665 caf77c 53663->53665 53664 ce55f9 __vswprintf_c_l 53672 ce687f 42 API calls 3 library calls 53664->53672 53665->53590 53667 ce5680 53673 ce5e7f 14 API calls _free 53667->53673 53669 ce55d9 53669->53663 53670->53669 53671->53664 53672->53667 53673->53669 53675 ce4fcc ___BuildCatchObject 53674->53675 53683 ce4da2 EnterCriticalSection 53675->53683 53677 ce4fda 53684 ce5ebd 53677->53684 53682->53425 53683->53677 53698 cf9aa6 26 API calls 2 library calls 53684->53698 53686 ce5ee0 53699 ce5dec 38 API calls 2 library calls 53686->53699 53688 ce5ef7 53700 ce62ef 53688->53700 53692 ce5f48 53714 cf9b52 63 API calls ___scrt_uninitialize_crt 53692->53714 53698->53686 53699->53688 53715 ce8504 53700->53715 53702 ce5f3b 53713 ce5e7f 14 API calls _free 53702->53713 53703 ce630f 53704 cf2529 _free 14 API calls 53703->53704 53705 ce6314 53704->53705 53748 ce4bda 25 API calls _memcpy_s 53705->53748 53707 ce6300 53707->53702 53707->53703 53724 ce71e4 53707->53724 53749 ce6a15 25 API calls 2 library calls 53707->53749 53750 ce7b02 41 API calls 53707->53750 53751 ce6c0b 41 API calls 53707->53751 53752 ce6c58 42 API calls 3 library calls 53707->53752 53713->53692 53716 ce851d 53715->53716 53717 ce850a 53715->53717 53754 ce8562 53716->53754 53718 cf2529 _free 14 API calls 53717->53718 53720 ce850f 53718->53720 53753 ce4bda 25 API calls _memcpy_s 53720->53753 53723 ce851a 53723->53707 53725 ce71fd 53724->53725 53726 ce7269 53724->53726 53734 ce7240 53725->53734 53735 ce7209 53725->53735 53727 ce72af 53726->53727 53728 ce7270 53726->53728 53726->53734 53793 ce83a9 26 API calls 53727->53793 53729 ce7217 53728->53729 53730 ce7275 53728->53730 53743 ce7225 53729->53743 53747 ce7239 53729->53747 53792 ce7c70 40 API calls __vswprintf_c_l 53729->53792 53730->53734 53733 ce7250 53733->53747 53734->53743 53734->53747 53791 ce8051 26 API calls 3 library calls 53734->53791 53735->53729 53735->53733 53735->53743 53743->53747 53747->53707 53748->53702 53749->53707 53750->53707 53751->53707 53752->53707 53753->53723 53755 ce8576 53754->53755 53756 ce8523 53754->53756 53762 cf9a2f 53755->53762 53756->53707 53758 ce857d 53758->53756 53759 cf2529 _free 14 API calls 53758->53759 53760 ce85d5 53759->53760 53769 ce4bda 25 API calls _memcpy_s 53760->53769 53763 cf9a3b 53762->53763 53764 cf9a50 53762->53764 53765 cf2529 _free 14 API calls 53763->53765 53764->53758 53766 cf9a40 53765->53766 53770 ce4bda 25 API calls _memcpy_s 53766->53770 53769->53756 53791->53743 53792->53743 53793->53743 53796 cf014c ___BuildCatchObject 53795->53796 53804 ce4da2 EnterCriticalSection 53796->53804 53798 cf015a 53805 cf02aa 53798->53805 53802 cf017d 53802->53064 53803->53430 53804->53798 53806 cf02b7 53805->53806 53807 cf02c0 53805->53807 53822 cf01a0 67 API calls ___scrt_uninitialize_crt 53806->53822 53816 cf0245 53807->53816 53811 cf9a2f __fread_nolock 25 API calls 53812 cf02dc 53811->53812 53823 cfb7bf 29 API calls 3 library calls 53812->53823 53814 cf016b 53815 cf0194 LeaveCriticalSection __fread_nolock 53814->53815 53815->53802 53817 cf025d 53816->53817 53821 cf0282 53816->53821 53818 cf9a2f __fread_nolock 25 API calls 53817->53818 53817->53821 53819 cf027b 53818->53819 53824 cfbfb7 53819->53824 53821->53811 53821->53814 53822->53814 53823->53814 53825 cfbfc3 ___BuildCatchObject 53824->53825 53959->53577 53961 cb6334 53960->53961 53961->53961 53962 cb633f WideCharToMultiByte 53961->53962 53963 cb6382 53962->53963 53964 cb6362 WideCharToMultiByte 53962->53964 53963->53077 53964->53077 53965->53105 53966->53118 53967->53125 53971 ce5423 53968->53971 53972 ce544b 53971->53972 53973 ce5463 53971->53973 53974 cf2529 _free 14 API calls 53972->53974 53973->53972 53975 ce546b 53973->53975 53976 ce5450 53974->53976 53987 ce5dec 38 API calls 2 library calls 53975->53987 53986 ce4bda 25 API calls _memcpy_s 53976->53986 53979 ce547b 53988 ce6527 44 API calls 3 library calls 53979->53988 53980 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 53981 ca2621 53980->53981 53981->53154 53984 ce545b 53984->53980 53985 ce5502 53989 ce5e7f 14 API calls _free 53985->53989 53986->53984 53987->53979 53988->53985 53989->53984 53993 ce4e8d ___BuildCatchObject 53990->53993 53991 ce4e94 53992 cf2529 _free 14 API calls 53991->53992 53994 ce4e99 53992->53994 53993->53991 53995 ce4eb6 53993->53995 54015 ce4bda 25 API calls _memcpy_s 53994->54015 53996 ce4ebb 53995->53996 53997 ce4ec8 53995->53997 53999 cf2529 _free 14 API calls 53996->53999 54007 cf81a2 53997->54007 54001 ca264a 53999->54001 54008 cf81ae ___BuildCatchObject 54007->54008 54015->54001 54338 cee40d 54339 cf76ea _free 14 API calls 54338->54339 54340 cee425 54339->54340 54341 cfa10b 54342 cfa2ae 54341->54342 54344 cfa135 54341->54344 54343 cf2529 _free 14 API calls 54342->54343 54360 cfa299 54343->54360 54344->54342 54347 cfa180 54344->54347 54345 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54346 cfa2cb 54345->54346 54362 cfd092 54347->54362 54351 cfa1b4 54352 cfa2cd 54351->54352 54377 cfc777 54351->54377 54392 ce4c07 IsProcessorFeaturePresent 54352->54392 54355 cfa2d9 54356 cfa1c6 54356->54352 54384 cfc7a3 54356->54384 54358 cfa1d8 54358->54352 54359 cfa1e1 54358->54359 54359->54360 54391 cfd0ef 25 API calls 2 library calls 54359->54391 54360->54345 54363 cfd09e ___BuildCatchObject 54362->54363 54364 cfa1a0 54363->54364 54396 cf65e6 EnterCriticalSection 54363->54396 54370 cfc74b 54364->54370 54366 cfd0af 54367 cfd0c3 54366->54367 54397 cfcf6b 54366->54397 54415 cfd0e6 LeaveCriticalSection std::_Lockit::~_Lockit 54367->54415 54371 cfc76c 54370->54371 54372 cfc757 54370->54372 54371->54351 54373 cf2529 _free 14 API calls 54372->54373 54374 cfc75c 54373->54374 54533 ce4bda 25 API calls _memcpy_s 54374->54533 54376 cfc767 54376->54351 54378 cfc798 54377->54378 54379 cfc783 54377->54379 54378->54356 54380 cf2529 _free 14 API calls 54379->54380 54381 cfc788 54380->54381 54534 ce4bda 25 API calls _memcpy_s 54381->54534 54383 cfc793 54383->54356 54385 cfc7af 54384->54385 54386 cfc7c4 54384->54386 54387 cf2529 _free 14 API calls 54385->54387 54386->54358 54388 cfc7b4 54387->54388 54535 ce4bda 25 API calls _memcpy_s 54388->54535 54390 cfc7bf 54390->54358 54391->54360 54393 ce4c13 54392->54393 54536 ce4a2e 54393->54536 54396->54366 54398 cfcfb7 54397->54398 54412 cfcfbe 54398->54412 54517 cf89cd 15 API calls 2 library calls 54398->54517 54400 cfd035 54401 cfd032 54400->54401 54480 cfce11 54400->54480 54404 cf76ea _free 14 API calls 54401->54404 54403 cfd02c 54416 cfcb70 54403->54416 54407 cfd040 54404->54407 54405 cfcfe4 54409 cf76ea _free 14 API calls 54405->54409 54408 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54407->54408 54411 cfd04e 54408->54411 54409->54412 54410 cfcfdd 54410->54405 54413 cfd00c 54410->54413 54411->54367 54412->54400 54412->54403 54414 cf76ea _free 14 API calls 54413->54414 54414->54412 54415->54364 54417 cfcb80 54416->54417 54418 cfc7a3 25 API calls 54417->54418 54419 cfcb9f 54418->54419 54420 cfc74b 25 API calls 54419->54420 54443 cfce04 54419->54443 54422 cfcbb1 54420->54422 54421 ce4c07 __Getctype 11 API calls 54423 cfce10 54421->54423 54427 cfcdfe 54422->54427 54422->54443 54518 cf89cd 15 API calls 2 library calls 54422->54518 54426 cfc7a3 25 API calls 54423->54426 54425 cfcc1c 54428 cfcdf8 54425->54428 54431 cf76ea _free 14 API calls 54425->54431 54429 cfce3e 54426->54429 54427->54401 54430 cf76ea _free 14 API calls 54428->54430 54432 cfcf60 54429->54432 54433 cfc74b 25 API calls 54429->54433 54430->54427 54434 cfcc32 54431->54434 54435 ce4c07 __Getctype 11 API calls 54432->54435 54436 cfce50 54433->54436 54519 cf25d6 25 API calls 2 library calls 54434->54519 54441 cfcf6a 54435->54441 54436->54432 54437 cfc777 25 API calls 54436->54437 54439 cfce62 54437->54439 54439->54432 54442 cfce6b 54439->54442 54440 cfcc60 54440->54443 54455 cfcc6b __Getcvt 54440->54455 54460 cfcfbe 54441->54460 54528 cf89cd 15 API calls 2 library calls 54441->54528 54444 cf76ea _free 14 API calls 54442->54444 54443->54421 54446 cfce76 GetTimeZoneInformation 54444->54446 54463 cfcf3a 54446->54463 54466 cfce92 __Getcvt 54446->54466 54447 cfd035 54448 cfd032 54447->54448 54449 cfce11 43 API calls 54447->54449 54451 cf76ea _free 14 API calls 54448->54451 54449->54448 54450 cfd02c 54453 cfcb70 43 API calls 54450->54453 54454 cfd040 54451->54454 54452 cfcfe4 54457 cf76ea _free 14 API calls 54452->54457 54453->54448 54456 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54454->54456 54520 cfcb29 44 API calls 11 library calls 54455->54520 54459 cfd04e 54456->54459 54457->54460 54458 cfcfdd 54458->54452 54461 cfd00c 54458->54461 54459->54401 54460->54447 54460->54450 54462 cf76ea _free 14 API calls 54461->54462 54462->54460 54463->54401 54465 cfccb6 54521 cf8a6f 39 API calls __vswprintf_c_l 54465->54521 54525 cf6680 38 API calls __Toupper 54466->54525 54469 cfcf15 54526 cfd050 44 API calls 5 library calls 54469->54526 54471 cfcf26 54527 cfd050 44 API calls 5 library calls 54471->54527 54473 cfccea 54474 cfcd7c 54473->54474 54522 cf8a6f 39 API calls __vswprintf_c_l 54473->54522 54478 cfcde1 54474->54478 54524 cfcb29 44 API calls 11 library calls 54474->54524 54477 cfcd27 54477->54474 54523 cf8a6f 39 API calls __vswprintf_c_l 54477->54523 54478->54428 54481 cfce21 54480->54481 54482 cfc7a3 25 API calls 54481->54482 54483 cfce3e 54482->54483 54484 cfcf60 54483->54484 54485 cfc74b 25 API calls 54483->54485 54486 ce4c07 __Getctype 11 API calls 54484->54486 54487 cfce50 54485->54487 54490 cfcf6a 54486->54490 54487->54484 54488 cfc777 25 API calls 54487->54488 54489 cfce62 54488->54489 54489->54484 54491 cfce6b 54489->54491 54492 cfcfbe 54490->54492 54532 cf89cd 15 API calls 2 library calls 54490->54532 54493 cf76ea _free 14 API calls 54491->54493 54496 cfd035 54492->54496 54499 cfd02c 54492->54499 54495 cfce76 GetTimeZoneInformation 54493->54495 54510 cfcf3a 54495->54510 54511 cfce92 __Getcvt 54495->54511 54498 cfce11 43 API calls 54496->54498 54503 cfd032 54496->54503 54497 cfcfdd 54507 cfd00c 54497->54507 54508 cfcfe4 54497->54508 54498->54503 54501 cfcb70 43 API calls 54499->54501 54500 cf76ea _free 14 API calls 54502 cfd040 54500->54502 54501->54503 54504 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54502->54504 54503->54500 54506 cfd04e 54504->54506 54505 cf76ea _free 14 API calls 54505->54492 54506->54401 54509 cf76ea _free 14 API calls 54507->54509 54508->54505 54509->54492 54510->54401 54529 cf6680 38 API calls __Toupper 54511->54529 54513 cfcf15 54530 cfd050 44 API calls 5 library calls 54513->54530 54515 cfcf26 54531 cfd050 44 API calls 5 library calls 54515->54531 54517->54410 54518->54425 54519->54440 54520->54465 54521->54473 54522->54477 54523->54474 54524->54478 54525->54469 54526->54471 54527->54463 54528->54458 54529->54513 54530->54515 54531->54510 54532->54497 54533->54376 54534->54383 54535->54390 54537 ce4a4a __Getcvt ___scrt_fastfail 54536->54537 54538 ce4a76 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 54537->54538 54539 ce4b47 ___scrt_fastfail 54538->54539 54540 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54539->54540 54541 ce4b65 GetCurrentProcess TerminateProcess 54540->54541 54541->54355 54542 cfc283 54543 cf9a2f __fread_nolock 25 API calls 54542->54543 54544 cfc290 54543->54544 54545 cfc29c 54544->54545 54546 cfc2b8 54544->54546 54547 cf2529 _free 14 API calls 54545->54547 54548 cfc2c6 54546->54548 54549 cfc2d3 54546->54549 54551 cfc2a1 54547->54551 54552 cf2529 _free 14 API calls 54548->54552 54550 cfc2e6 54549->54550 54582 cfc601 27 API calls __wsopen_s 54549->54582 54550->54551 54559 cfc348 54550->54559 54560 cf9a6b 54550->54560 54552->54551 54571 cfc467 54559->54571 54561 cf9a77 54560->54561 54562 cf9a98 54561->54562 54563 cf9a2f __fread_nolock 25 API calls 54561->54563 54562->54559 54566 cfc69c 54562->54566 54564 cf9a92 54563->54564 54565 d050c6 __fread_nolock 25 API calls 54564->54565 54565->54562 54567 cf768d __dosmaperr 14 API calls 54566->54567 54568 cfc6b9 54567->54568 54569 cf76ea _free 14 API calls 54568->54569 54570 cfc6c3 54569->54570 54570->54559 54572 cf9a2f __fread_nolock 25 API calls 54571->54572 54573 cfc476 54572->54573 54574 cfc519 54573->54574 54575 cfc489 54573->54575 54576 cfbfb7 __wsopen_s 63 API calls 54574->54576 54577 cfc4a6 54575->54577 54578 cfc4ca 54575->54578 54580 cfc356 54576->54580 54579 cfbfb7 __wsopen_s 63 API calls 54577->54579 54578->54580 54583 cfb6e7 54578->54583 54579->54580 54582->54550 54586 cfb55f 54583->54586 54587 cfb56b ___BuildCatchObject 54586->54587 54588 cfb58b 54587->54588 54589 cfb573 54587->54589 54591 cfb63c 54588->54591 54596 cfb5c0 54588->54596 54612 cf2516 14 API calls __dosmaperr 54589->54612 54615 cf2516 14 API calls __dosmaperr 54591->54615 54592 cfb578 54594 cf2529 _free 14 API calls 54592->54594 54610 cfb580 54594->54610 54595 cfb641 54597 cf2529 _free 14 API calls 54595->54597 54611 cf9e25 EnterCriticalSection 54596->54611 54599 cfb649 54597->54599 54616 ce4bda 25 API calls _memcpy_s 54599->54616 54600 cfb5c6 54602 cfb5ff 54600->54602 54603 cfb5ea 54600->54603 54605 cfb66b __fread_nolock 27 API calls 54602->54605 54604 cf2529 _free 14 API calls 54603->54604 54606 cfb5ef 54604->54606 54607 cfb5fa 54605->54607 54613 cf2516 14 API calls __dosmaperr 54606->54613 54614 cfb634 LeaveCriticalSection __wsopen_s 54607->54614 54610->54580 54611->54600 54612->54592 54613->54607 54614->54610 54615->54595 54616->54610 54617 cfacc1 54618 cfacce 54617->54618 54619 cface6 54617->54619 54620 cf2529 _free 14 API calls 54618->54620 54623 cfad45 54619->54623 54624 cfc69c 14 API calls 54619->54624 54631 cfacde 54619->54631 54621 cfacd3 54620->54621 54667 ce4bda 25 API calls _memcpy_s 54621->54667 54625 cf9a2f __fread_nolock 25 API calls 54623->54625 54624->54623 54626 cfad5d 54625->54626 54637 cfa7fd 54626->54637 54629 cf9a2f __fread_nolock 25 API calls 54630 cfad91 54629->54630 54630->54631 54632 cf9a2f __fread_nolock 25 API calls 54630->54632 54633 cfad9f 54632->54633 54633->54631 54634 cf9a2f __fread_nolock 25 API calls 54633->54634 54635 cfadaf 54634->54635 54636 cf9a2f __fread_nolock 25 API calls 54635->54636 54636->54631 54638 cfa809 ___BuildCatchObject 54637->54638 54639 cfa829 54638->54639 54640 cfa811 54638->54640 54641 cfa8e6 54639->54641 54646 cfa85f 54639->54646 54734 cf2516 14 API calls __dosmaperr 54640->54734 54738 cf2516 14 API calls __dosmaperr 54641->54738 54643 cfa816 54645 cf2529 _free 14 API calls 54643->54645 54648 cfa81e 54645->54648 54649 cfa87d 54646->54649 54650 cfa868 54646->54650 54647 cfa8eb 54651 cf2529 _free 14 API calls 54647->54651 54648->54629 54648->54631 54668 cf9e25 EnterCriticalSection 54649->54668 54735 cf2516 14 API calls __dosmaperr 54650->54735 54662 cfa875 54651->54662 54654 cfa86d 54657 cf2529 _free 14 API calls 54654->54657 54655 cfa883 54658 cfa89f 54655->54658 54659 cfa8b4 54655->54659 54657->54662 54660 cf2529 _free 14 API calls 54658->54660 54669 cfa911 54659->54669 54663 cfa8a4 54660->54663 54739 ce4bda 25 API calls _memcpy_s 54662->54739 54736 cf2516 14 API calls __dosmaperr 54663->54736 54664 cfa8af 54737 cfa8de LeaveCriticalSection __wsopen_s 54664->54737 54667->54631 54668->54655 54670 cfa93b 54669->54670 54671 cfa923 54669->54671 54673 cfaca2 54670->54673 54678 cfa97b 54670->54678 54740 cf2516 14 API calls __dosmaperr 54671->54740 54750 cf2516 14 API calls __dosmaperr 54673->54750 54674 cfa928 54676 cf2529 _free 14 API calls 54674->54676 54681 cfa930 54676->54681 54677 cfaca7 54679 cf2529 _free 14 API calls 54677->54679 54680 cfa986 54678->54680 54678->54681 54685 cfa9b5 54678->54685 54682 cfa993 54679->54682 54741 cf2516 14 API calls __dosmaperr 54680->54741 54681->54664 54751 ce4bda 25 API calls _memcpy_s 54682->54751 54684 cfa98b 54687 cf2529 _free 14 API calls 54684->54687 54688 cfa9ce 54685->54688 54689 cfa9e9 54685->54689 54690 cfaa25 54685->54690 54687->54682 54688->54689 54694 cfa9d3 54688->54694 54742 cf2516 14 API calls __dosmaperr 54689->54742 54744 cf89cd 15 API calls 2 library calls 54690->54744 54693 cfa9ee 54696 cf2529 _free 14 API calls 54693->54696 54697 d050c6 __fread_nolock 25 API calls 54694->54697 54695 cfaa3c 54698 cf76ea _free 14 API calls 54695->54698 54699 cfa9f5 54696->54699 54700 cfab7c 54697->54700 54701 cfaa45 54698->54701 54743 ce4bda 25 API calls _memcpy_s 54699->54743 54703 cfabf2 54700->54703 54706 cfab95 GetConsoleMode 54700->54706 54704 cf76ea _free 14 API calls 54701->54704 54705 cfabf6 ReadFile 54703->54705 54707 cfaa4c 54704->54707 54708 cfac6a GetLastError 54705->54708 54709 cfac10 54705->54709 54706->54703 54710 cfaba6 54706->54710 54712 cfaa56 54707->54712 54713 cfaa71 54707->54713 54714 cfabce 54708->54714 54715 cfac77 54708->54715 54709->54708 54716 cfabe7 54709->54716 54710->54705 54711 cfabac ReadConsoleW 54710->54711 54711->54716 54717 cfabc8 GetLastError 54711->54717 54719 cf2529 _free 14 API calls 54712->54719 54721 cfb702 __fread_nolock 27 API calls 54713->54721 54731 cfaa00 __fread_nolock 54714->54731 54746 cf24f3 14 API calls 2 library calls 54714->54746 54720 cf2529 _free 14 API calls 54715->54720 54725 cfac4c 54716->54725 54726 cfac35 54716->54726 54716->54731 54717->54714 54718 cf76ea _free 14 API calls 54718->54681 54723 cfaa5b 54719->54723 54724 cfac7c 54720->54724 54721->54694 54745 cf2516 14 API calls __dosmaperr 54723->54745 54749 cf2516 14 API calls __dosmaperr 54724->54749 54730 cfac63 54725->54730 54725->54731 54747 cfa62b 30 API calls 4 library calls 54726->54747 54748 cfa47c 28 API calls __fread_nolock 54730->54748 54731->54718 54733 cfac68 54733->54731 54734->54643 54735->54654 54736->54664 54737->54648 54738->54647 54739->54648 54740->54674 54741->54684 54742->54693 54743->54731 54744->54695 54745->54731 54746->54731 54747->54731 54748->54733 54749->54731 54750->54677 54751->54681 54752 ce8e60 54753 ce8e6e 54752->54753 54754 ce8e7c 54752->54754 54765 ce8ed2 54753->54765 54788 ce926f 38 API calls 2 library calls 54754->54788 54757 ce8e96 54789 ce8e43 17 API calls __wsopen_s 54757->54789 54758 ce8e78 54760 ce8ea3 54761 ce8eaa 54760->54761 54762 ce8ed2 58 API calls 54760->54762 54763 ce8ecc 54761->54763 54764 cf76ea _free 14 API calls 54761->54764 54762->54761 54764->54763 54766 ce8efd __Getcvt 54765->54766 54767 ce8ee0 54765->54767 54771 ce8f3f CreateFileW 54766->54771 54772 ce8f23 54766->54772 54816 cf2516 14 API calls __dosmaperr 54767->54816 54769 ce8ee5 54770 cf2529 _free 14 API calls 54769->54770 54775 ce8eed 54770->54775 54773 ce8f63 54771->54773 54774 ce8f71 54771->54774 54818 cf2516 14 API calls __dosmaperr 54772->54818 54790 ce903a GetFileType 54773->54790 54820 ce8fb0 50 API calls __dosmaperr 54774->54820 54817 ce4bda 25 API calls _memcpy_s 54775->54817 54780 ce8f28 54783 cf2529 _free 14 API calls 54780->54783 54781 ce8f6c __Getcvt 54786 ce8f3a 54781->54786 54787 ce8fa2 FindCloseChangeNotification 54781->54787 54782 ce8ef8 54782->54758 54784 ce8f2f 54783->54784 54819 ce4bda 25 API calls _memcpy_s 54784->54819 54786->54758 54787->54786 54788->54757 54789->54760 54791 ce9127 54790->54791 54792 ce9075 54790->54792 54794 ce9153 54791->54794 54797 ce9131 54791->54797 54793 ce908f __Getcvt 54792->54793 54838 ce9467 21 API calls __dosmaperr 54792->54838 54798 ce90ae GetFileInformationByHandle 54793->54798 54806 ce911e 54793->54806 54795 ce917d PeekNamedPipe 54794->54795 54794->54806 54795->54806 54799 ce9144 GetLastError 54797->54799 54800 ce9135 54797->54800 54798->54799 54803 ce90c4 54798->54803 54840 cf24f3 14 API calls 2 library calls 54799->54840 54804 cf2529 _free 14 API calls 54800->54804 54802 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54807 ce91a8 54802->54807 54821 ce93b9 54803->54821 54804->54806 54806->54802 54807->54781 54811 ce91aa 7 API calls 54812 ce90f4 54811->54812 54813 ce91aa 7 API calls 54812->54813 54814 ce910b 54813->54814 54839 ce9386 14 API calls _free 54814->54839 54816->54769 54817->54782 54818->54780 54819->54786 54820->54781 54823 ce93cf _wcsrchr 54821->54823 54822 ce90d0 54831 ce91aa 54822->54831 54823->54822 54841 cf1512 39 API calls 3 library calls 54823->54841 54825 ce9413 54825->54822 54842 cf1512 39 API calls 3 library calls 54825->54842 54827 ce9424 54827->54822 54843 cf1512 39 API calls 3 library calls 54827->54843 54829 ce9435 54829->54822 54844 cf1512 39 API calls 3 library calls 54829->54844 54832 ce91c2 54831->54832 54833 ce91d0 FileTimeToSystemTime 54831->54833 54832->54833 54835 ce91c8 54832->54835 54834 ce91e2 SystemTimeToTzSpecificLocalTime 54833->54834 54833->54835 54834->54835 54836 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 54835->54836 54837 ce90e1 54836->54837 54837->54811 54838->54793 54839->54806 54840->54806 54841->54825 54842->54827 54843->54829 54844->54822 54845 cf8820 54850 cf8532 54845->54850 54848 cf885f 54855 cf8560 try_get_first_available_module 54850->54855 54851 cf2529 _free 14 API calls 54852 cf878b 54851->54852 54868 ce4bda 25 API calls _memcpy_s 54852->54868 54854 cf86bb 54854->54848 54862 cf1476 54854->54862 54860 cf86b0 54855->54860 54865 d0370e 39 API calls 2 library calls 54855->54865 54857 cf8718 54857->54860 54866 d0370e 39 API calls 2 library calls 54857->54866 54859 cf8736 54859->54860 54867 d0370e 39 API calls 2 library calls 54859->54867 54860->54851 54860->54854 54869 cf0af1 54862->54869 54865->54857 54866->54859 54867->54860 54868->54854 54871 cf0afd ___BuildCatchObject 54869->54871 54870 cf0b04 54872 cf2529 _free 14 API calls 54870->54872 54871->54870 54873 cf0b2f 54871->54873 54874 cf0b09 54872->54874 54880 cf114c 54873->54880 54927 ce4bda 25 API calls _memcpy_s 54874->54927 54879 cf0b13 54879->54848 54929 cf0e9a 54880->54929 54883 cf117e 54960 cf2516 14 API calls __dosmaperr 54883->54960 54884 cf1197 54946 cf9efd 54884->54946 54887 cf1183 54892 cf2529 _free 14 API calls 54887->54892 54889 cf11bc 54959 cf0e05 CreateFileW 54889->54959 54890 cf11a5 54961 cf2516 14 API calls __dosmaperr 54890->54961 54894 cf0b53 54892->54894 54928 cf0b86 LeaveCriticalSection __wsopen_s 54894->54928 54895 cf11aa 54896 cf2529 _free 14 API calls 54895->54896 54896->54887 54897 cf1272 GetFileType 54899 cf127d GetLastError 54897->54899 54900 cf12c4 54897->54900 54898 cf1247 GetLastError 54963 cf24f3 14 API calls 2 library calls 54898->54963 54964 cf24f3 14 API calls 2 library calls 54899->54964 54965 cf9e48 15 API calls 3 library calls 54900->54965 54901 cf11f5 54901->54897 54901->54898 54962 cf0e05 CreateFileW 54901->54962 54904 cf128b CloseHandle 54904->54887 54906 cf12b4 54904->54906 54909 cf2529 _free 14 API calls 54906->54909 54908 cf123a 54908->54897 54908->54898 54911 cf12b9 54909->54911 54910 cf12e5 54912 cf1331 54910->54912 54966 cf1014 72 API calls 4 library calls 54910->54966 54911->54887 54917 cf1338 54912->54917 54967 cf0bb2 72 API calls 4 library calls 54912->54967 54915 cf1366 54916 cf1374 54915->54916 54915->54917 54916->54894 54919 cf13f0 CloseHandle 54916->54919 54918 cf1a0d __wsopen_s 28 API calls 54917->54918 54918->54894 54968 cf0e05 CreateFileW 54919->54968 54921 cf141b 54922 cf1425 GetLastError 54921->54922 54926 cf1451 54921->54926 54969 cf24f3 14 API calls 2 library calls 54922->54969 54924 cf1431 54970 cfa010 15 API calls 3 library calls 54924->54970 54926->54894 54927->54879 54928->54879 54930 cf0ebb 54929->54930 54931 cf0ed5 54929->54931 54930->54931 54933 cf2529 _free 14 API calls 54930->54933 54971 cf0e2a 54931->54971 54934 cf0eca 54933->54934 54978 ce4bda 25 API calls _memcpy_s 54934->54978 54936 cf0f0d 54937 cf0f3c 54936->54937 54939 cf2529 _free 14 API calls 54936->54939 54942 cf0f8f 54937->54942 54980 cf4096 25 API calls 2 library calls 54937->54980 54941 cf0f31 54939->54941 54940 cf0f8a 54940->54942 54944 ce4c07 __Getctype 11 API calls 54940->54944 54979 ce4bda 25 API calls _memcpy_s 54941->54979 54942->54883 54942->54884 54945 cf1013 54944->54945 54947 cf9f09 ___BuildCatchObject 54946->54947 54982 cf65e6 EnterCriticalSection 54947->54982 54949 cf9f57 54983 cfa007 54949->54983 54950 cf9f10 54950->54949 54951 cf9f35 54950->54951 54956 cf9fa4 EnterCriticalSection 54950->54956 54986 cf9cd7 15 API calls 3 library calls 54951->54986 54955 cf9f3a 54955->54949 54987 cf9e25 EnterCriticalSection 54955->54987 54956->54949 54957 cf9fb1 LeaveCriticalSection 54956->54957 54957->54950 54959->54901 54960->54887 54961->54895 54962->54908 54963->54887 54964->54904 54965->54910 54966->54912 54967->54915 54968->54921 54969->54924 54970->54926 54973 cf0e42 54971->54973 54972 cf0e5d 54972->54936 54973->54972 54974 cf2529 _free 14 API calls 54973->54974 54975 cf0e81 54974->54975 54981 ce4bda 25 API calls _memcpy_s 54975->54981 54977 cf0e8c 54977->54936 54978->54931 54979->54937 54980->54940 54981->54977 54982->54950 54988 cf662e LeaveCriticalSection 54983->54988 54985 cf119c 54985->54889 54985->54890 54986->54955 54987->54949 54988->54985 54989 cd449c 54990 cd44a5 54989->54990 54991 cd44be 54990->54991 54993 cd4389 54990->54993 54994 cd43c9 54993->54994 54995 cd43b6 54993->54995 54997 cd43ce TlsFree 54994->54997 54998 cd43d6 54994->54998 54995->54994 55001 cd45e9 EnterCriticalSection LeaveCriticalSection LocalFree TlsSetValue RaiseException 54995->55001 54997->54998 54999 cd43dc GlobalHandle GlobalUnlock GlobalFree 54998->54999 55000 cd43f5 DeleteCriticalSection 54998->55000 54999->55000 55000->54991 55001->54995 55002 cdddfc 55003 cdde08 ___BuildCatchObject 55002->55003 55028 cde178 55003->55028 55005 cdde0f 55006 cddf62 55005->55006 55017 cdde39 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock _Atexit 55005->55017 55064 cdefb3 4 API calls 2 library calls 55006->55064 55008 cddf69 55057 cee6e3 55008->55057 55012 cddf77 55013 cdde58 55014 cdded9 55036 cdf0cd 55014->55036 55016 cddedf 55040 d0bd2a 55016->55040 55017->55013 55017->55014 55060 cee6bd 38 API calls 4 library calls 55017->55060 55022 cddefb 55022->55008 55023 cddeff 55022->55023 55024 cddf08 55023->55024 55062 cee698 23 API calls _Atexit 55023->55062 55063 cde307 75 API calls 2 library calls 55024->55063 55027 cddf10 55027->55013 55029 cde181 55028->55029 55066 cdf1f3 IsProcessorFeaturePresent 55029->55066 55031 cde18d 55067 ce3484 10 API calls 3 library calls 55031->55067 55033 cde192 55035 cde196 55033->55035 55068 ce34ad 8 API calls 3 library calls 55033->55068 55035->55005 55069 ce1e30 55036->55069 55039 cdf0f3 55039->55016 55041 d0bd33 55040->55041 55071 cca8e5 55041->55071 55048 cddef4 55061 cdf103 GetModuleHandleW 55048->55061 55050 d0bd92 55218 cd4b9c 79 API calls 55050->55218 55850 cee581 55057->55850 55060->55014 55061->55022 55062->55024 55063->55027 55064->55008 55065 cee6a7 23 API calls _Atexit 55065->55012 55066->55031 55067->55033 55068->55035 55070 cdf0e0 GetStartupInfoW 55069->55070 55070->55039 55219 cc9f49 55071->55219 55073 cca8ea 55074 cc9f16 55073->55074 55075 cd47d6 54 API calls 55074->55075 55076 cc9f25 55075->55076 55077 cc9f3f 55076->55077 55279 cd477f 7 API calls 3 library calls 55076->55279 55079 cdb8d0 SetErrorMode SetErrorMode 55077->55079 55080 cc9f16 60 API calls 55079->55080 55081 cdb8ed 55080->55081 55082 cc9f16 60 API calls 55081->55082 55083 cdb8fb 55082->55083 55084 cdb916 55083->55084 55085 cdb902 55083->55085 55087 cc9f16 60 API calls 55084->55087 55286 cdb92e 67 API calls 4 library calls 55085->55286 55088 cdb91b 55087->55088 55089 cdb927 55088->55089 55280 cca8ee 55088->55280 55089->55050 55091 ca1dd2 55089->55091 55160 ca1ced 55089->55160 55174 ca1c30 55089->55174 55195 caf800 55089->55195 55203 cb40b0 FindWindowW FindWindowExW FindWindowExW PostMessageW PostMessageW 55089->55203 55204 ca1d2e 55089->55204 55092 ca1de1 55091->55092 55093 ca1fa5 55091->55093 55096 ca1f6d 55092->55096 55099 ca6620 44 API calls 55092->55099 55094 ca1fae Sleep 55093->55094 55095 ca2095 55093->55095 55098 ca6620 44 API calls 55094->55098 55097 ca226a 55095->55097 55104 ca2253 55095->55104 55105 ca20b0 55095->55105 55100 cc9f16 60 API calls 55096->55100 55107 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55097->55107 55101 ca1fd8 55098->55101 55102 ca1eab 55099->55102 55103 ca1f72 _wcsstr 55100->55103 55417 cb6390 MultiByteToWideChar 55101->55417 55414 cc2130 106 API calls 3 library calls 55102->55414 55113 ca1f99 55103->55113 55114 ca1f8d 55103->55114 55293 ca5660 55104->55293 55109 ca63c0 27 API calls 55105->55109 55112 ca2286 55107->55112 55115 ca20dd GetModuleFileNameW PathRemoveFileSpecW 55109->55115 55111 ca1ff0 DeleteFileW 55117 caf930 94 API calls 55111->55117 55112->55050 55416 ca5c10 260 API calls 2 library calls 55113->55416 55415 ca5c10 260 API calls 2 library calls 55114->55415 55120 cb6320 2 API calls 55115->55120 55122 ca202a 55117->55122 55124 ca2127 55120->55124 55126 ca6620 44 API calls 55122->55126 55123 ca1eb7 55123->55096 55123->55123 55127 ca13f0 27 API calls 55124->55127 55129 ca2041 55126->55129 55131 ca2141 55127->55131 55418 cb6390 MultiByteToWideChar 55129->55418 55133 ca1390 27 API calls 55131->55133 55132 ca2059 DeleteFileW 55134 caf930 94 API calls 55132->55134 55135 ca2157 55133->55135 55159 ca1f94 55134->55159 55136 ca1390 27 API calls 55135->55136 55137 ca216d 55136->55137 55138 ca1390 27 API calls 55137->55138 55139 ca2183 55138->55139 55140 ca1390 27 API calls 55139->55140 55141 ca219b 55140->55141 55142 ca1970 25 API calls 55141->55142 55143 ca21aa 55142->55143 55144 ca1890 25 API calls 55143->55144 55145 ca21b5 55144->55145 55146 ca1890 25 API calls 55145->55146 55147 ca21c0 55146->55147 55148 ca1890 25 API calls 55147->55148 55149 ca21cb 55148->55149 55150 ca1890 25 API calls 55149->55150 55151 ca21d6 55150->55151 55152 ca1890 25 API calls 55151->55152 55153 ca21e5 55152->55153 55419 cb4ae0 55153->55419 55159->55097 55161 ca1d3b 55160->55161 55162 caf800 18 API calls 55161->55162 55163 ca1d47 55162->55163 55164 ca1d4e 55163->55164 55165 ca1d62 55163->55165 55630 ca65f0 69 API calls __vsnwprintf_s_l 55164->55630 55169 ca6620 44 API calls 55165->55169 55167 ca1d58 55168 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55167->55168 55171 ca2286 55168->55171 55170 ca1d9b 55169->55170 55574 caf330 55170->55574 55171->55050 55173 ca1da9 55636 cde390 55174->55636 55178 ca1c7b __Getcvt 55179 cc9f16 60 API calls 55178->55179 55180 ca1cb1 55179->55180 55181 cb6320 2 API calls 55180->55181 55182 ca1cc8 _strstr 55181->55182 55183 caf800 18 API calls 55182->55183 55184 ca1d47 55183->55184 55185 ca1d4e 55184->55185 55188 ca1d62 55184->55188 55646 ca65f0 69 API calls __vsnwprintf_s_l 55185->55646 55187 ca1d58 55189 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55187->55189 55190 ca6620 44 API calls 55188->55190 55192 ca2286 55189->55192 55191 ca1d9b 55190->55191 55193 caf330 86 API calls 55191->55193 55192->55050 55194 ca1da9 55193->55194 55196 caf80a 55195->55196 55197 caf85e 55195->55197 55196->55050 55198 cc8aeb std::_Facet_Register 15 API calls 55197->55198 55199 caf868 55198->55199 55200 caf886 55199->55200 55848 caf070 InitializeCriticalSection InitializeCriticalSection MultiByteToWideChar 55199->55848 55200->55050 55202 caf87d 55202->55050 55203->55050 55205 ca1d3b 55204->55205 55206 caf800 18 API calls 55205->55206 55207 ca1d47 55206->55207 55208 ca1d4e 55207->55208 55209 ca1d62 55207->55209 55849 ca65f0 69 API calls __vsnwprintf_s_l 55208->55849 55213 ca6620 44 API calls 55209->55213 55211 ca1d58 55212 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55211->55212 55215 ca2286 55212->55215 55214 ca1d9b 55213->55214 55216 caf330 86 API calls 55214->55216 55215->55050 55217 ca1da9 55216->55217 55218->55048 55220 cc9f16 60 API calls 55219->55220 55221 cc9f4e 55220->55221 55226 cd47d6 55221->55226 55223 cc9f5b 55223->55073 55241 ce0f0f RaiseException 55223->55241 55225 ccd568 55228 cd47e2 __EH_prolog3 55226->55228 55227 cd485b 55268 ccd54f 55227->55268 55228->55227 55229 cd4823 55228->55229 55238 cd4809 55228->55238 55266 cd42f6 TlsAlloc InitializeCriticalSection RaiseException 55228->55266 55259 cd4894 EnterCriticalSection 55229->55259 55236 cd4835 55267 cd494f 38 API calls 4 library calls 55236->55267 55237 cd4851 std::locale::_Init 55237->55223 55238->55227 55242 cd44c6 EnterCriticalSection 55238->55242 55239 cd481d 55239->55227 55239->55229 55241->55225 55245 cd44ee 55242->55245 55243 cd4590 __Getcvt 55244 cd45ab LeaveCriticalSection 55243->55244 55244->55239 55245->55243 55246 cd453e GlobalHandle GlobalUnlock 55245->55246 55247 cd4529 55245->55247 55248 cd3c47 29 API calls 55246->55248 55271 cd3c47 55247->55271 55250 cd455f GlobalReAlloc 55248->55250 55252 cd4569 55250->55252 55253 cd456d GlobalLock 55252->55253 55254 cd45c5 55252->55254 55253->55243 55255 cd45d9 LeaveCriticalSection 55254->55255 55256 cd45ca GlobalHandle GlobalLock 55254->55256 55276 ccd569 RaiseException __CxxThrowException@8 55255->55276 55256->55255 55260 cd48ad 55259->55260 55261 cd48d8 LeaveCriticalSection 55259->55261 55260->55261 55262 cd48b2 TlsGetValue 55260->55262 55263 cd482f 55261->55263 55262->55261 55264 cd48be 55262->55264 55263->55236 55263->55237 55264->55261 55265 cd48ca LeaveCriticalSection 55264->55265 55265->55263 55266->55238 55267->55237 55278 ce0f0f RaiseException 55268->55278 55270 ccd568 55272 cd3c5a 55271->55272 55273 cd3c61 GlobalAlloc 55272->55273 55277 cc862b 29 API calls 55272->55277 55273->55252 55278->55270 55279->55077 55281 cc9f16 60 API calls 55280->55281 55282 cca8f3 55281->55282 55283 cca91b 55282->55283 55287 cc9f6a 55282->55287 55283->55089 55285 cca8ff GetCurrentThreadId SetWindowsHookExW 55285->55283 55286->55084 55288 cd47d6 54 API calls 55287->55288 55289 cc9f79 55288->55289 55289->55285 55292 ce0f0f RaiseException 55289->55292 55291 ccd568 55292->55291 55294 ca567b __wsopen_s 55293->55294 55295 caf930 94 API calls 55294->55295 55296 ca56b9 FindWindowW 55295->55296 55297 ca56df FindWindowW 55296->55297 55298 ca56cf PostMessageW 55296->55298 55299 ca574d 55297->55299 55300 ca56f3 55297->55300 55298->55297 55302 ca6620 44 API calls 55299->55302 55300->55299 55301 ca56f8 55300->55301 55301->55299 55301->55300 55303 caf930 94 API calls 55301->55303 55304 ca5763 55302->55304 55305 ca5719 Sleep FindWindowW 55303->55305 55306 caf930 94 API calls 55304->55306 55305->55301 55307 ca5732 PostMessageW 55305->55307 55308 ca578b 55306->55308 55307->55301 55476 cb5020 55308->55476 55310 ca57a0 Sleep FindWindowW 55315 ca5797 55310->55315 55311 ca57e9 FindWindowW 55313 ca57f9 55311->55313 55314 ca5a50 55311->55314 55312 caf930 94 API calls 55312->55315 55317 ca580c OpenSCManagerW 55313->55317 55336 ca5a0d 55313->55336 55318 caf930 94 API calls 55314->55318 55315->55310 55315->55311 55315->55312 55316 cb5020 120 API calls 55315->55316 55316->55315 55319 ca59dc GetLastError 55317->55319 55320 ca5823 55317->55320 55321 ca5a71 55318->55321 55326 ca6660 9 API calls 55319->55326 55323 caf930 94 API calls 55320->55323 55532 ca1740 55321->55532 55322 caf930 94 API calls 55325 ca5a31 55322->55325 55327 ca5844 OpenServiceW 55323->55327 55329 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55325->55329 55330 ca59ea 55326->55330 55332 ca5868 55327->55332 55333 ca599d GetLastError 55327->55333 55335 ca225a 55329->55335 55331 caf930 94 API calls 55330->55331 55331->55336 55338 caf930 94 API calls 55332->55338 55337 ca6660 9 API calls 55333->55337 55334 ca1aa0 27 API calls 55339 ca5a8f 55334->55339 55366 ca3220 55335->55366 55336->55322 55340 ca59ab 55337->55340 55341 ca5889 ControlService 55338->55341 55345 ca6620 44 API calls 55339->55345 55342 caf930 94 API calls 55340->55342 55343 ca5956 GetLastError 55341->55343 55344 ca58a4 Sleep 55341->55344 55347 ca59ce CloseServiceHandle 55342->55347 55346 ca6660 9 API calls 55343->55346 55530 cb3cf0 44 API calls 2 library calls 55344->55530 55349 ca5ab3 55345->55349 55350 ca5964 55346->55350 55347->55336 55536 cb6390 MultiByteToWideChar 55349->55536 55352 caf930 94 API calls 55350->55352 55355 ca5987 CloseServiceHandle CloseServiceHandle 55352->55355 55353 ca590c 55358 caf930 94 API calls 55353->55358 55354 ca5acb 55537 cb6390 MultiByteToWideChar 55354->55537 55355->55336 55356 ca58c5 Sleep 55531 cb3cf0 44 API calls 2 library calls 55356->55531 55361 ca593d CloseServiceHandle CloseServiceHandle 55358->55361 55360 ca5ae8 GetActiveWindow MessageBoxW 55363 cee6e3 23 API calls 55360->55363 55361->55336 55362 ca58b5 55362->55353 55362->55356 55364 caf930 94 API calls 55362->55364 55365 ca5b12 55363->55365 55364->55362 55367 ca323b __Getcvt __wsopen_s 55366->55367 55368 ca6620 44 API calls 55367->55368 55369 ca3298 55368->55369 55543 cb6390 MultiByteToWideChar 55369->55543 55371 ca32b0 GetFileAttributesW 55372 ca330a GetFileAttributesW 55371->55372 55373 ca5369 55372->55373 55374 caf930 94 API calls 55373->55374 55375 ca5391 GetActiveWindow MessageBoxW 55374->55375 55544 ce0f0f RaiseException 55375->55544 55377 ca53cb GetLastError FormatMessageW 55378 ca1740 27 API calls 55377->55378 55379 ca5400 55378->55379 55380 ca1aa0 27 API calls 55379->55380 55381 ca5412 55380->55381 55545 cb6390 MultiByteToWideChar 55381->55545 55383 ca5436 55384 ca1740 27 API calls 55383->55384 55414->55123 55415->55159 55416->55159 55417->55111 55418->55132 55420 cb4afb __wsopen_s 55419->55420 55421 ca63c0 27 API calls 55420->55421 55422 cb4b5d 55421->55422 55551 cb6870 55422->55551 55424 cb4ba9 55425 ca6260 27 API calls 55424->55425 55426 cb4bcf 55425->55426 55427 ca6260 27 API calls 55426->55427 55428 cb4be1 55427->55428 55429 ca1890 25 API calls 55428->55429 55430 cb4bec _strstr 55429->55430 55565 cb6390 MultiByteToWideChar 55430->55565 55432 cb4cbf 55479 cb5058 55476->55479 55520 cb5176 55476->55520 55477 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55478 cb543e 55477->55478 55478->55315 55480 ca63c0 27 API calls 55479->55480 55479->55520 55481 cb5092 55480->55481 55538 cb5450 55481->55538 55483 cb509e 55484 caf930 94 API calls 55483->55484 55485 cb50c8 55484->55485 55542 cb6390 MultiByteToWideChar 55485->55542 55487 cb50da CreateToolhelp32Snapshot 55488 cb510e Process32FirstW 55487->55488 55489 cb50f2 GetLastError 55487->55489 55491 cb5129 CloseHandle GetLastError 55488->55491 55492 cb5181 GetCurrentThread OpenThreadToken 55488->55492 55490 ca6660 9 API calls 55489->55490 55495 cb5100 55490->55495 55496 ca6660 9 API calls 55491->55496 55493 cb523b 55492->55493 55494 cb51ad GetLastError 55492->55494 55497 cb5246 LookupPrivilegeValueW 55493->55497 55529 cb52af _strstr 55493->55529 55498 cb520e GetLastError 55494->55498 55499 cb51b6 ImpersonateSelf 55494->55499 55505 caf930 94 API calls 55495->55505 55500 cb513e 55496->55500 55501 cb5268 AdjustTokenPrivileges 55497->55501 55497->55529 55504 ca6660 9 API calls 55498->55504 55502 cb51da GetCurrentThread OpenThreadToken 55499->55502 55503 cb51c2 GetLastError 55499->55503 55500->55495 55501->55529 55502->55493 55509 cb51f6 GetLastError 55502->55509 55506 ca6660 9 API calls 55503->55506 55510 cb51cc 55504->55510 55511 cb5161 55505->55511 55506->55510 55507 cb52cd OpenProcess 55512 cb52e6 OpenProcess 55507->55512 55507->55529 55508 cb53e0 55514 caf930 94 API calls 55508->55514 55513 ca6660 9 API calls 55509->55513 55519 caf930 94 API calls 55510->55519 55515 ca1890 25 API calls 55511->55515 55516 cb53bb GetLastError 55512->55516 55512->55529 55513->55510 55518 cb53de FindCloseChangeNotification 55514->55518 55515->55520 55521 cb53c3 Process32NextW 55516->55521 55517 cb6320 2 API calls 55517->55529 55523 ca1890 25 API calls 55518->55523 55519->55493 55520->55477 55521->55518 55521->55529 55523->55520 55524 ca63c0 27 API calls 55524->55529 55525 cb5450 27 API calls 55525->55529 55526 cb539e TerminateProcess 55527 cb53a7 FindCloseChangeNotification 55526->55527 55528 ca1890 25 API calls 55527->55528 55528->55529 55529->55507 55529->55508 55529->55517 55529->55521 55529->55524 55529->55525 55529->55526 55529->55527 55530->55362 55531->55362 55533 ca1760 55532->55533 55533->55533 55534 ca63c0 27 API calls 55533->55534 55535 ca1772 55534->55535 55535->55334 55536->55354 55537->55360 55539 cb5492 55538->55539 55541 cb5507 55538->55541 55540 ca63c0 27 API calls 55539->55540 55540->55541 55541->55483 55542->55487 55543->55371 55544->55377 55545->55383 55552 cb6927 _Yarn std::ios_base::_Tidy 55551->55552 55553 cb6888 55551->55553 55552->55424 55553->55552 55554 cb689a 55553->55554 55558 cb695f 55553->55558 55555 cb6975 55554->55555 55557 cb68ad 55554->55557 55572 ca61e0 27 API calls 55555->55572 55570 ca6200 27 API calls 4 library calls 55557->55570 55558->55552 55571 ca6190 25 API calls 2 library calls 55558->55571 55560 cb68eb _Yarn 55560->55552 55573 ce4bea 25 API calls 2 library calls 55560->55573 55561 cb696e 55561->55424 55565->55432 55570->55560 55571->55561 55575 caf377 55574->55575 55576 caf3b8 GetTempPathW 55575->55576 55578 caf3a0 55575->55578 55577 caf8a0 2 API calls 55576->55577 55577->55578 55579 caf49a 55578->55579 55580 caf41f 55578->55580 55581 caf49f 55579->55581 55582 caf4e3 55579->55582 55583 ca6620 44 API calls 55580->55583 55584 ca6620 44 API calls 55581->55584 55586 ca6620 44 API calls 55582->55586 55585 caf430 55583->55585 55587 caf4b0 55584->55587 55588 ca6620 44 API calls 55585->55588 55589 caf4f6 55586->55589 55590 ca6620 44 API calls 55587->55590 55591 caf447 55588->55591 55595 ca6620 44 API calls 55589->55595 55592 caf4c7 55590->55592 55593 ca6620 44 API calls 55591->55593 55594 ca6620 44 API calls 55592->55594 55598 caf45e 55593->55598 55597 caf4de 55594->55597 55596 caf51c 55595->55596 55599 ca6620 44 API calls 55596->55599 55602 ca6620 44 API calls 55597->55602 55600 ca6620 44 API calls 55598->55600 55599->55597 55601 caf48f 55600->55601 55603 ca6620 44 API calls 55601->55603 55602->55601 55604 caf571 55603->55604 55631 caf910 MultiByteToWideChar 55604->55631 55606 caf588 55632 caf910 MultiByteToWideChar 55606->55632 55608 caf5a2 55633 caf910 MultiByteToWideChar 55608->55633 55610 caf5bc 55634 caf910 MultiByteToWideChar 55610->55634 55612 caf5d6 55635 caf910 MultiByteToWideChar 55612->55635 55614 caf5f0 GetFileAttributesW 55615 caf618 GetFileAttributesW 55614->55615 55616 caf602 CopyFileW 55614->55616 55617 caf62a CopyFileW 55615->55617 55618 caf640 55615->55618 55616->55615 55617->55618 55619 ce4f37 28 API calls 55618->55619 55620 caf651 55619->55620 55621 caf6d8 55620->55621 55622 caf65e WSAGetLastError 55620->55622 55624 ce973c 68 API calls 55621->55624 55623 ca6660 9 API calls 55622->55623 55626 caf676 55623->55626 55625 caf68b 55624->55625 55628 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55625->55628 55627 ca6620 44 API calls 55626->55627 55627->55625 55629 caf6fb 55628->55629 55629->55173 55630->55167 55631->55606 55632->55608 55633->55610 55634->55612 55635->55614 55637 ca1c4b SetUnhandledExceptionFilter #17 55636->55637 55638 ccbb42 55637->55638 55639 ccbb4e __EH_prolog3 55638->55639 55647 ccbc01 GetModuleFileNameW 55639->55647 55641 ccbb89 55644 ccbbbe std::locale::_Init 55641->55644 55654 ccb02a 55641->55654 55642 cc9f16 60 API calls 55642->55641 55644->55178 55646->55187 55648 ccbc2f 55647->55648 55652 ccbc65 55647->55652 55649 ccbc33 PathFindExtensionW 55648->55649 55648->55652 55662 ccb57d 55649->55662 55651 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55653 ccbb78 55651->55653 55652->55651 55653->55641 55653->55642 55655 ccb036 __EH_prolog3 55654->55655 55830 cc8b46 55655->55830 55660 ccb064 std::locale::_Init 55660->55644 55663 ccb58c __EH_prolog3_GS 55662->55663 55664 ccb02a 66 API calls 55663->55664 55665 ccb59e 55664->55665 55666 ccb02a 66 API calls 55665->55666 55667 ccb5ae __Getcvt 55666->55667 55676 cd6028 55667->55676 55670 ccb611 55673 ccb631 55670->55673 55709 ccc345 55670->55709 55728 cdebba 5 API calls __ehhandler$___std_fs_get_file_attributes_by_handle@8 55673->55728 55677 cd6056 GetModuleHandleW 55676->55677 55678 cd6081 DecodePointer 55676->55678 55679 cd6065 GetProcAddress EncodePointer 55677->55679 55680 cd60a6 GetUserDefaultUILanguage 55677->55680 55681 cd608a 55678->55681 55679->55681 55729 cd63d1 25 API calls 2 library calls 55680->55729 55681->55680 55685 cd608e 55681->55685 55683 cd60c1 55730 cf25d6 25 API calls 2 library calls 55683->55730 55687 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55685->55687 55686 cd60db 55731 cd63d1 25 API calls 2 library calls 55686->55731 55689 ccb5f2 55687->55689 55689->55670 55705 ccc30c 55689->55705 55690 cd60f0 55732 cf25d6 25 API calls 2 library calls 55690->55732 55692 cd6114 GetSystemDefaultUILanguage 55733 cd63d1 25 API calls 2 library calls 55692->55733 55694 cd612e 55734 cf25d6 25 API calls 2 library calls 55694->55734 55696 cd6152 55735 cd63d1 25 API calls 2 library calls 55696->55735 55698 cd6166 55736 cf25d6 25 API calls 2 library calls 55698->55736 55700 cd618a 55737 cd63d1 25 API calls 2 library calls 55700->55737 55702 cd619c 55738 cf25d6 25 API calls 2 library calls 55702->55738 55704 cd61bf 55704->55685 55708 ccc318 55705->55708 55706 ccc33d 55706->55670 55708->55706 55739 ccc246 55708->55739 55710 cf2529 _free 14 API calls 55709->55710 55711 ccc363 55710->55711 55712 cf2529 _free 14 API calls 55711->55712 55713 ccc36a 55712->55713 55714 ccc566 __snprintf_s 42 API calls 55713->55714 55715 ccc38c 55714->55715 55716 cf2529 _free 14 API calls 55715->55716 55717 ccc396 55716->55717 55718 cf2529 _free 14 API calls 55717->55718 55719 ccc39d 55718->55719 55722 ccc3a8 55719->55722 55829 ccb715 29 API calls 55719->55829 55721 ccc3dd 55723 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55721->55723 55722->55721 55724 ccc4b9 11 API calls 55722->55724 55726 ccc3ee 55723->55726 55725 ccc3ca 55724->55725 55725->55721 55727 ccc4b9 11 API calls 55725->55727 55726->55673 55727->55721 55729->55683 55730->55686 55731->55690 55732->55692 55733->55694 55734->55696 55735->55698 55736->55700 55737->55702 55738->55704 55760 cd5faf 55739->55760 55742 cf2529 _free 14 API calls 55743 ccc280 55742->55743 55745 cf2529 _free 14 API calls 55743->55745 55744 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55746 ccc30a 55744->55746 55747 ccc287 55745->55747 55746->55708 55770 ccc566 55747->55770 55750 cf2529 _free 14 API calls 55751 ccc2b2 55750->55751 55752 cf2529 _free 14 API calls 55751->55752 55753 ccc2b9 55752->55753 55755 ccc2c4 55753->55755 55780 ccb715 29 API calls 55753->55780 55759 ccc2fa 55755->55759 55773 ccc4b9 55755->55773 55759->55744 55761 cd5fbc GetModuleHandleW 55760->55761 55762 cd5fe7 DecodePointer 55760->55762 55763 cd5fcb GetProcAddress EncodePointer 55761->55763 55766 cd600c 55761->55766 55764 cd5ff0 55762->55764 55763->55764 55765 cd5ff4 GetLocaleInfoEx 55764->55765 55764->55766 55768 ccc26f 55765->55768 55767 cd601d GetLocaleInfoW 55766->55767 55767->55768 55768->55742 55768->55759 55781 ccc585 55770->55781 55775 ccc4c5 ___BuildCatchObject 55773->55775 55780->55755 55782 ccc59f __vsnwprintf_s_l 55781->55782 55785 ce8cda 55782->55785 55786 ce501b __vsnwprintf_s_l 42 API calls 55785->55786 55787 ccc2a8 55786->55787 55787->55750 55829->55722 55831 cc8b74 55830->55831 55832 cc8b55 55830->55832 55846 cc862b 29 API calls 55831->55846 55841 cc8f7e 55832->55841 55842 cc8f9a 55841->55842 55843 cc8f8a 55841->55843 55842->55660 55845 cc99a3 29 API calls 55842->55845 55843->55842 55847 cc97ea 64 API calls 55843->55847 55845->55660 55847->55842 55848->55202 55849->55211 55851 cee58f 55850->55851 55852 cee5a1 55850->55852 55878 cdf103 GetModuleHandleW 55851->55878 55862 cee428 55852->55862 55855 cee594 55855->55852 55879 cee627 GetModuleHandleExW 55855->55879 55857 cddf6f 55857->55065 55863 cee434 ___BuildCatchObject 55862->55863 55885 cf65e6 EnterCriticalSection 55863->55885 55865 cee43e 55886 cee494 55865->55886 55867 cee44b 55890 cee469 55867->55890 55870 cee5e5 55911 cfaf97 GetPEB 55870->55911 55873 cee614 55875 cee627 _Atexit 3 API calls 55873->55875 55874 cee5f4 GetPEB 55874->55873 55876 cee604 GetCurrentProcess TerminateProcess 55874->55876 55877 cee61c ExitProcess 55875->55877 55876->55873 55878->55855 55880 cee669 55879->55880 55881 cee646 GetProcAddress 55879->55881 55883 cee66f FreeLibrary 55880->55883 55884 cee5a0 55880->55884 55882 cee65b 55881->55882 55882->55880 55883->55884 55884->55852 55885->55865 55887 cee4a0 ___BuildCatchObject 55886->55887 55889 cee501 _Atexit 55887->55889 55893 cf5c02 55887->55893 55889->55867 55910 cf662e LeaveCriticalSection 55890->55910 55892 cee457 55892->55857 55892->55870 55896 cf5933 55893->55896 55897 cf593f ___BuildCatchObject 55896->55897 55904 cf65e6 EnterCriticalSection 55897->55904 55899 cf594d 55905 cf5b12 55899->55905 55903 cf596b 55903->55889 55904->55899 55906 cf595a 55905->55906 55907 cf5b31 55905->55907 55909 cf5982 LeaveCriticalSection std::_Lockit::~_Lockit 55906->55909 55907->55906 55908 cf76ea _free 14 API calls 55907->55908 55908->55906 55909->55903 55910->55892 55912 cfafb1 55911->55912 55913 cee5ef 55911->55913 55915 cf7a44 55912->55915 55913->55873 55913->55874 55918 cf79c1 55915->55918 55919 cf79ef 55918->55919 55920 cf79eb 55918->55920 55919->55920 55925 cf78fa 55919->55925 55920->55913 55923 cf7a09 GetProcAddress 55923->55920 55924 cf7a19 __crt_fast_encode_pointer 55923->55924 55924->55920 55930 cf790b try_get_first_available_module 55925->55930 55926 cf79b6 55926->55920 55926->55923 55927 cf7929 LoadLibraryExW 55928 cf7944 GetLastError 55927->55928 55927->55930 55928->55930 55929 cf799f FreeLibrary 55929->55930 55930->55926 55930->55927 55930->55929 55931 cf7977 LoadLibraryExW 55930->55931 55931->55930 55932 ca337e 55933 ca33a4 55932->55933 55934 caf930 94 API calls 55933->55934 55935 ca33d7 55934->55935 56011 cb6390 MultiByteToWideChar 55935->56011 55937 ca3566 55939 ca6620 44 API calls 55937->55939 55938 ca33ef 55938->55937 55941 ca3699 CreateDirectoryW 55938->55941 55944 ca343d 55938->55944 55940 ca35a7 55939->55940 56012 cb6390 MultiByteToWideChar 55940->56012 55941->55937 55943 ca36b0 GetLastError 55941->55943 55943->55937 55946 ca36c1 55943->55946 55944->55944 55947 ca3462 SHGetSpecialFolderPathW 55944->55947 55945 ca35c2 55948 caf930 94 API calls 55945->55948 55949 caf930 94 API calls 55946->55949 55950 cb6320 2 API calls 55947->55950 55951 ca35ea GetFileAttributesW 55948->55951 55974 ca355d 55949->55974 55954 ca348d 55950->55954 55952 ca35ff CreateDirectoryW 55951->55952 55957 ca36fe 55951->55957 55953 ca3616 GetLastError 55952->55953 55952->55957 55955 ca3627 55953->55955 55953->55957 55954->55954 55959 ca34ca 55954->55959 55956 ca6620 44 API calls 55955->55956 55958 ca3646 55956->55958 55961 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 55957->55961 56014 cb6390 MultiByteToWideChar 55958->56014 56013 cb6390 MultiByteToWideChar 55959->56013 55964 ca5363 55961->55964 55963 ca365e 55963->55957 55971 ca3673 CreateDirectoryW 55963->55971 55966 ca53cb GetLastError FormatMessageW 55964->55966 55965 ca34f0 55967 caf930 94 API calls 55965->55967 55968 ca1740 27 API calls 55966->55968 55969 ca3518 CreateDirectoryW 55967->55969 55970 ca5400 55968->55970 55973 ca352e GetLastError 55969->55973 55969->55974 55975 ca1aa0 27 API calls 55970->55975 55971->55957 55972 ca3686 GetLastError 55971->55972 55972->55966 55977 ca3697 55972->55977 55978 caf930 94 API calls 55973->55978 55974->55937 55976 ca5412 55975->55976 56015 cb6390 MultiByteToWideChar 55976->56015 55977->55957 55978->55974 55980 ca5436 55981 ca1740 27 API calls 55980->55981 55982 ca5445 55981->55982 55983 ca1aa0 27 API calls 55982->55983 55984 ca5457 55983->55984 56016 cb6390 MultiByteToWideChar 55984->56016 55986 ca5478 GetActiveWindow MessageBoxW GetLastError 55987 ca6620 44 API calls 55986->55987 55988 ca54bd 55987->55988 55989 caf930 94 API calls 55988->55989 55990 ca54e5 55989->55990 56017 ce0f0f RaiseException 55990->56017 55992 ca5505 55993 ca6660 9 API calls 55992->55993 55994 ca550b 55993->55994 55995 caf930 94 API calls 55994->55995 55996 ca553a 55995->55996 56018 ce0f0f RaiseException 55996->56018 55998 ca555a 55999 ca6660 9 API calls 55998->55999 56000 ca5560 55999->56000 56001 caf930 94 API calls 56000->56001 56002 ca558f 56001->56002 56019 ce0f0f RaiseException 56002->56019 56004 ca55af 56005 ca6660 9 API calls 56004->56005 56006 ca55b5 56005->56006 56007 caf930 94 API calls 56006->56007 56008 ca55e4 56007->56008 56020 ce0f0f RaiseException 56008->56020 56010 ca5604 56011->55938 56012->55945 56013->55965 56014->55963 56015->55980 56016->55986 56017->55992 56018->55998 56019->56004 56020->56010 56021 cef6b8 56022 cef6c4 ___BuildCatchObject 56021->56022 56023 cef6df 56022->56023 56024 cef6ca 56022->56024 56034 ce4da2 EnterCriticalSection 56023->56034 56025 cf2529 _free 14 API calls 56024->56025 56027 cef6cf 56025->56027 56040 ce4bda 25 API calls _memcpy_s 56027->56040 56028 cef6eb 56035 cef729 56028->56035 56031 cef6da 56034->56028 56042 cef754 56035->56042 56037 cef6f8 56041 cef71f LeaveCriticalSection __fread_nolock 56037->56041 56038 cef736 56038->56037 56039 cf2529 _free 14 API calls 56038->56039 56039->56037 56040->56031 56041->56031 56043 cef779 56042->56043 56044 cef762 56042->56044 56046 cf9a2f __fread_nolock 25 API calls 56043->56046 56045 cf2529 _free 14 API calls 56044->56045 56047 cef767 56045->56047 56048 cef783 56046->56048 56063 ce4bda 25 API calls _memcpy_s 56047->56063 56050 cfb6e7 29 API calls 56048->56050 56052 cef79e 56050->56052 56051 cef772 56051->56038 56053 cef866 56052->56053 56054 cef811 56052->56054 56062 cef7c8 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 56052->56062 56055 cef874 56053->56055 56059 cef83f 56053->56059 56057 cef82b 56054->56057 56054->56059 56056 cf2529 _free 14 API calls 56055->56056 56056->56062 56064 cefa91 30 API calls 4 library calls 56057->56064 56059->56062 56065 cef8d8 29 API calls 2 library calls 56059->56065 56060 cef837 56060->56062 56062->56038 56063->56051 56064->56060 56065->56062 56066 ccba9b 56076 cca8bf 56066->56076 56069 ccbaad PostMessageW 56072 ccbad8 56069->56072 56070 ccbae2 56071 ccd54f ~refcount_ptr RaiseException 56070->56071 56073 ccbae7 56071->56073 56079 ccc3f0 56073->56079 56077 cc9f49 60 API calls 56076->56077 56078 cca8c5 56077->56078 56078->56069 56078->56070 56081 ccbb3b 56079->56081 56084 ccc426 56079->56084 56080 ccc427 RegOpenKeyExW 56080->56084 56082 ccc444 RegQueryValueExW 56082->56084 56083 ccc497 RegCloseKey 56083->56084 56084->56080 56084->56081 56084->56082 56084->56083 56085 ca37dd CreateDirectoryW 56086 ca37f0 GetLastError 56085->56086 56087 ca3807 GetFileAttributesW 56085->56087 56086->56087 56088 ca5505 56086->56088 56089 ca383f GetFileAttributesW 56087->56089 56090 ca3815 CreateDirectoryW 56087->56090 56091 ca6660 9 API calls 56088->56091 56093 ca384d CreateDirectoryW 56089->56093 56094 ca3877 56089->56094 56090->56089 56092 ca3828 GetLastError 56090->56092 56095 ca550b 56091->56095 56092->56089 56096 ca555a 56092->56096 56093->56094 56097 ca3860 GetLastError 56093->56097 56297 cb1f00 56094->56297 56100 caf930 94 API calls 56095->56100 56101 ca6660 9 API calls 56096->56101 56097->56094 56102 ca55af 56097->56102 56099 ca388a 56103 caf930 94 API calls 56099->56103 56104 ca553a 56100->56104 56105 ca5560 56101->56105 56106 ca6660 9 API calls 56102->56106 56108 ca38b9 56103->56108 56641 ce0f0f RaiseException 56104->56641 56110 caf930 94 API calls 56105->56110 56107 ca55b5 56106->56107 56111 caf930 94 API calls 56107->56111 56332 cc28b0 56108->56332 56113 ca558f 56110->56113 56114 ca55e4 56111->56114 56642 ce0f0f RaiseException 56113->56642 56643 ce0f0f RaiseException 56114->56643 56118 ca6620 44 API calls 56119 ca38e6 56118->56119 56354 cb6390 MultiByteToWideChar 56119->56354 56121 ca38fe GetFileAttributesW 56124 ca3938 56121->56124 56122 ca5604 56125 caf930 94 API calls 56124->56125 56126 ca3959 56125->56126 56127 cb1f00 109 API calls 56126->56127 56128 ca396c 56127->56128 56355 cc30c0 56128->56355 56131 ca6620 44 API calls 56132 ca39a1 56131->56132 56394 cb4100 56132->56394 56134 ca39b2 56135 ca6620 44 API calls 56134->56135 56136 ca3a0c 56135->56136 56137 ca6620 44 API calls 56136->56137 56138 ca3a29 56137->56138 56428 cb6390 MultiByteToWideChar 56138->56428 56140 ca3a41 56429 cb6390 MultiByteToWideChar 56140->56429 56142 ca3a59 CopyFileW 56143 caf930 94 API calls 56142->56143 56144 ca3aa1 56143->56144 56145 ca6620 44 API calls 56144->56145 56146 ca3aba 56145->56146 56147 ca6620 44 API calls 56146->56147 56148 ca3ad2 56147->56148 56430 cb6390 MultiByteToWideChar 56148->56430 56150 ca3aea 56431 cb6390 MultiByteToWideChar 56150->56431 56152 ca3b05 CopyFileW 56153 caf930 94 API calls 56152->56153 56298 cb1f0a __wsopen_s 56297->56298 56644 cb6390 MultiByteToWideChar 56298->56644 56300 cb1f40 GetFileAttributesW 56301 cb1fb9 56300->56301 56302 cb1f56 CreateDirectoryW 56300->56302 56304 ca6620 44 API calls 56301->56304 56302->56301 56303 cb1f6a WSAGetLastError 56302->56303 56305 ca6660 9 API calls 56303->56305 56306 cb1fcc 56304->56306 56307 cb1f78 56305->56307 56645 cb6390 MultiByteToWideChar 56306->56645 56309 cb1f85 56307->56309 56312 caf930 94 API calls 56309->56312 56310 cb1fe6 FindFirstFileW 56311 cb2003 GetLastError FormatMessageW 56310->56311 56316 cb2059 56310->56316 56313 cb6320 2 API calls 56311->56313 56314 cb1f9c 56312->56314 56313->56309 56315 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56314->56315 56317 cb1fb2 56315->56317 56318 cb22a9 FindNextFileW 56316->56318 56322 cb6320 2 API calls 56316->56322 56323 ca6620 44 API calls 56316->56323 56327 cb1f00 97 API calls 56316->56327 56328 cb21d5 CopyFileW 56316->56328 56331 caf930 94 API calls 56316->56331 56646 cb6390 MultiByteToWideChar 56316->56646 56647 cb6390 MultiByteToWideChar 56316->56647 56317->56099 56318->56316 56319 cb22b9 FindClose 56318->56319 56320 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56319->56320 56321 cb22d4 56320->56321 56321->56099 56322->56316 56323->56316 56326 cb2164 SetFileAttributesW 56326->56316 56327->56316 56328->56316 56329 cb21f5 GetLastError FormatMessageW 56328->56329 56330 cb6320 2 API calls 56329->56330 56330->56316 56331->56316 56648 cc78a0 CreateEventW CreateEventW 56332->56648 56334 cc28ea 56335 ca63c0 27 API calls 56334->56335 56336 cc293c 56335->56336 56337 ca13f0 27 API calls 56336->56337 56338 cc294b 56337->56338 56339 cc295b 56338->56339 56340 ca1890 25 API calls 56338->56340 56341 cc29a6 std::ios_base::_Tidy 56339->56341 56343 cc2a3e 56339->56343 56340->56339 56342 ca13f0 27 API calls 56341->56342 56344 cc29bf 56342->56344 56649 ce4bea 25 API calls 2 library calls 56343->56649 56346 cc29cf 56344->56346 56348 ca1890 25 API calls 56344->56348 56347 cc2a43 56346->56347 56353 cc2a16 std::ios_base::_Tidy 56346->56353 56650 ce4bea 25 API calls 2 library calls 56347->56650 56348->56346 56349 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56351 ca38c7 56349->56351 56351->56118 56353->56349 56354->56121 56356 cc3126 __Getcvt 56355->56356 56357 ca63c0 27 API calls 56356->56357 56358 cc315a 56357->56358 56359 ca6620 44 API calls 56358->56359 56360 cc317b 56359->56360 56651 cb6390 MultiByteToWideChar 56360->56651 56362 cc3190 56363 ce4f37 28 API calls 56362->56363 56364 cc319e 56363->56364 56365 cc31ff 56364->56365 56367 cc31a7 56364->56367 56366 ca63c0 27 API calls 56365->56366 56371 cc31f4 56365->56371 56366->56371 56652 ce99a6 56367->56652 56370 ce973c 68 API calls 56372 cc31d9 56370->56372 56373 cc325f 56371->56373 56374 cc329b 56371->56374 56378 ca63c0 27 API calls 56372->56378 56375 caf930 94 API calls 56373->56375 56376 ce4f37 28 API calls 56374->56376 56392 cc328e 56375->56392 56377 cc32a9 56376->56377 56379 cc32e7 56377->56379 56380 cc32b3 56377->56380 56378->56371 56381 cb0060 69 API calls 56379->56381 56385 caf930 94 API calls 56380->56385 56382 cc32f2 56381->56382 56383 cf02fb 67 API calls 56382->56383 56387 cc32f8 56383->56387 56384 cc332f std::ios_base::_Tidy 56386 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56384->56386 56385->56392 56388 ca3989 56386->56388 56389 ce973c 68 API calls 56387->56389 56388->56131 56389->56392 56390 cc3360 56655 ce4bea 25 API calls 2 library calls 56390->56655 56392->56384 56392->56390 56395 cb410a __wsopen_s 56394->56395 56396 cb43bf 56395->56396 56398 cb4139 56395->56398 56397 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56396->56397 56399 cb43d1 56397->56399 56400 ca6620 44 API calls 56398->56400 56399->56134 56401 cb414d 56400->56401 56687 cb6390 MultiByteToWideChar 56401->56687 56403 cb4167 FindFirstFileW 56404 cb4184 56403->56404 56416 cb41c2 _strstr 56403->56416 56690 cb6390 MultiByteToWideChar 56404->56690 56406 cb4197 RemoveDirectoryW 56407 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56406->56407 56408 cb41bb 56407->56408 56408->56134 56409 cb42e6 FindNextFileW 56410 cb42fa FindClose 56409->56410 56409->56416 56689 cb6390 MultiByteToWideChar 56410->56689 56412 cb4314 RemoveDirectoryW GetLastError FormatMessageW 56413 cb6320 2 API calls 56412->56413 56415 cb4364 WSAGetLastError 56413->56415 56414 cb6320 2 API calls 56414->56416 56417 ca6660 9 API calls 56415->56417 56416->56409 56416->56414 56418 ca6620 44 API calls 56416->56418 56426 cb4100 97 API calls 56416->56426 56427 cb42d8 DeleteFileW 56416->56427 56688 cb6390 MultiByteToWideChar 56416->56688 56419 cb4375 56417->56419 56418->56416 56420 caf930 94 API calls 56419->56420 56422 cb43a1 56420->56422 56424 cde37f __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 56422->56424 56423 cb428f SetFileAttributesW 56423->56416 56425 cb43b8 56424->56425 56425->56134 56426->56416 56427->56409 56428->56140 56429->56142 56430->56150 56431->56152 56641->56096 56642->56102 56643->56122 56644->56300 56645->56310 56646->56316 56647->56326 56648->56334 56651->56362 56656 ce99c3 56652->56656 56657 ce99cf ___BuildCatchObject 56656->56657 56658 ce9a19 56657->56658 56659 ce99e2 __Getcvt 56657->56659 56668 cc31cc 56657->56668 56669 ce4da2 EnterCriticalSection 56658->56669 56661 cf2529 _free 14 API calls 56659->56661 56663 ce99fc 56661->56663 56662 ce9a23 56670 ce97c0 56662->56670 56683 ce4bda 25 API calls _memcpy_s 56663->56683 56668->56370 56669->56662 56671 ce97ed 56670->56671 56674 ce97d1 __Getcvt 56670->56674 56684 ce9a58 LeaveCriticalSection __fread_nolock 56671->56684 56672 ce97dd 56673 cf2529 _free 14 API calls 56672->56673 56680 ce97e2 56673->56680 56674->56671 56674->56672 56676 ce982f __fread_nolock 56674->56676 56676->56671 56678 cf9a2f __fread_nolock 25 API calls 56676->56678 56681 ce9956 __Getcvt 56676->56681 56682 cfa911 __fread_nolock 37 API calls 56676->56682 56686 ce9a60 25 API calls 4 library calls 56676->56686 56678->56676 56679 cf2529 _free 14 API calls 56679->56680 56685 ce4bda 25 API calls _memcpy_s 56680->56685 56681->56679 56682->56676 56683->56668 56684->56668 56685->56671 56686->56676 56687->56403 56688->56423 56689->56412 56690->56406 56808 cd5533 8 API calls
                                                          APIs
                                                            • Part of subcall function 00CB6390: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000136,00000136,00CA2639,?,?,00000200,?,%s\%s,?,version.txt,Utility::GetUserDirectory(),00000000), ref: 00CB63AA
                                                          • FindFirstFileW.KERNELBASE(?,?,?,00D127A8,?,%s\%s,?,?,?,?,?,?,?,00000000), ref: 00CB4177
                                                          • RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00CB41A2
                                                          • SetFileAttributesW.KERNELBASE(?,?), ref: 00CB42A2
                                                          • _strstr.LIBCMT ref: 00CB42C7
                                                          • DeleteFileW.KERNELBASE(?), ref: 00CB42E0
                                                          • FindNextFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?), ref: 00CB42EC
                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00CB42FB
                                                          Strings
                                                          • c:\rhub2\code\utility\utility.cpp, xrefs: 00CB438A
                                                          • %s\%s, xrefs: 00CB426A
                                                          • Utility::RemoveAllFile, xrefs: 00CB4391
                                                          • %s\*, xrefs: 00CB4142
                                                          • End of RemoveAllFile: path = %s, %s, error code: %d, error: %s, xrefs: 00CB4380
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: File$Find$AttributesByteCharCloseDeleteDirectoryFirstMultiNextRemoveWide_strstr
                                                          • String ID: %s\%s$%s\*$End of RemoveAllFile: path = %s, %s, error code: %d, error: %s$Utility::RemoveAllFile$c:\rhub2\code\utility\utility.cpp
                                                          • API String ID: 2053179335-2006491347
                                                          • Opcode ID: bfd6d4b540db4749e6e881100eb81af914e3e13471a86a52beee189a20743845
                                                          • Instruction ID: 46954af84325fb9fa7e7606043650cc103fb2c439297f42b80bd5e433e206bc9
                                                          • Opcode Fuzzy Hash: bfd6d4b540db4749e6e881100eb81af914e3e13471a86a52beee189a20743845
                                                          • Instruction Fuzzy Hash: 8361F1B2548344BAE724EB64DC46FEB73EDEB68304F440829F655C2192EB31E684D762
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CAF930: EnterCriticalSection.KERNEL32(?,A2E85FC4), ref: 00CAF981
                                                            • Part of subcall function 00CAF930: LeaveCriticalSection.KERNEL32(?), ref: 00CAF9CF
                                                          • _strstr.LIBCMT ref: 00CA24DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave_strstr
                                                          • String ID: of PCInstaller$%s\%s$%s\dictionary_client_ENG.tmd$--client_name$Error$Failed to open the dictionary file$LoadDictionary failed, m_sCurrentDirectory = %s$PCInstaller:Initialize()$PCInstaller:Instialize()$Try a different one: g_oTranslator->m_sDirectory = %s$TurboMeeting$Utility::GetUserDirectory()$V5.0 SP1$Version is %s, sVersionFileName %s$c:\rhub2\code\pcinstaller\pcinstaller.cpp$client$g_oTranslator->m_sDirectory = %s$m_sStartMenuDirectory = %s$m_uIdentity.m_sClientName = %s$version.txt$w<$:
                                                          • API String ID: 151139275-1809635399
                                                          • Opcode ID: caf57b1029bbc4a098f67b82252c62c407beda2cd4db5fc7b83beca7e260ed0d
                                                          • Instruction ID: 48febd5953b555de283b5c158bf751ef6bd54fb5cc53980bae59026b82bda5e6
                                                          • Opcode Fuzzy Hash: caf57b1029bbc4a098f67b82252c62c407beda2cd4db5fc7b83beca7e260ed0d
                                                          • Instruction Fuzzy Hash: 19D17631A41319BEDB14DB64DC02FEABB74BF06304F044198F518A76D2DBB25BD59BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CAF930: EnterCriticalSection.KERNEL32(?,A2E85FC4), ref: 00CAF981
                                                            • Part of subcall function 00CAF930: LeaveCriticalSection.KERNEL32(?), ref: 00CAF9CF
                                                          • _strstr.LIBCMT ref: 00CA24DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave_strstr
                                                          • String ID: of PCInstaller$%s\%s$%s\dictionary_client_ENG.tmd$--client_name$Error$Failed to open the dictionary file$LoadDictionary failed, m_sCurrentDirectory = %s$PCInstaller:Initialize()$PCInstaller:Instialize()$Try a different one: g_oTranslator->m_sDirectory = %s$TurboMeeting$Utility::GetUserDirectory()$V5.0 SP1$Version is %s, sVersionFileName %s$c:\rhub2\code\pcinstaller\pcinstaller.cpp$client$g_oTranslator->m_sDirectory = %s$m_sStartMenuDirectory = %s$m_uIdentity.m_sClientName = %s$version.txt$w<$:
                                                          • API String ID: 151139275-1809635399
                                                          • Opcode ID: 8d2488407d0a9976bcca64797b088dc6a1f8929d77be72aba992b9f1ee2bfc16
                                                          • Instruction ID: 4a9dd028368f0d0c7535704fcfdc4bc341f878166e0c859195f293a38698a87b
                                                          • Opcode Fuzzy Hash: 8d2488407d0a9976bcca64797b088dc6a1f8929d77be72aba992b9f1ee2bfc16
                                                          • Instruction Fuzzy Hash: 4FD16531A41319BEDB10DB64DC02FEABB74BF06304F044198F519A76D2DBB26BD59BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CAF930: EnterCriticalSection.KERNEL32(?,A2E85FC4), ref: 00CAF981
                                                            • Part of subcall function 00CAF930: LeaveCriticalSection.KERNEL32(?), ref: 00CAF9CF
                                                          • _strstr.LIBCMT ref: 00CA24DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave_strstr
                                                          • String ID: of PCInstaller$%s\%s$%s\dictionary_client_ENG.tmd$--client_name$Error$Failed to open the dictionary file$LoadDictionary failed, m_sCurrentDirectory = %s$PCInstaller:Initialize()$PCInstaller:Instialize()$Try a different one: g_oTranslator->m_sDirectory = %s$TurboMeeting$Utility::GetUserDirectory()$V5.0 SP1$Version is %s, sVersionFileName %s$c:\rhub2\code\pcinstaller\pcinstaller.cpp$client$g_oTranslator->m_sDirectory = %s$m_sStartMenuDirectory = %s$m_uIdentity.m_sClientName = %s$version.txt$w<$:
                                                          • API String ID: 151139275-1809635399
                                                          • Opcode ID: e7fde1bd83495333d77def4b5bad5e5179344c282a7200fe997116dcc356978e
                                                          • Instruction ID: 51a0ca1f809d879cc4b2b54fa43446fab87833209deb3545f3b114bb50d8cced
                                                          • Opcode Fuzzy Hash: e7fde1bd83495333d77def4b5bad5e5179344c282a7200fe997116dcc356978e
                                                          • Instruction Fuzzy Hash: CED16431A41319BEDB10DB64DC02FEABB74BF06304F044198F519A72D2DBB26BD59BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CAF930: EnterCriticalSection.KERNEL32(?,A2E85FC4), ref: 00CAF981
                                                            • Part of subcall function 00CAF930: LeaveCriticalSection.KERNEL32(?), ref: 00CAF9CF
                                                          • _strstr.LIBCMT ref: 00CA24DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave_strstr
                                                          • String ID: of PCInstaller$%s\%s$%s\dictionary_client_ENG.tmd$--client_name$Error$Failed to open the dictionary file$LoadDictionary failed, m_sCurrentDirectory = %s$PCInstaller:Initialize()$PCInstaller:Instialize()$Try a different one: g_oTranslator->m_sDirectory = %s$TurboMeeting$Utility::GetUserDirectory()$V5.0 SP1$Version is %s, sVersionFileName %s$c:\rhub2\code\pcinstaller\pcinstaller.cpp$client$g_oTranslator->m_sDirectory = %s$m_sStartMenuDirectory = %s$m_uIdentity.m_sClientName = %s$version.txt$w<$:
                                                          • API String ID: 151139275-1809635399
                                                          • Opcode ID: 9407a9bd4af04ff53f3e9590fd0ea1061780f00aa413d2a58d0db8ec16268e43
                                                          • Instruction ID: 9a473239821bf66372eaca4c56aab654e7ccfebe9d8b17c16f26f4afd60c88cb
                                                          • Opcode Fuzzy Hash: 9407a9bd4af04ff53f3e9590fd0ea1061780f00aa413d2a58d0db8ec16268e43
                                                          • Instruction Fuzzy Hash: 47D15431A41319BEDB14DB64DC02FEABB74BF06304F044198F519A72D2DBB26BD59BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CAF930: EnterCriticalSection.KERNEL32(?,A2E85FC4), ref: 00CAF981
                                                            • Part of subcall function 00CAF930: LeaveCriticalSection.KERNEL32(?), ref: 00CAF9CF
                                                          • _strstr.LIBCMT ref: 00CA24DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave_strstr
                                                          • String ID: of PCInstaller$%s\%s$%s\dictionary_client_ENG.tmd$--client_name$Error$Failed to open the dictionary file$LoadDictionary failed, m_sCurrentDirectory = %s$PCInstaller:Initialize()$PCInstaller:Instialize()$Try a different one: g_oTranslator->m_sDirectory = %s$TurboMeeting$Utility::GetUserDirectory()$V5.0 SP1$Version is %s, sVersionFileName %s$c:\rhub2\code\pcinstaller\pcinstaller.cpp$client$g_oTranslator->m_sDirectory = %s$m_sStartMenuDirectory = %s$m_uIdentity.m_sClientName = %s$version.txt$w<$:
                                                          • API String ID: 151139275-1809635399
                                                          • Opcode ID: a66b295bd8898bb1a9f3e3c2789982d3792d27430e332ada1daf19837adb7dd2
                                                          • Instruction ID: 1147772a877eecd90655308037283ce712b7e3fa2ec5305cb84a975b9a172f97
                                                          • Opcode Fuzzy Hash: a66b295bd8898bb1a9f3e3c2789982d3792d27430e332ada1daf19837adb7dd2
                                                          • Instruction Fuzzy Hash: 61D16431A41319BEDB10DB64DC02FEABB74BF06304F044198F519A72D2DBB25BD59BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CAF930: EnterCriticalSection.KERNEL32(?,A2E85FC4), ref: 00CAF981
                                                            • Part of subcall function 00CAF930: LeaveCriticalSection.KERNEL32(?), ref: 00CAF9CF
                                                          • _strstr.LIBCMT ref: 00CA24DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave_strstr
                                                          • String ID: of PCInstaller$%s\%s$%s\dictionary_client_ENG.tmd$--client_name$Error$Failed to open the dictionary file$LoadDictionary failed, m_sCurrentDirectory = %s$PCInstaller:Initialize()$PCInstaller:Instialize()$Try a different one: g_oTranslator->m_sDirectory = %s$TurboMeeting$Utility::GetUserDirectory()$V5.0 SP1$Version is %s, sVersionFileName %s$c:\rhub2\code\pcinstaller\pcinstaller.cpp$client$g_oTranslator->m_sDirectory = %s$m_sStartMenuDirectory = %s$m_uIdentity.m_sClientName = %s$version.txt$w<$:
                                                          • API String ID: 151139275-1809635399
                                                          • Opcode ID: 2e88280af3f198695783b9bde54b04a7c4a3d2ed4b2d0ef86f29f9019fe9f6d8
                                                          • Instruction ID: 5652eb627b4bd29ccb3fa15202fa9070fb043122e6ac143dd87ba8782582c7ce
                                                          • Opcode Fuzzy Hash: 2e88280af3f198695783b9bde54b04a7c4a3d2ed4b2d0ef86f29f9019fe9f6d8
                                                          • Instruction Fuzzy Hash: C5D15431A41319BEDB10DB64DC02FEAB774BF06304F044198F519A72D2DBB26BD59BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(0000001C,?,?,00000000), ref: 00CD44DB
                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,00000000), ref: 00CD4536
                                                          • GlobalHandle.KERNEL32(00000010), ref: 00CD4540
                                                          • GlobalUnlock.KERNEL32(00000000,?,?,00000000), ref: 00CD4549
                                                          • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 00CD4563
                                                          • GlobalLock.KERNEL32(00000000,?,?,00000000), ref: 00CD456E
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 00CD45B8
                                                          • GlobalHandle.KERNEL32(00000010), ref: 00CD45CC
                                                          • GlobalLock.KERNEL32(00000000,?,?,00000000), ref: 00CD45D3
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000), ref: 00CD45DD
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                          • String ID:
                                                          • API String ID: 2667261700-0
                                                          • Opcode ID: 7dd25fe401329e1d9eaeda8553f3180a284888fda57864ef063c49093f469f5c
                                                          • Instruction ID: 6393b139dd542347a49d8fa3bb05c89e208e6915d46a3691aa6487bff5688022
                                                          • Opcode Fuzzy Hash: 7dd25fe401329e1d9eaeda8553f3180a284888fda57864ef063c49093f469f5c
                                                          • Instruction Fuzzy Hash: 79417275600304BFDB29DF64E989B997BF9EF84301F00845AF652D7390EB74AA85CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindWindowW.USER32(Progman,00000000), ref: 00CB40B9
                                                          • FindWindowExW.USER32(00000000,00000000,SHELLDLL_DefView,00000000), ref: 00CB40CF
                                                          • FindWindowExW.USER32(00000000,00000000,SysListView32,00000000), ref: 00CB40DB
                                                          • PostMessageW.USER32(00000000,00000100,00000074,00000000), ref: 00CB40EF
                                                          • PostMessageW.USER32(00000000,00000101,00000074,00000000), ref: 00CB40FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: FindWindow$MessagePost
                                                          • String ID: Progman$SHELLDLL_DefView$SysListView32
                                                          • API String ID: 3193530299-3679918277
                                                          • Opcode ID: d0f75e748e4a6db6ea86587306a1fda0513e0b199fed31e533d77243eed925f6
                                                          • Instruction ID: 0325c0d80bd7334460e5a4342827b3c9e106e59c9f5c42d9a72fae21842eb82a
                                                          • Opcode Fuzzy Hash: d0f75e748e4a6db6ea86587306a1fda0513e0b199fed31e533d77243eed925f6
                                                          • Instruction Fuzzy Hash: 47E09A31BC532475F53062616C4BFAA1D199B85F65F254016B705BA2C0CAE8748689B8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • TlsFree.KERNELBASE(?,A2E85FC4,?,?,?,00D0E7A9,000000FF), ref: 00CD43D0
                                                          • GlobalHandle.KERNEL32(00000000), ref: 00CD43DF
                                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,00D0E7A9,000000FF), ref: 00CD43E8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00CD43EF
                                                          • DeleteCriticalSection.KERNEL32(?,A2E85FC4,?,?,?,00D0E7A9,000000FF), ref: 00CD43F9
                                                            • Part of subcall function 00CD45E9: EnterCriticalSection.KERNEL32(?,00000001,00000000,00000010,?,?,00000000), ref: 00CD4664
                                                            • Part of subcall function 00CD45E9: LeaveCriticalSection.KERNEL32(?,?,?,?,00000000), ref: 00CD4677
                                                            • Part of subcall function 00CD45E9: LocalFree.KERNEL32(?,?,?,00000000), ref: 00CD4680
                                                            • Part of subcall function 00CD45E9: TlsSetValue.KERNEL32(?,00000000,?,?,00000000), ref: 00CD469C
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                                                          • String ID:
                                                          • API String ID: 1549993015-0
                                                          • Opcode ID: c7cec446b41941edadd11d1561a51a499a500c7775637374fcf3181dc9884b77
                                                          • Instruction ID: 46a6f58c37dd832f55670bb6669e50506bbf964ee7ac487fac57b03e682910de
                                                          • Opcode Fuzzy Hash: c7cec446b41941edadd11d1561a51a499a500c7775637374fcf3181dc9884b77
                                                          • Instruction Fuzzy Hash: 59018035604701FFC7159F69ED08B95BBB8FB45720F044226FA21D37A0DB74E951CAA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00CFB83C: GetConsoleOutputCP.KERNEL32(00000010,00CAF6DE,00D3D174), ref: 00CFB884
                                                          • WriteFile.KERNEL32(02EC84E8,00000010,00000000,00F31A98,00000000,00F31A98,00CAF6DE,00CAF6DE,00CAF6DE,00F31A98,?,?,00CE978F,?,00D348C8,00000010), ref: 00CFC1EF
                                                          • GetLastError.KERNEL32(?,00CE978F,?,00D348C8,00000010,00CAF6DE), ref: 00CFC1F9
                                                          • __dosmaperr.LIBCMT ref: 00CFC238
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: ConsoleErrorFileLastOutputWrite__dosmaperr
                                                          • String ID:
                                                          • API String ID: 910155933-0
                                                          • Opcode ID: 26e8f4c60ff003a8a327bf834d319af988c836f30c4f02cd2c0828722a07c259
                                                          • Instruction ID: 9b44ae544abe10d754f5028cae05dee5f45f09823c67f997e75aaeaf0a28d9a3
                                                          • Opcode Fuzzy Hash: 26e8f4c60ff003a8a327bf834d319af988c836f30c4f02cd2c0828722a07c259
                                                          • Instruction Fuzzy Hash: 41510171B0020DABDF519FA8CA85FFEBBB9EF46310F144045E610A7292D730DA51EB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,00D1E248,00000000,00000001,00000000), ref: 00CCC435
                                                          • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000004), ref: 00CCC456
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00CCC49A
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: 372171994e767e4c849f4d57cf3a90ced29366f16bcb2179b8f438546d7e687a
                                                          • Instruction ID: aa2bbf449c1ab71615badd41fc781ef375bd1acbfe9f316fa2634c94d535119a
                                                          • Opcode Fuzzy Hash: 372171994e767e4c849f4d57cf3a90ced29366f16bcb2179b8f438546d7e687a
                                                          • Instruction Fuzzy Hash: AA213EB2A10209FFEB14CF95CC95BBEB7B8FB11316F10C45CE529A6140E7B4AA44CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __snprintf_s.LIBCMT ref: 00CCC387
                                                            • Part of subcall function 00CCC566: __vsnwprintf_s_l.LEGACY_STDIO_DEFINITIONS ref: 00CCC57B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: __snprintf_s__vsnwprintf_s_l
                                                          • String ID: LOC
                                                          • API String ID: 3877413697-519433814
                                                          • Opcode ID: 8d79f25a512524550a1cf091aff7549cc1967ded514dacd8694a6ef615e291d7
                                                          • Instruction ID: e3e9718d9c69de08d6363dc225d9e4db2c24e619f68788d4a9d8d81398e40965
                                                          • Opcode Fuzzy Hash: 8d79f25a512524550a1cf091aff7549cc1967ded514dacd8694a6ef615e291d7
                                                          • Instruction Fuzzy Hash: C211C231601208BBCB01ABB4ECD2FED33689B14720F004199F608EB1E2DE70DD44A7A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00CD5FAF: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00CCC26F,00CCB611,00000003,?,00000004,00000000,00CCB611), ref: 00CD5FC1
                                                            • Part of subcall function 00CD5FAF: GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00CD5FD1
                                                            • Part of subcall function 00CD5FAF: EncodePointer.KERNEL32(00000000,?,00CCC26F,00CCB611,00000003,?,00000004,00000000,00CCB611), ref: 00CD5FDA
                                                            • Part of subcall function 00CD5FAF: GetLocaleInfoEx.KERNELBASE(?,00CCC26F,00CCB611,00000003,?,00000004,00000000,00CCB611), ref: 00CD6008
                                                          • __snprintf_s.LIBCMT ref: 00CCC2A3
                                                            • Part of subcall function 00CCC566: __vsnwprintf_s_l.LEGACY_STDIO_DEFINITIONS ref: 00CCC57B
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: AddressEncodeHandleInfoLocaleModulePointerProc__snprintf_s__vsnwprintf_s_l
                                                          • String ID:
                                                          • API String ID: 1585518483-0
                                                          • Opcode ID: 363c9183b2cd937ba1b5c40171552db74a40c07c6d1e315fa0bb96c74a3520ca
                                                          • Instruction ID: da42615bfd371cd85f69bee80c14b4afc7b5bcfcabb29ac06f9dd7dae1498892
                                                          • Opcode Fuzzy Hash: 363c9183b2cd937ba1b5c40171552db74a40c07c6d1e315fa0bb96c74a3520ca
                                                          • Instruction Fuzzy Hash: 5C119A71A0021DABDB11FBA4DCD6FBE3368AB14710F000059F618EB1D1EA749A049761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNELBASE(?,00CCB631,?,00D331D8,00000010,00CCC3CA,?,00000000,00000060,?,?,?,?,?), ref: 00CCC4F9
                                                            • Part of subcall function 00CC87FB: OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup), ref: 00CC880F
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: DebugLibraryLoadOutputString
                                                          • String ID:
                                                          • API String ID: 137895185-0
                                                          • Opcode ID: 605dcbd194406cfe484b1f60039f354c0c1694ab893d760c116cb0e0e7dee693
                                                          • Instruction ID: f761cfe897dbcd0fcdf627dc1a2350df01e3ee5aba7b310a0c906abd7406e12b
                                                          • Opcode Fuzzy Hash: 605dcbd194406cfe484b1f60039f354c0c1694ab893d760c116cb0e0e7dee693
                                                          • Instruction Fuzzy Hash: 95F04972D00308EFDF20DF94DC45BADB7B4BB19366F10851EE525E2290C7B89A48EB64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00CB6390: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000136,00000136,00CA2639,?,?,00000200,?,%s\%s,?,version.txt,Utility::GetUserDirectory(),00000000), ref: 00CB63AA
                                                          • DeleteFileW.KERNELBASE(00000000), ref: 00CB447B
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: ByteCharDeleteFileMultiWide
                                                          • String ID:
                                                          • API String ID: 845983722-0
                                                          • Opcode ID: 2888c51d55bd0950f93b03fbd188b1e701e7e0abbf00de3c6c4b3a6bff580a1a
                                                          • Instruction ID: 5404d033ae91018d8bb796ff8a3c93586377ec971b919174b6b784542370313a
                                                          • Opcode Fuzzy Hash: 2888c51d55bd0950f93b03fbd188b1e701e7e0abbf00de3c6c4b3a6bff580a1a
                                                          • Instruction Fuzzy Hash: EDF089F05043405FDB24FB34D8567AA73D47B98304F85041DE759DB292EA34A505EAA6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00CEE420
                                                            • Part of subcall function 00CF76EA: RtlFreeHeap.NTDLL(00000000,00000000,?,00CFF4A7,?,00000000,?,?,?,00CFF74A,?,00000007,?,?,00CFFC99,?), ref: 00CF7700
                                                            • Part of subcall function 00CF76EA: GetLastError.KERNEL32(?,?,00CFF4A7,?,00000000,?,?,?,00CFF74A,?,00000007,?,?,00CFFC99,?,?), ref: 00CF7712
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000002.1500609139.0000000000CA1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000004.00000002.1500592101.0000000000CA0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500668690.0000000000D10000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500706613.0000000000D37000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D3C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D46000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500729069.0000000000D4C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000004.00000002.1500816094.0000000000D4E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_2_ca0000_TMLauncher.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast_free
                                                          • String ID:
                                                          • API String ID: 1353095263-0
                                                          • Opcode ID: 12599881d3d2677130f80024f00bcbc44af00aa340e8eb4b04f0b047de0c1231
                                                          • Instruction ID: e5f7a48745a47eb64b9806f3adc526ac0a8be35274824705d6b1ed7dcab18530
                                                          • Opcode Fuzzy Hash: 12599881d3d2677130f80024f00bcbc44af00aa340e8eb4b04f0b047de0c1231
                                                          • Instruction Fuzzy Hash: 80C08C3100020CFBCB009B45C806E9E7BA8EB80364F200044F40457240DAB1EE00A694
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%